How to add program to Trusted applications in Kaspersky PURE 3.0


Kaspersky PURE 3.0


How to add program to Trusted applications in Kaspersky PURE 3.0

Back to "Computer Protection"
2013 Mar 05 ID: 9724

In Kaspersky PURE 3.0 a user can create a trusted zone of applications, which will be not scanned by anti-virus application.

It is important to remember that if you create a trusted application list, then Kaspersky PURE 3.0 will not control file and network program activities and registry prompts. An exe file of a program will still be scanned for viruses. If you want to disable an application scan at all, than you need to use the tab Exclusion rules.

Rules for trusted applications:

  • Do not scan opened files
  • Do not monitor application activity
  • Do not monitor child application activity
  • Do not scan network traffic

In order to create a rule for the trusted application, perform the following actions:

  1. Open Kaspersky PURE 3.0.
  2. In the upper right corner of the window, click the Settings link.

  1. On the upper part of the Settings window, select Protection..
  2. In the left part of the Settings window, click Threats and exclusions.
  3. In the right part of the window click the Settings button in the Exclusions section.

  1. Go to the Trusted applications tab and click the Add button.
  2. Select an executable file of the trusted application via Browse... or Applications... (show run applications).

  1. On the Exclusions for application window, select the settings for the trusted application:
    • Do not scan opened files - excludes from the scan all files that the trusted application process.
    • Do not monitor application activity - excludes from System Watcher monitoring any activity, suspicious or otherwise, that the trusted application performs.
    • Do not inherit restrictions from the parent process (application) - application activity is monitored according to the rules specified by the user. If this check box is cleared, the application inherits rules from the parent application that launched it.
    • Do not monitor child application activity - excludes from System Watcher monitoring any activity, suspicious or otherwise, that the trusted application's child processes perform.
    • Do not scan network traffic - excludes from scans for viruses and spam any network traffic initiated by the trusted application. If the check box is enabled the traffic of the selected application is not scanned for spam and viruses only. The setting value does not affect the Firewall’s operation: the Firewall scans the application traffic in accordance with the settings defined for that application.

    • Click the all link, to exclude application’s network traffic from scan. To exclude only encrypted network traffic (that uses SSL/TSL protocol) from scan, click the encrypted link.

    • In addition you can restrict the exclusion by assigning a remote host/port.
      • To create a restriction for a definite IP-address, click the any link and then the specify link. In the Remote IP address window click the Add link. In the IP address window enter the necessary IP address and click OK in every window.

      • To exclude definite ports from scan, click the any link and then click the specify link. In the Remote ports window enter the necessary ports (each port should be divided by a comma). Click OK to save the changes.

  1. In the Exclusions for application window, click OK.
  2. In the Trusted zone window, click the OK button.
  3. In the bottom right corner of the Settings window, click the OK button.
  4. Close the main window.

By default the following file is added to trusted applications with the Do not scan encrypted network traffic parameter in Kaspersky PURE 3.0%SystemRoot%\system32\svchost.exe – executable file of the system process Microsoft Windows Update. Protected traffic of this service cannot be scanned by any anti-virus software. Work of these programs will be finished with an error, if the following rule has not been created for this service.

Was this information helpful?
Yes No
Thank you


How can we improve this article?

Your feedback will be used for content improvement purposes only. If you need assistance, please contact technical support.

Submit Submit

Thank you for your feedback!

Your suggestions will help improve this article.