The trusted zone contains files, folders, and objects that you consider safe. Kaspersky Endpoint Security Cloud does not scan or monitor items from this zone. In other words, the trusted zone is a set of scan exclusions.
Scan exclusions make it possible to safely use legitimate applications that intruders can use to compromise your users' devices or personal data, although such applications do not have any malicious functions. You may also need to add an item to the trusted zone if Kaspersky Endpoint Security Cloud blocks access to an application even though you are absolutely sure that this application is harmless.
When an application is added to the trusted zone, its file activity and network activity is not monitored, even if such activity can raise concern. However, Kaspersky Endpoint Security Cloud still scans the executable file and the process of the trusted application.
You can add items to the trusted zone by using the following methods:
C:\Program Files\Radmin Viewer 3\RAdmin.exe
).When using this method, you can use environment variables (for example, %ProgramFiles%). You can also use masks:
*
(asterisk) character takes the place of any set of characters, except for the \
and /
characters (delimiters of the names of files and folders in paths to files and folders). For example, the mask C:\*\*.txt
will include all paths to files with the TXT extension located in first-level folders on drive C:, but not in subfolders.
*
characters take the place of any set of characters (including an empty set) in the file or folder name, including the \
and /
characters (delimiters of the names of files and folders in paths to files and folders). For example, the mask C:\Folder\**\*.txt
will include all paths to files with the TXT extension located in the folder named Folder and all its subfolders. The mask must include at least one nesting level. The mask C:\**\*.txt
is not a valid mask.
?
(question mark) character takes the place of any single character, except for the \
and /
characters (delimiters of the names of files and folders in paths to files and folders). For example, the mask C:\Folder\???.txt
will include paths to all files residing in the folder named Folder that have the TXT extension and a name consisting of three characters.
Email-Worm
, Rootkit
, or RemoteAdmin
).When using this method, you can use masks:
*
(asterisk) character takes the place of any set of characters.For example, the mask *RemoteAdmin.*
will include all kinds of software for remote administration.
?
(question mark) character takes the place of any single character.You can use any or both of these methods in each exclusion. The following rules apply: