You can enable or disable detection of legitimate applications that intruders can use to compromise devices or data.
Configuring in the Web Console
In the Web Console, you can detection of legitimate applications that intruders can use to compromise devices or data in the policy properties (Application settings → General settings → Application settings, Scan settings section).
The Detect legitimate applications that intruders can use to compromise devices or data check box enables or disables detection of legitimate applications that intruders can use to compromise the device or data of the user.
This check box is cleared by default.
Configuring in the Administration Console
In the Administration Console, you can detection of legitimate applications that intruders can use to compromise devices or data in the policy properties (General settings → Application settings, Scan settings section).
The Detect legitimate applications that intruders can use to compromise devices or data check box enables or disables detection of legitimate applications that intruders can use to compromise the device or data of the user.
This check box is cleared by default.
Configuring in the command line
In the command line, you can enable or disable detection of legitimate applications that intruders can use to compromise devices or data by using the DetectOtherObjects
setting in the general application settings.
You can edit the setting using command line options or a configuration file that contains all general application settings.
DetectOtherObjects
accepts the following values:
Yes
: enable detection of legitimate applications that intruders can use to compromise devices or data.No
: do not enable detection of legitimate applications that intruders can use to compromise devices or data.