This section describes how to configure a trusted zone for protected devices using the Administration Plug-in.
In this section
Adding exclusions
Adding trusted processes
Configuring certificate monitoring
Applying the not-a-virus mask