This section describes how to configure a trusted zone for protected devices via the Web Plug-in.
In this section of the help
Adding exclusions
Adding trusted processes
Configuring certificate monitoring
Applying the not-a-virus mask