You cannot create more than 1,000 exclusions for Adaptive Anomaly Control rules. It is not recommended to create more than 200 exclusions. To reduce the number of exclusions used, it is recommended to use masks in the settings of exclusions.
An exclusion for an Adaptive Anomaly Control rule includes a description of the source and target objects. The source object is the object performing the actions. The target object is the object on which the actions are being performed. For example, you have opened a file named file.xlsx
. As a result, a library file with the DLL extension is loaded into the computer memory. This library is used by a browser (executable file named browser.exe
). In this example, file.xlsx
is the source object, Excel is the source process, browser.exe
is the target object, and Browser is the target process.
To create or edit an exclusion for an Adaptive Anomaly Control rule:
The settings of the Adaptive Anomaly Control component are displayed in the right part of the window.
The Adaptive Anomaly Control rule window opens.
The Exclusion from rule window opens.
The standard Select users or groups window in Microsoft Windows opens.
С:\Dir\File.exe
or Dir\*.exe
).С:\Dir\File.exe
or Dir\*.exe
). For example, file path document.docm
, which uses a script or macro to start the target processes.You can also specify other objects to exclude, such as a web address, macro, command in the command line, registry path, or others. Specify the object according to the following template: object://<object>,
where <object>
refers to the name of the object, for example, object://web.site.example.com
, object://VBA, object://ipconfig
, object://HKEY_USERS
. You can also use masks, for example, object://*C:\Windows\temp\*
.
The Adaptive Anomaly Control rule is not applied to actions performed by the object, or to processes started by the object.
С:\Dir\File.exe
or Dir\*.exe
).object://<command>
, for example, object://cmdline:powershell -Command "$result = 'C:\windows\temp\result_local_users_pwdage txt'"
. You can also use masks, for example, object://*C:\windows\temp\*
.The Adaptive Anomaly Control rule is not applied to actions taken on the object, or to processes started on the object.