You can add a process to the list of trusted processes using one of the following methods:
If the executable file of a process has been modified, Kaspersky Industrial CyberSecurity for Nodes excludes this process from the list of trusted processes.
To add one or more processes to the list of trusted processes:
The Trusted Zone window opens.
Processes from the XML file will be added to the list of trusted processes.
In the Adding trusted processes window that opens, configure the following:
You can only add one executable file at a time. Repeat steps c-d to add other executable files.
The account under which the Real-Time File Protection task is run must have administrator rights on the device with Kaspersky Industrial CyberSecurity for Nodes installed in order to allow viewing of the list of active processes. You can sort processes in the list of active processes by file name, process identifier (PID), or path to the executable file of the process on the protected device. Note, that you can select running processes by clicking the Processes button only using the Application Console on a protected device or in the specified host settings via the Kaspersky Security Center.
In the Adding a process window that opens, do the following:
When specifying the objects, you can use names masks (via ?
and *
characters) and all types of environment variables. The resolving of environment variables (replacing variables with their values) is performed by Kaspersky Industrial CyberSecurity for Nodes when starting a task, or when applying new settings to a running task (not applicable to On-Demand Scan tasks). Kaspersky Industrial CyberSecurity for Nodes resolves environment variables under the account used to start the task. For more information on environment variables, refer to the Microsoft Knowledge Base.
In the Trusted process adding window that opens, configure the following:
To add the selected process to the list of trusted processes, at least one trust criterion must be selected.
The selected file or process will be added to the list of trusted processes in the Trusted Zone window.
Page top