Adding an application to the list of trusted applications

You can create a list of trusted applications for which Kaspersky Security does not monitor file and network activity (including malicious activity) and access to the system registry.

To create a list of trusted applications via Kaspersky Security Center:

  1. Open Kaspersky Security Center Administration Console.
  2. In the Managed devices folder of the console tree, open the folder with the name of the administration group to which the relevant protected virtual machines belong.
  3. In the workspace, select the Policies tab.
  4. Select a Light Agent for Windows policy in the list of policies and open the Properties: <Policy name> by double-clicking.
  5. In the Light Agent for Windows policy properties window, select the General Protection Settings section in the list on the left.
  6. In the right part of the window, in the Exclusions and trusted zone section, click the Settings button.

    The Trusted zone window opens.

  7. Select the Trusted applications tab.

    The tab displays a list of added trusted applications grouped by category.

  8. If you want to add a new application that is not in any of the predefined categories to the list of trusted applications:
    1. Click the Add button and select the Category option in the context menu.
    2. In the Category window that opens, in the Category name field, enter the name of the new category of trusted applications and click OK.
  9. If you want to add a trusted application to the added category or to one of the predefined categories of trusted applications, in the list of trusted applications select the category to which you want to add the trusted application.
  10. On the Trusted applications tab, click the Add button and select Trusted application –> Browse in the context menu.

    The standard Open file window in Microsoft Windows opens.

  11. In the Open file window, select the executable file of the application that you want to add to the list of trusted applications, and click the Open button.

    The Exclusions for application window opens.

  12. In the Exclusions for application window that opens, perform the following operations:
    1. In the Path field, enter the path to the executable file of the application that you want to add to the list of trusted applications.
    2. Use the check boxes to configure the Application Privilege Control settings.

      If you selected the Do not scan network traffic check box, you can use the links in the lower part of the window to configure the following settings for scanning traffic transmitted for this application:

      • Exclude all traffic or only encrypted traffic from scans.
      • Exclude from scans the traffic transmitted for this application from any IP address or only from specified IP addresses.
      • Exclude from scans the traffic transmitted for this application from any or only from specified ports.

      You can modify these settings by clicking the link.

      If no kinds of activity are selected in the Exclusions for application window, the trusted application is included in scanning. In this case the trusted application is not removed from the list of trusted applications, but its check box is cleared.

    3. In the Exclusions for application window, click OK.

    The added trusted application appears in the list of trusted applications.

  13. In the Trusted zone window, click OK.
  14. Click the Apply button.

To edit the list of trusted applications in local interface:

  1. On the protected virtual machine, open the application settings window.
  2. In the left part of the window, select the Anti-Virus protection section.

    The anti-virus protection settings are shown in the right part of the window.

    If the settings in the local interface are not available, this means that the values of settings defined by the policy are used for all protected virtual machines of the administration group.

  3. In the right part of the window, in the Exclusions and trusted zone section, click the Settings button.

    The Trusted zone window opens.

  4. Select the Trusted applications tab.

    The tab displays a list of added trusted applications grouped by category.

  5. If you want to add a new application that is not in any of the predefined categories to the list of trusted applications:
    1. Click the Add button and select the Category option in the context menu.
    2. In the Category window that opens, in the Category name field, enter the name of the new category of trusted applications and click OK.
  6. If you want to add a trusted application to the added category or to one of the predefined categories of trusted applications, select the category to which you want to add the trusted application.
  7. On the Trusted applications tab, click the Add button and perform one of the following actions in the context menu:
    • To find the application in the list of applications that are installed on the virtual machine, select the Applications item in the menu. 

      The Select application window opens.

    • To specify the path to the executable file of the relevant application, select Browse.

      The Select file window opens.

  8. Select the application that you want to add to the list of trusted applications.

    The Exclusions for application window opens.

  9. Use the check boxes to configure the Application Privilege Control settings.

    If you selected the Do not scan network traffic check box, you can use the links in the lower part of the window to configure the following settings for scanning traffic transmitted for this application:

    • Exclude all traffic or only encrypted traffic from scans.
    • Exclude from scans the traffic transmitted for this application from any IP address or only from specified IP addresses.
    • Exclude from scans the traffic transmitted for this application from any or only from specified ports.

    You can modify these settings by clicking the link.

    If no kinds of activity are selected in the Exclusions for application window, the trusted application is included in scanning. In this case the trusted application is not removed from the list of trusted applications, but its check box is cleared.

  10. In the Exclusions for application window, click OK.

    The added trusted application appears in the list of trusted applications.

  11. In the Trusted zone window, click OK.
  12. To save changes, click the Save button.
Page top