Trusted zone

for Windows, macOS, and Linux

A trusted zone is a system administrator-configured list of objects and applications that Kaspersky Endpoint Security does not monitor when active.

The administrator forms the trusted zone independently, taking into account the features of the objects that are handled and the applications that are installed on the computer. It may be necessary to include objects and applications in the trusted zone when Kaspersky Endpoint Security blocks access to a certain object or application, if you are sure that the object or application is harmless.

Trusted zone settings for Pro View

Settings

OS

Description

Web addresses

Windows

Linux

List of web addresses that the Web Threat Protection considers trusted. The component does not scan incoming and outgoing traffic from these addresses for threats. The list of trusted addresses can be used, for example, if the Web Threat Protection component interferes with downloading a file from a known website.

You can add both the specific address and the address mask of a web page / website to the list of trusted web addresses.

IP addresses

Windows

Linux

List of IP addresses of trusted devices. The Network Threat Protection component does not block network activity from these addresses.

Windows You can add an IP address with port or port ranges and protocol specified.

Linux You can add only an IP address to the list of exclusions.

The application also does not log information on network attacks from the IP addresses that are in the list of exclusions.

Network ports

Windows

Linux

List of known and registered ports on which the Web Control, File Threat Protection, Web Threat Protection, Mail Threat Protection, Exploit Prevention, and Behavior Detection components monitor data streams. If this toggle switch is enabled, the port is considered trusted, and data passing through such a port on user devices are not monitored.

Domains

Windows

Linux

List of trusted domains. The Web Threat Protection, Web Control, and Cloud Discovery components (only for Windows device) do not monitor encrypted connections with these domains.

Connections to domains in this list will be blocked on Windows devices if accessed via SSL/TLS and the "Block SSL/TLS connections" option is enabled

Applications

Windows

Linux

The list of trusted applications is a list of applications whose file and network activity (including malicious activity) and access to the system registry are not monitored by Kaspersky Endpoint Security. By default, Kaspersky Endpoint Security monitors objects that are opened, executed, or saved by any application process, and controls the activity of all applications and network traffic that is generated by them. After an application is added to the list of trusted applications, Kaspersky Endpoint Security stops monitoring the application's activity.

Malware Scan exclusions

Windows

macOS

Linux

A scan exclusion is a set of conditions that must be fulfilled so that Kaspersky Endpoint Security will not scan a particular object for viruses and other threats. Scan exclusions make it possible for the safe use of legitimate software that can be exploited by criminals to damage a computer or user data. Although they do not have any malicious functions, such applications can be exploited by intruders. For details on legitimate software that can be used by intruders to damage your computer or personal data, please refer to the Kaspersky IT Encyclopedia website.

Devices

Windows

Linux

Trusted devices are devices to which users that are specified in the trusted device settings have full access at all times.

To work with trusted devices, you can grant access to an individual user, to a group of users, or to all users of the organization.

Page top