In the Trusted applications section, click Settings.
The Trusted applications window opens.
Do any of the following:
To add an application that you want to be excluded from monitoring:
Click the Add button.
The Add a trusted application window opens.
Under Path or path mask to the application, specify the path to the executable file of the application to be excluded.
When specifying the path, you can use environment variables (for example, %ProgramFiles%).
Select the check boxes next to the application activities that do not need to be controlled:
Do not scan files opened by the application
All files that are opened by the application are excluded from scans. For example, if you are using applications to back up files, this feature helps reduce the consumption of the devices' resources by Kaspersky Endpoint Security for Windows.
This option is applicable for the following Kaspersky Endpoint Security for Windows components: File Threat Protection.
Do not monitor application activity
Kaspersky Endpoint Security for Windows does not monitor the application's file activity and network activity in the operating system.
Allow the application to interact with the Kaspersky Endpoint Security for Windows interface
The remote access application is allowed to manage Kaspersky Endpoint Security for Windows settings through the Kaspersky Endpoint Security for Windows interface.
This option is applicable for the following Kaspersky Endpoint Security for Windows components: Self-Defense.
Do not scan network traffic of the application
Network traffic initiated by the application is excluded from scans.
You can exclude either all traffic or only encrypted traffic from scans. You can also exclude only individual IP addresses and port numbers from scans.
This option is applicable to all Kaspersky Endpoint Security for Windows components that scan network traffic.
Click OK to close the Add a trusted application window.
The added application appears in the list of exclusions in the Trusted applications window.
To modify an application that is excluded from monitoring:
Select the check box next to the required application.
Click the Edit button.
The Add a trusted application window opens. It contains details about the selected application and excluded activities.
Make the necessary changes.
Click OK to close the Add a trusted application window.
The modified application is displayed in the list of exclusions in the Trusted applications window.
To delete an application from the list of monitoring exclusions:
Select the check box next to the required application.
Click the Delete button.
The deleted application disappears from the list of exclusions in the Trusted applications window.
Click the Settings link below the Malware scan exclusions section.
The Malware scan exclusions window opens.
Do any of the following:
To add a file, a folder, or an object to the list of scan exclusions:
Click the Add button.
The New record window opens.
By selecting or clearing the File or folder and Object name check boxes, select whether the exclusion must include a file or folder, an object, or both.
In the Comment entry field, type a description of the exclusion being created.
If the File or folder check box is selected, fill in the Name or name mask of file or folder field with the files or folders that you do not want to be scanned.
When specifying files or folders, you can use environment variables (for example, %ProgramFiles%) and masks.
If you want to exclude subfolders of the specified folder, select the Including subfolders check box.
If the Object name check box is selected, fill in the Object name field with the objects that you do not want to be detected.
Click the Settings link below the Network ports exclusions section.
The Network ports exclusions window opens.
Do any of the following:
To add network ports that you want to be excluded from monitoring:
Click the Add button.
The Add ports to exclusions window opens. The window lists all network ports that are monitored by Kaspersky Next.
Select the check boxes next to the network ports to be excluded.
Click OK to close the Add ports to exclusions window.
The added network ports appear in the list of exclusions in the Network ports exclusions window.
To delete network ports from the list of monitoring exclusions:
Select the check box next to the required network ports.
Click the Delete button.
The deleted network ports disappear from the list of exclusions in the Network ports exclusions window.
Click the Save button to save the changes.
The trusted zone is updated.
After the security profile is applied on users' devices, Kaspersky Endpoint Security for Windows does not scan or monitor the objects that are added to exclusions. The objects that are deleted from exclusions are controlled.