Editing the list of trusted applications

The list of trusted applications is a list of applications whose file and network activity (including malicious activity) and access to the system registry are not monitored by Kaspersky Industrial CyberSecurity for Nodes. By default, Kaspersky Industrial CyberSecurity for Nodes monitors objects that are opened, executed, or saved by any application process and controls the activity of all applications and network traffic that is generated by them. After an application is added to the list of trusted applications, Kaspersky Industrial CyberSecurity for Nodes stops monitoring the application's activity.

The difference between scan exclusions and trusted applications is that for exclusions Kaspersky Industrial CyberSecurity for Nodes does not scan files, while for trusted applications it does not control the initiated processes. If a trusted application creates a malicious file in a folder which is not included in scan exclusions, Kaspersky Industrial CyberSecurity for Nodes will detect the file and eliminate the threat. If the folder is added to exclusions, Kaspersky Industrial CyberSecurity for Nodes will skip this file.

For example, if you consider objects that are used by the standard Microsoft Windows Notepad application to be safe, meaning that you trust this application, you can add Microsoft Windows Notepad to the list of trusted applications so that the objects used by this application are not monitored. This will increase computer performance, which is especially important when using server applications.

In addition, certain actions that are classified by Kaspersky Industrial CyberSecurity for Nodes as suspicious may be safe within the context of the functionality of a number of applications. For example, the interception of text that is typed from the keyboard is a routine process for automatic keyboard layout switchers (such as Punto Switcher). To take account of the specifics of such applications and exclude their activity from monitoring, we recommend that you add such applications to the trusted applications list.

Trusted applications help to avoid compatibility issues between Kaspersky Industrial CyberSecurity for Nodes and other applications (for example, the problem of double-scanning of the network traffic of a third-party computer by Kaspersky Industrial CyberSecurity for Nodes and by another anti-virus application).

At the same time, the executable file and process of the trusted application are still scanned for viruses and other malware. An application can be fully excluded from Kaspersky Industrial CyberSecurity for Nodes scanning by means of scan exclusions.

Kaspersky Industrial CyberSecurity for Nodes does not support trusted applications lists containing over 5000 objects.

How to add an application to the trusted list in the Kaspersky Security Center Administration Console

How to add an application to the trusted list in the Kaspersky Security Center Web Console

How to add an application to the trusted list in the Application Console

Trusted application settings

Parameter

Description

Use full process path on disk to consider it trusted

Kaspersky Industrial CyberSecurity for Nodes uses the full path to the file to determine whether the process is trusted.

Use process file hash to consider it trusted

Kaspersky Industrial CyberSecurity for Nodes uses the selected file's hash to determine the process's trust status. If the check box is cleared, the file hash is not used to determine the process's trust status.

Allow interaction with the application interface

Kaspersky Industrial CyberSecurity for Nodes blocks all attempts to manage application services from a remote computer. If the check box is selected, the remote access application is allowed to manage Kaspersky Industrial CyberSecurity for Nodes settings through the Kaspersky Industrial CyberSecurity for Nodes interface.

Do not monitor child application activity

Kaspersky Industrial CyberSecurity for Nodes will not monitor the file activity or network activity of applications that are started by this application. You can apply the exclusion recursively. So that the application does not monitor the activity of the entire chain of child applications.

Do not inherit restrictions from the parent process (application)

The restrictions configured for the parent process will not be applied by Kaspersky Industrial CyberSecurity for Nodes to a child process. The parent process is started by an application for which application rights and application network rules are configured.

Do not scan process memory

Kaspersky Industrial CyberSecurity for Nodes does not scan process memory.

Page top