Editing the list of trusted applications

You can create a list of trusted applications for which Kaspersky Security does not monitor file and network activity (including malicious activity) and access to the system registry.

To create a list of trusted applications via Kaspersky Security Center:

  1. Open Kaspersky Security Center Administration Console.
  2. In the Managed devices folder of the console tree, open the folder with the name of the administration group to which the relevant protected virtual machines belong.
  3. In the workspace, select the Policies tab.
  4. Select a Light Agent for Windows policy in the list of policies and open the Properties: <Policy name> by double-clicking.
  5. In the Light Agent for Windows policy properties window, select the General Protection Settings section in the list on the left.
  6. In the right part of the window, in the Exclusions and trusted zone section, click the Settings button.

    The Trusted zone window opens.

  7. Select the Trusted applications tab.
  8. To add an application to the trusted applications list:
    1. Click the Add button.
    2. In the context menu that opens, do one of the following:
      • To find the application in the list of applications that are installed on the virtual machine, select the Applications item in the menu. 

        The Select application window opens.

      • To specify the path to the executable file of the relevant application, select Browse.

        The standard Open window in Microsoft Windows opens.

    3. Select the application that you want to add to the list of trusted applications.

      The Exclusions for application window opens.

    4. Select the check boxes for the relevant types of application activity:
      • Do not scan opened files.
      • Do not monitor application activity.
      • Do not inherit restrictions of the parent process (application).
      • Do not monitor child application activity.
      • Allow interaction with application interface.
      • Do not scan network traffic.
    5. In the Exclusions for application window, click OK.

      The trusted application that you have added appears in the trusted applications list.

  9. To edit the settings of a trusted application:
    1. Select a trusted application in the list of trusted applications.
    2. Click the Edit button.
    3. The Exclusions for application window opens.
    4. Change the status of check boxes that are opposite the relevant kinds of application activity.

      If no kinds of activity are selected in the Exclusions for application window, the trusted application is included in scanning. In this case the trusted application is not removed from the list of trusted applications, but its check box is cleared.

    5. In the Exclusions for application window, click OK.
  10. To remove a trusted application from the trusted applications list:
    1. Select a trusted application in the list of trusted applications.
    2. Click the Delete button.
  11. In the Trusted zone window, click OK.
  12. Click the Apply button.

To edit the list of trusted applications in local interface:

  1. On the protected virtual machine, open the application settings window.
  2. In the left part of the window, select the Anti-Virus protection section.

    The anti-virus protection settings are shown in the right part of the window.

  3. Complete steps 6-11 of the previous instructions.

    If the settings in the local interface are not available, this means that the values of settings defined by the policy are used for all protected virtual machines of the administration group.

  4. To save changes, click the Save button.
Page top