Note:
The Trusted Program List does not support wildcards and environment variables.
- Go to Devices.
- Select a desktop or server group.
- 
                Click Configure Policy.
                 
                    The Configure Policy: <group name> screen appears. 
- Click Trusted Program.
 A new screen appears. 
- To exclude a program from suspicious file access activity
monitoring, type the full file path, using a specific file path,
and click Add to Trusted Program List.
 <drive_name>:/<path>/<file_name> Example 1: C:\Windows\system32\regedit.exe Example 2: D:\backup\tool.exe This prevents hackers from using program names in the exclusion list but dropped in different file path to be executed. 
- Click Save.
Parent topic: Trusted Program
 
		