20.08.2013 Views

User Guide - Kaspersky Lab

User Guide - Kaspersky Lab

User Guide - Kaspersky Lab

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Protection management system 79<br />

When you select a program, <strong>Kaspersky</strong> Internet Security records the<br />

internal attributes of the executable file and uses them to identify the<br />

trusted program during scans.<br />

The file path is inserted automatically when you select its name.<br />

Figure 16. Adding an application to the trusted list<br />

3. Specify which actions performed by this process will not be monitored:<br />

Do not scan opened files – excludes from the scan all files that<br />

the trusted application process.<br />

Do not control restrict application activity – excludes from<br />

Proactive Defense monitoring any activity, suspicious or<br />

otherwise, that the trusted application performs.<br />

Do not control restrict registry access – excludes from scanning<br />

any accesses of the system registry initiated by the trusted<br />

application.<br />

Do not scan network traffic – excludes from scans for viruses<br />

and spam any network traffic initiated by the trusted application.<br />

You can exclude all the application’s network traffic or encrypted<br />

traffic (SSL) from the scan. To do so, click the all link. It will<br />

change to encrypted. In addition you can restrict the exclusion by<br />

assigning a remote host/port. To create a restriction, click any,<br />

which will change to selected, and enter a value for the remote<br />

port/host.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!