This section contains information on the trusted zone and instructions on configuring scan exclusion and creating a list of trusted applications.
In this section:
About the trusted zone
Creating a scan exclusion
Modifying a scan exclusion
Deleting a scan exclusion
Enabling and disabling a scan exclusion
Editing the list of trusted applications
Enabling and disabling trusted zone rules for an application in the list of trusted applications
Using trusted system certificate storage