Trusted zone

This section contains information on the trusted zone and instructions on configuring scan exclusion and creating a list of trusted applications.

In this section:

About the trusted zone

Creating a scan exclusion

Modifying a scan exclusion

Deleting a scan exclusion

Enabling and disabling a scan exclusion

Editing the list of trusted applications

Enabling and disabling trusted zone rules for an application in the list of trusted applications

Using trusted system certificate storage

Page top