Trusted zone

This section contains information on the trusted zone and instructions on configuring scan exclusion and creating a list of trusted applications.

In this section:

About the trusted zone

Creating a scan exclusion

Modifying a scan exclusion

Deleting a scan exclusion

Enabling and disabling a scan exclusion

Editing the list of trusted applications

Enabling and disabling trusted zone rules for an application in the list of trusted applications

Using trusted system certificate storage

Network Protection

Page top