6/4/2023 0 Comments Punto switcher keylogger![]() The list of trusted applications is a list of applications whose file and network activity (including suspicious activity) and access to the system registry are not monitored by Kaspersky Security. Moreover, you can create an exclusion category containing exclusions for Light Agent for Windows whereby Kaspersky Security will not scan files or folders in the category and/or objects with the specified name. Protection exclusions can be used by the following application components and tasks: Objects according to the classification of Kaspersky Virus Encyclopediaīy default, the /dev, /sys, /proc and /.snapshots file system objects are excluded from protection and scans by Light Agent for Linux.Files based on their hashes calculated by the SHA-256 algorithm. ![]() Files and folders that are selected by a mask.You can exclude objects of the following types from scanning: To prevent this application from being blocked, create an exclusion with the name or name mask that is listed in the Kaspersky Virus Encyclopedia. This is a remote access application that gives you control over a remote computer. For example, you may frequently use the Remote Administrator program. To do so, add the name or name mask that is listed in the Kaspersky Virus Encyclopedia to the trusted zone. To prevent them from being blocked, you can configure scan and protection exclusions. Such applications may be blocked by Kaspersky Security. For details on legitimate software that could be used by intruders to harm the computer or personal data of a user, please visit the Kaspersky Virus Encyclopedia website. Such applications are not categorized as viruses. Examples of such applications include remote administration tools, IRC clients, FTP servers, various utilities for suspending or concealing processes, keyloggers, password crackers, and auto-dialers. Although they do not have any malicious functions, such applications can be used as an auxiliary component in malware. Some legitimate applications can be used by criminals to compromise your virtual machine or personal data. If the object satisfies these conditions, Kaspersky Security does not scan this object for viruses or other malware. It may be necessary to include objects and applications in the trusted zone when Kaspersky Security blocks access to a certain object or application, if you are sure that the object or application is harmless.Įxclusion is a combination of conditions that describe an object or application. You form a trusted zone based on the specifics of the objects that you need to manage and the applications that are installed in the guest operating system of the protected virtual machine. A trusted zone is a custom list of objects and applications that Kaspersky Security does not monitor when active. ![]()
0 Comments
Leave a Reply. |