User manual

Table Of Contents
Reference: Configuration options
85
The button opens a window in which you can select the application to be blocked.
Add
With the Add button you can transfer the application specified in the input box to the
list of applications to be blocked.
Note
Applications required for the proper operation of the operating system cannot be added.
Delete
The Delete button lets you remove a highlighted application from the list of applications
to be blocked.
12.2.2.2. Application filter: Permitted applications
The section Application filter: Permitted applicationslists the applications excluded from
monitoring by the ProActiv component: signed programs classified as trusted and
included in list by default, all applications classified as trusted and added to the
application filter: You can add permitted applications to the list in Configuration. You
also have the option of adding applications to suspicious program behavior via Guard
notifications by using the Trusted program option in the Guard notification.
Applications to be skipped
Applications
The list contains applications excluded from monitoring by the ProActiv component. In
the default installation settings, the list contains signed applications from trusted
producers. You have the option of adding applications that you consider to be
trustworthy via the configuration or via Guard notifications. The ProActive component
identifies applications using the path, the file name and the content. We recommend
checking the content, as malcode can be added to a program through changes such as
updated. You can determine whether a contents check should be carried out from the
type specified: For the Contents type, the applications specified by path and file name are
checked for changes to the file content before they are excluded from monitoring by the
ProActiv component. If the file contents have been modified, the application is again
monitored by the ProActiv component. For the Path type, no contents check is carried
out before the application is excluded from monitoring by the Guard. To change the
exclusion type, click on the type displayed.
Warning
Only use the Path type in exceptional cases. Malcode can be added to an application
through an update. The originally harmless application is now malware.
Note
Some trusted applications, including for example all application components of AntiVir
Professional, are by default excluded from monitoring by the ProActive component even
though they are not included in the list.
Input box