Kaspersky Lab WorkSpace Security EU ED, 250-499u, 2Y, RNW KL4851XATDR User Manual
Product codes
KL4851XATDR
U
S E R
G
U I D E
148
2. Select the Add to Trusted zone item from the context menu for this object.
3. The Exclusion mask window will open. Make sure that you are satisfied with the exclusion rule settings. Object
name and relevant threat type fields are filled in automatically based on report data. To create the rule, click the
OK button.
OK button.
A
DDITIONAL EXCLUSION SETTINGS
You can impose additional conditions of rule application for some objects by threat type. For example, it may be
necessary to specify advanced settings in the following cases:
necessary to specify advanced settings in the following cases:
Invader (intrusion into the applications' processes). For this type of threat, you can give a name, mask, or
complete path to the object being embedded (for example, a .dll file) as an additional exclusion condition.
complete path to the object being embedded (for example, a .dll file) as an additional exclusion condition.
Launching Internet Browser (launching the browser with certain settings). For this type of threat, you can specify
browser startup settings as additional exclusion settings. For example, you can prevent browsers opening with
certain settings while Proactive Defense is analyzing application activity. However, you want to allow the
browser to open for the www.kaspersky.com domain with a link from Microsoft Office Outlook, as an exclusion
rule. To do so, specify in the Exclusion mask window the Microsoft Office Outlook application as an exclusion
Object, Launching Internet Browser as a Threat type, and enter an allowed domain mask in the Comment
field.
browser startup settings as additional exclusion settings. For example, you can prevent browsers opening with
certain settings while Proactive Defense is analyzing application activity. However, you want to allow the
browser to open for the www.kaspersky.com domain with a link from Microsoft Office Outlook, as an exclusion
rule. To do so, specify in the Exclusion mask window the Microsoft Office Outlook application as an exclusion
Object, Launching Internet Browser as a Threat type, and enter an allowed domain mask in the Comment
field.
A
LLOWED FILE EXCLUSION MASKS
Let us take a closer look at some examples of allowed masks that you can use when creating the list of files to exclude
from scan:
from scan:
1. Masks without file paths:
*.exe
– all files with the .exe extension;
*.ex?
– all files with the ex? extension, where ? may represent any single character;
test
– all files with the name test.
2. Masks with absolute file paths:
C:\dir\*.* or C:\dir\* or C:\dir\
– all files in the C:\dir\ folder;
C:\dir\*.exe
– all files with the .exe extension in the C:\dir\ folder;
C:\dir\*.ex?
– all files with the ex? extension in the C:\dir\ folder where ? may represent any character;
C:\dir\test
– only the C:\dir\test file.
If you do not want the application to scan files in all nested subfolders of the specified folder, check the
Include subfolders box when creating the mask.
3. File path masks:
dir\*.*, or dir\*, or dir\
– all files in all dir\ folders;
dir\test
– all test files in dir\ folders;
dir\*.exe
– all files with the .exe extension in all dir\ folders;
dir\*.ex?
– all files with the ex? extension in all dir\ folders, where ? may represent any character.
If you do not want the application to scan files in all nested subfolders of the specified folder, check the
Include subfolders box when creating the mask.