Примеры использования Trusted zone на Английском языке и их переводы на Русский язык
{-}
-
Official
-
Colloquial
all applications of a vendor in the trusted zone, select the check box on the left of the application
The Trusted Zone is applied in Real-Time File Protection
all applications of a vendor from the trusted zone, clear the check box on the left of the application
The user creates a trusted zone based on the features of the objects he
Configuring Trusted Zone settings in Kaspersky Security Center By default, Trusted Zone is applied in newly created policies and tasks.
You can add objects to the Trusted Zone by their location on the computer,
View and configure Trusted Zone settings see section"About Kaspersky Embedded Systems Security Trusted Zone" on page 57.
Select the Apply Trusted Zone check box, if you want to exclude objects described in the Kaspersky Security 10.1 for Windows Server Trusted Zone from the scan scope of the task.
process will be added to the list of trusted processes in the Trusted Zone window.
After the Trusted Zone is enabled or disabled, the specified exclusions are immediately applied or cease to be applied in running tasks.
To exclude applications recommended for desktop operating systems from the trusted zone, clear the Create recommended exclusions for desktop operating systems check box.
The added exclusion appears in the list of exclusions on the Exclusions tab of the Trusted zone window.
Configuring the trusted zone At this step, you can create a trusted zone for the Light Agent for Windows component.
View and configure Trusted Zone settings see Section"About Kaspersky Security 10.1 for Windows Server Trusted Zone" on page 48.
The deleted exclusion disappears from the list of exclusions on the Exclusions tab of the Trusted zone window.
After the trusted zone is enabled or disabled,
CONFIGURING THE TRUSTED ZONE In this window of the wizard, you will be offered to configure the trusted zone.
You can add objects to the Trusted Zone by their location on the server,
Solution of the problem of searching entry in encrypted data will allow to store data outside the trusted zone in secure form.
names of applications or names of application vendors that you can include in the trusted zone or exclude from it.