1. Mirror the actions the gif below performs.
Figure : Kapersky
If you cannot view the gif, follow these steps:
Open the main application window
On the upper right hand corner of the window, click Settings
On the upper part of the Settings window, select Protection
On the left hand part of the Settings window, select Threats and exclusions
On the right hand part of the window, click on the Settings button in the Exclusions section
2. Go to the Trusted applications tab
3. Click on the Add link
4. Select an executable file of the trusted application via Browse... or Applications... (show run applications)
Figure : Kapersky5. Mirror the actions the gif below performs.
Figure : Kapersky
If you cannot view the gif, follow these steps:
On the "Exclusions for application window", select the settings for the trusted application:
Do not scan opened files
Do not monitor application activity
Do not monitor child application activity
Do not scan network traffic
6. On the Trusted zone window, click OK
7. On the bottom right hand corner of the Settings window, click OK
8. Close the main application window.