Corporate allowlist
Companies usually have their corporate specific applications that can be recognized and detected as false positive by antivirus solutions. It is also time-consuming to add manually the trusted applications to the allowlist.
Cyber Protection can automate the process of adding such applications to the allowlist. Backups are scanned by the Antivirus and Antimalware protection module and the scanned data are analyzed to allowlist such applications and prevent the false positive detections.
Adding trusted applications to the allowlist on a company-wide level enables to increase the further scanning performance. The allowlist is composed for each customer basing only on their data.
Automatic adding to the allowlist
- First, you should run cloud scanning of backups on at least two machines. This can be done by means of backup scanning plans.
- Then, you should enable Automatic generation of allowlist in the allowlist settings.
Manual adding to the allowlist
Manual adding of applications to the allowlist is available only if the Automatic generation of allowlist option is enabled.
- In the service console, go to Antimalware protection > Allowlist.
- Click Add file.
- Specify the path to the file and click Add.
Allowlist settings
You can enable the Automatic generation of allowlist option.
Then, you can specify one of the three trusted rule levels that define the aggression level of heuristics:
- Low – corporate applications will be added to the allowlist only after a significant amount of time and checks are done. Such applications are more trusted. However, this approach increases the possibility of false positive detections. The criteria to consider a file as clear and trusted are high.
- Default – corporate applications will be added to the allowlist according to the recommended protection level, to reduce possible false positive detections. The criteria to consider a file as clear and trusted are medium.
- High – corporate applications will be added to the allowlist faster, to reduce possible false positive detections. However, this does not guarantee that software is clean and it might later be recognized as suspicious/malware. The criteria to consider a file as clear and trusted are low.