Примеры использования Trusted zone на Английском языке и их переводы на Русский язык
{-}
-
Official
-
Colloquial
In the Trusted zone window, click OK.
Select or clear the Apply trusted zone check box.
The Trusted zone window opens on the Exclusions tab.
Select Configure Trusted Zone settings.
In the Trusted zone section(see figure above), click the Configure button.
View and configure Trusted Zone settings.
In the Trusted Zone window, on the Exclusions tab, click the Add button.
Applied You can apply the Trusted Zone if required.
You can enable ordisable the use of trusted processes in the Trusted Zone.
Clear or select the Use Trusted Zone check box.
Trusted zone is a predefined list of exclusions for protection scope or scan scope.
Clear or select the Use Trusted Zone check box.
Configuring the trusted zone At this step, you can configure the trusted zone.
In the Exclusions section, click the Trusted zone button.
In the Exclusions and trusted zone section, click the Settings button.
This check box enables/ disables use of the Trusted Zone for a task.
Move interface to a trusted zone using FirewallD on CentOS terms.
The not-a-virus mask usage is configured in the Trusted Zone settings.
In the Trusted zone section, select orclear the Apply trusted zone check box.
To import the settings of the Trusted Zone component.
In the Trusted Zone window, on the Trusted processes tab, select the Do not check file.
To export the settings of the Trusted Zone component.
Trusted zone Used General list of exclusions which can be used in selected tasks.
Limitation does not affect Trusted Zone configuration.
Configuring the trusted zone You can configure the trusted zone in the following ways.
Under Exclusions, click the Trusted zone button see figure above.
The Trusted Zone window closes, and Real-Time File Protection is paused during backup.
The not-a-virus mask usage is configured in the Trusted Zone settings see Section"Applying the not-a-virus mask" on page 143.
The Trusted Zone is applied in Real-Time File Protection and On-Demand Scan tasks by default.
To include an application orall applications of a vendor in the trusted zone, select the check box on the left of the application or vendor name.