Trusted Applications dialog box

Use this dialog box to assign, create, and edit profile-based trusted application policies. Trusted applications are safe in any environment, have no known vulnerabilities, and are allowed to perform all operations except those that suggest that the applications have been compromised.

Item
Description
Policy List
List of available trusted application policies. Click
  • Properties to view details of a selected policy.
  • Create to add a new policy.
  • Duplicate to copy an existing policy as the basis for a new policy.
  • Refresh to refresh the policy list.
Properties button
Click to view details of a selected trusted application.
Create button
Click to view details of a selected trusted application.
Delete button
Click to delete a selected trusted application.
Duplicate button
Click to copy a selected trusted application as the basis for a new trusted application.
Enable button
Click to enable a selected disabled trusted application.
Disable button
Click to disable a selected enabled trusted application.
Custom Filter
Click to set a filter for the display.
Reset Filter
Click to remove the filter that has been applied.
Refresh
Click to refresh the display.
Status
Indicates whether the trusted application is enabled or disabled.
Application Name
The name of the trusted application
IPS
Indicates whether the application is trusted for IPS.
Firewall
Indicates whether the application is trusted for firewall.
Application Hooking
Indicates whether the application is trusted for application hooking.
Last Modified
Date the trusted application was last modified.
Note
Indicates whether there is additional information about the trusted application.

Copyright © 2006 McAfee, Inc. All Rights Reserved.