Item
|
Description
|
Name
|
The name of the trusted application.
|
Status
|
Either Enabled or Disabled.
|
Mark as trusted for IPS
|
Indicates the application is trusted for IPS rules.
|
Mark as trusted for firewall
|
Indicates the application is trusted for firewall rules.
|
Mark as trusted for application hooking
|
Indicates the application is trusted for application hooking rules.
|
Created By
|
The person who created the trusted application.
|
Created On
|
The date of the creation of the trusted application.
|
Last Modified By
|
The person who last modified the trusted application.
|
Last Modified On
|
The date the trusted application was last modified.
|
Note
|
Notes on the application (optional).
|
Previous (View Properties only)
|
Click to go to the previous trusted application in the list.
|
Next (View Properties only)
|
Click to go to the next trusted application in the list.
|
OK
|
Click to close the dialog box and save all changes.
|
Cancel
|
Click to close the dialog box and delete all changes.
|
Apply
|
Click to apply the changes on the tab.
|