Authorize suspicious items
If you use role-based administration:
- You must have the Policy setting - anti-virus and HIPS right to perform this task.
- You cannot edit a policy if it is applied outside your active sub-estate.
For more information, see Managing roles and sub-estates.
If you have enabled one or more HIPS options (for example, suspicious behavior detection, buffer overflow detection, or suspicious file detection), but you want to use some of the items detected, you can authorize them as follows:
The suspicious application appears in the Authorized applications list.