Anti-virus and HIPS policy / Authorizing items for use |
For more information, see Managing roles and sub-estates.
If you have enabled one or more HIPS options (for example, suspicious behavior detection, buffer overflow detection, or suspicious file detection), but you want to use some of the items detected, you can authorize them as follows: