You can define applications as trusted to grant them access to encrypted files. This
is for example necessary to enable antivirus software to scan encrypted files.
You can also define applications as ignored to exempt them from transparent file
encryption/decryption. For example, if you define a backup program as an ignored
application, encrypted data backed up by the program remains encrypted.
processes will not be trusted/ignored.
Note: The Trusted Applications and Ignored
Applications policy settings are machine settings. The policy must
therefore be assigned to machines, not to users. Otherwise the settings do not