Previous Topic: Bypassing Real Paths

Next Topic: Bypass Ports for Network Activity


Bypassing Trusted Process Authorization

CA Access Control allows you to define programs as trusted. CA Access Control stores the trusted programs and their children programs in a table. All events (inbound and outbound) related to trusted processes (and their corresponding ports) are permitted without authorization as part of a full network bypass.

To specify these programs, use the SPECIALPGM class: