Previous Topic: Bypassing Real PathsNext Topic: Bypass Ports for Network Activity


Bypassing Trusted Process Authorization

CA ControlMinder allows you to define programs as trusted. CA ControlMinder stores the trusted programs and their children programs in a table. All events (inbound and outbound) related to trusted processes (and their corresponding ports) are permitted without authorization as part of a full network bypass.

To specify these programs, use the SPECIALPGM class: