Does anyone happen to have some useful documentation or a resource on the proper method to exclude processes within Linux Threat Prevention? I'm unsure if it's by actually adding the process name, for example:
or if I need the full directory from which the binary is running:
Any help would be greatly appreciated!
Solved! Go to Solution.
Sorry to bring this back up, so I understand that we have to use the full process path for process exclusions, are we able to use regex / dynamic syntax in order to exclude full folders of binaries? As an example: