Version: 3008.0.1.2506 and earlier
There are several binaries that should be allowed for execution by other security tool on targeted endpoints. You can do so by hash (found on the Download page within the Admin Panel) or by path:
The following paths may be used by Infocyte during collection:
Whitelisting via HASH
You can whitelist in your AV by HASH as well. Our HASHs do not change often but can always be found in the downloads page of Infocyte.
Some enterprises that deploy Infocyte will have existing investments in technologies that aim to prevent execution of unknown software or protect memory space of certain applications. These solutions can interfere with or cause endpoint scans to fail.
In the event any such technology (Whitelisting, HIPS) is deployed within the enterprise, it is recommended that exceptions or rules be created for scans to execute.
 HIPS - Host Intrusion Prevention System