System Variable TRUSTEDPATHS
Specifies which folders are trusted to load and run executable files from them.
Values
Valid string specifications include:
- The file types listed below are loaded from the specified folders, if the variable is set to one or more folder paths in quotes and separated by semicolons.
- All subfolders of a specified location are trusted if the parent folder specification ends with a backslash and three dots (\...).
- No trusted folder paths in addition to the implicitly trusted ones are specified, if the variable is set to an empty string ("") or a period (".").
Implicitly trusted folder paths are:
- C:\Program Files
- C:\Program Files (x86)
- The folder which contains the binary files of the application
- The application data roaming folder for the software and version you use (%AppData%\<software_name>)
Malicious code can be included in files of the following types:
- .tx, .frx (C++ plugin files)
- .lsp, .mnl (Lisp files, Menu Lisp files)
- .scr files (script files)
- .net assemblies
- .dll files (dynamic link libraries)
- startup.rx file
Properties
| Type | String |
| Status | Read / Write |
| Saved | In the Registry |
Related Topics
Controlling Safety Options Against Malicious Files
Related Commands
Related Variables