System Variable TRUSTEDPATHS¶
Specifies which folders are trusted to load and run executable files from them.
Values
Valid string specifications include:
The file types listed below are loaded from the specified folders, if the variable is set to one or more folder paths in quotes and separated by semicolons.
All subfolders of a specified location are trusted if the parent folder specification ends with a backslash and three dots (...).
No trusted folder paths in addition to the implicitly trusted ones are specified, if the variable is set to an empty string (“”) or a period (“.”).
Implicitly trusted folder paths are:
C:\Program Files
C:\Program Files (x86)
The folder which contains the binary files of the application
The application data roaming folder for the software and version you use (%AppData%\<software_name>)
Malicious code can be included in files of the following types:
.tx, .frx (C++ plugin files)
.lsp, .mnl (Lisp files, Menu Lisp files)
.scr files (script files)
.net assemblies
.dll files (dynamic link libraries)
startup.rx file
Properties
Type |
String |
Status |
Read / Write |
Saved |
In the Registry |
Related Topics
Controlling Safety Options Against Malicious Files
Related Commands
Related Variables