System Variable TRUSTEDPATHS

Specifies which folders are trusted to load and run executable files from them.

Values

Valid string specifications include:

  • The file types listed below are loaded from the specified folders, if the variable is set to one or more folder paths in quotes and separated by semicolons.

  • All subfolders of a specified location are trusted if the parent folder specification ends with a backslash and three dots (...).

  • No trusted folder paths in addition to the implicitly trusted ones are specified, if the variable is set to an empty string (“”) or a period (“.”).

Implicitly trusted folder paths are:

  • C:\Program Files

  • C:\Program Files (x86)

  • The folder which contains the binary files of the application

  • The application data roaming folder for the software and version you use (%AppData%\<software_name>)

Malicious code can be included in files of the following types:

  • .tx, .frx (C++ plugin files)

  • .lsp, .mnl (Lisp files, Menu Lisp files)

  • .scr files (script files)

  • .net assemblies

  • .dll files (dynamic link libraries)

  • startup.rx file

Properties

Type

String

Status

Read / Write

Saved

In the Registry

Related Topics

Controlling Safety Options Against Malicious Files

Related Commands

SafetyOptions

Related Variables

SECURELOAD

LEGACYCODESEARCH

ACADLSPASDOC