Your company has digitally signed applications. You need to ensure that Microsoft Defender for Endpoint considers the digitally signed applications safe and never analyzes them. What should you create in the Microsoft Defender Security Center?
A. a custom detection rule
B. an allowed/blocked list rule
C. an alert suppression rule
D. an indicator