A company uses a remote administration tool that is detected as Hacktool.KeyLoggPro and quarantined by
Symantec Endpoint Protection (SEP).
Which step can an administrator perform to continue using the remote administration tool without detection
by SEP?