Creating a security rule
In order to create a security rule in order to identify the miners processes, you need to perform several steps:
1. Start the client console and go to the Security Center.
2. Add a new "General" security rule:

3. Toggle the radio button to the "or" block
4. Specify the operation type "Process - File name - Contains":

5. Specify the name of the process-miner and click "Add Condition":

6. In a similar way, indicate the names of the necessary processes *. For example:

7. Click "OK" after adding the required process-miners.
Note: "*" and "?" characters are allowed. For example: "Process - File name - Contains - *miner*"
* - The list of the most popular miners: ccminer.exe, cgminer.exe, cudaminer.exe, EthDcrMiner64.exe, ethminer.exe, excavator.exe, gominer.exe, GUIminer.exe, miner.exe, nheqminer.exe, NiceHash Miner 2 .exe, NsCpuCNMiner64.exe, NsGpuCNMiner.exe, PascalCoinMiner.exe, sgminer.exe, xmr-stak-cpu.exe, ZecMiner64.exe.