Exclusions enable you to exclude files and folders from scanning. To ensure that all objects are scanned for threats, we recommend only creating exclusions when it is absolutely necessary.
However, there are situations where you may need to exclude an object, for example large database entries that would slow your computer during a scan or software that conflicts with the scan.
You can add files and folder to be excluded from scanning into the list of exclusions via Advanced setup (F5) > Detection engine > Exclusions > Files and folders to be excluded from scanning > Edit.
To exclude an object (path, threat or hash) from scanning, click Add and enter the path to an object or select it in the tree structure. You can also Edit or Delete selected entries.
Types of exclusions
Path – Path to excluded files and folders.
Detection (or Threat) – If there is a name of a detection / threat next to an excluded file, it means that the file is only excluded for the given threat, not completely. If that file becomes infected later with other malware, it will be detected by the antivirus module.
This type of exclusion can only be used for certain types of infiltration and it can be created either in the threat alert window reporting the infiltration (click Show advanced options and then select Exclude from detection), or by clicking Tools > Quarantine and then right-clicking the quarantined file and selecting Restore and exclude from scanning from the context menu.
Hash – Excludes a file based on specified hash (SHA1), regardless of the file type, location, name or its extension.