How to add objects ignored for checking and/or blocking to Eset exclusions?

Table of contents:

How to add objects ignored for checking and/or blocking to Eset exclusions?
How to add objects ignored for checking and/or blocking to Eset exclusions?
Anonim

Modern anti-virus packages installed by users on Windows systems very often behave quite unpredictably, recognizing some files, folders or Internet pages as potentially dangerous. Some programs may be identified as unwanted software. Of course, this does not apply to absolutely all antiviruses, since most often problems are observed only with Avast packages. But popular protection products from Eset can also sometimes require manual user intervention.

Let's decide together how to add files, folders and installed programs to exceptions in Eset, including those that may require access to certain Internet resources during operation. There may be several options for action, but it all depends on what kind of object and for what purposes.must be excluded from the list of mandatory scans in both automatic and manual modes.

How to add folders to the Eset NOD32 exclusion when scanning a disk?

The most primitive method of ignoring the scan of some object or group of objects is to launch a selective scan, in which in the disk selection window with all their contents, you must select only those disks or directories for which the scan will be performed after the start of the process.

Selecting objects for mandatory scanning
Selecting objects for mandatory scanning

However, this is inconvenient in the sense that real-time file system protection is active by default, while the antivirus itself monitors the system's security anyway.

How to add files and folders to exceptions in Eset?

It's much easier to tell the antivirus the user-selected directories or files that will be ignored by absolutely all built-in protection modules (both the main antivirus and the additional firewall that is present in Smart Security and Internet Security modifications). To do this, you need to call the advanced settings section using the RMB menu called on the antivirus icon in the system tray, then in the exceptions block click on the link for changing settings and click on the add object button.

Adding a folder to the exclusion list
Adding a folder to the exclusion list

Now you can select either the entire disk (partition), or a separate directory, or some file, and then save the set options.

Now let's see how to add only files to exclusions in Esetsome particular type or format. To do this, when specifying a drive or folder, you must use the extension task, highlighting it on the left with an asterisk. For example, in the system partition, you need to exclude all files in the DOC format from the scan list.

Adding files of the same format to exclusions
Adding files of the same format to exclusions

In this case, you must specify the sequence shown in the image above.

Alternative method for accessing the exclusion list

And a few more words about how to add user-selectable objects to the exception in Eset, but using alternative access to the necessary antivirus settings. Similarly to the previous example, you can use the main program window with the choice of editing the real-time file system protection settings, which are located in the settings section of the main menu on the left.

Alternative Method for Accessing Exceptions
Alternative Method for Accessing Exceptions

After clicking on the arrow to go to custom options in the protection block, you will need to open the drop-down list and select the change of exclusions in it. After that, the same window for adding a new element will appear, which was presented in the previous example.

Adding URLs to Exceptions
Adding URLs to Exceptions

To manage exceptions in terms of Internet access, a block of appropriate parameters is used, located in the same section as the file system protection toolkit. Also, management can be done at the URL level, where addresses with allowed access are registered.

Activationskipping exceptions
Activationskipping exceptions

Note: when performing an on-demand scan, you must enable the exception skip option in the scan options!

Options to disable some protection modules

Finally, with the main questions about how to add user objects to Eset exceptions that are obviously not dangerous (for example, hacked programs with key generators or licenses like KeyGen.exe), clarity has been made. It remains to be said that in some cases it may be advisable to disable protections in the form of monitoring the security of the file system and filtering traffic at the firewall level.

Disable firewall in Eset Internet Security
Disable firewall in Eset Internet Security

In this situation, you can either suspend protection for a certain period of time (for example, when downloading files from the Internet), or disable only the firewall (allow all traffic). But such actions are extremely unsafe, so it is highly recommended to activate full protection after downloads, applets installation, etc.

Popular topic

Editor's choice

  • IPv6 protocol: setup on Windows systems
    IPv6 protocol: setup on Windows systems

    Probably, many users of computer systems, delving into the network settings, noticed that in the list of protocols, in addition to the well-known IPv4, there is also the sixth version (IPv6)

  • View history on computer
    View history on computer

    Today you can learn about almost all the actions taken on the computer. It's about browsing history

  • Computer technology hardware: definition, description and types
    Computer technology hardware: definition, description and types

    Modern computers to ensure maximum performance and correct operation use hardware and software that are very interconnected and clearly interact in different directions. Now let's touch on the consideration of hardware, since initially it is they who occupy a dominant position in ensuring the operability of any computer or even mobile system

  • Keyboard shortcuts and the evolution of operating systems
    Keyboard shortcuts and the evolution of operating systems

    It takes about a minute to copy or move a file from one location to another using the menu system. The developers introduced a keyboard shortcut that replaced all these actions and made it possible to reduce the time of this common operation by 3 or more times. True, for this it was necessary to slightly modernize the keyboard: new keys were added - "Ctrl", and later - "Windows"

  • If the torrent does not download
    If the torrent does not download

    An article for those who consider the ability to download files from torrent trackers a convenience, not an echo of the past. Not only the unavailability of "high-speed" tariff plans is the reason for the choice, but also personal preferences