Detection Exclusions
This functionality allows you to exclude objects from cleaning by filtering the detection name, object path or its hash. Drag-and-drop can be used to add a new detection exclusion by clicking the file or folder, moving the mouse pointer to the marked area while keeping the mouse button pressed, and then releasing it.
When setting up detection exclusions particular exclusion criteria need to be specified. A valid detection name or SHA-1 hash should be provided. For a valid detection name or SHA-1 hash, see Log files and then select Detections from the Log files drop-down menu. This is useful when a false positive sample is being detected in ESET Cyber Security. Exclusions for real infiltrations are very dangerous, consider excluding only affected files or directories for a temporary period of time. Exclusions apply also to Potentially unwanted applications, potentially unsafe applications and suspicious applications.
There are the following types of exclusion criteria:
•Exact File - excludes a file based on a specified SHA-1 hash, regardless of the file type, location, name, or extension.
•Detection - exclude each file by its detection name.
•Path & Detection - exclude each file by its detection name and path, including file name. (e.g.,file:/Users/documentation/Downloads/eicar_com.zip)
You should only use detection exclusions if you are experiencing serious problems with detecting something like malware because excluding malware from scanning decreases overall protection. |