ESET Online Help

Search English
Select the topic

Detection Exclusions

Detection exclusions allow you to exclude objects from cleaning by filtering the detection name, object path or hash. Drag-and-drop can be used to add a new detection exclusion by clicking the file or folder, moving the mouse pointer to the marked area while keeping the mouse button pressed, and then releasing it.

When setting up detection exclusions, specific exclusion criteria must be specified. A valid detection name or SHA-1 hash should be provided. For a valid detection name or SHA-1 hash, see Log files and select Detections from the Log files drop-down menu. This is useful when a false positive sample is detected in ESET Endpoint Security. Exclusions for real infiltrations are very dangerous; consider only excluding affected files or directories for a temporary period. Exclusions also apply to potentially unwanted, unsafe and suspicious applications.

There are the following types of exclusion criteria:

Exact File—excludes a file based on a specified SHA-1 hash, regardless of the file type, location, name or file extension

Detection—exclude each file by its detection name

Path & Detection—exclude each file by its detection name and path, including filename (e.g.,file:/Users/documentation/Downloads/eicar_com.zip)


warning

You should only use detection exclusions if you are experiencing serious problems with detecting malware because excluding malware from scanning decreases overall protection.