Exclusions enable you to exclude files and folders from scanning. To ensure that all objects are scanned for threats, we recommend only creating exclusions when it is absolutely necessary. Situations where you may need to exclude an object might include scanning large database entries that would slow your computer during a scan or software that conflicts with the scan (for example, backup software).


Not to be confused with Excluded extensions.

To exclude an object from scanning, click Add and enter the path to an object or select it in the tree structure. You can also Edit or Delete selected entries.


A threat within a file will not be detected by the Real-time file system protection module or Computer scan module if that file meets the criteria for exclusion from scanning.

Exclusions window displays the Path to excluded files and folders.


If the name of a threat is displayed next to an excluded file, it means that the file is only excluded for the given threat. If that file becomes infected later with other malware, it will be detected by the Antivirus module. This type of exclusion can only be used for certain types of infiltrations, and can be created either in the threat alert window reporting the infiltration (click Show advanced options and then select Exclude from detection), or select Tools > Quarantine, right-clicking the quarantined file and then selecting Restore and exclude from scanning from the context menu.