Views:
Specify which directories, files, and file extensions to exclude from the malware scan. For real-time scans, you can also exclude process image files.
Examples of files and folders to exclude:
  • If you are creating a malware scan configuration for a Microsoft Exchange server, exclude the SMEX quarantine folder to avoid re-scanning files that have already been confirmed to be malware.
  • If you have large VMware images, exclude the directory containing these images if you experience performance issues.
Tip
Tip
You can also exclude files from Anti-Malware scanning when they are signed by a trusted digital certificate. This type of exclusion is defined in policy or computer settings. (See Exclude files signed by a trusted certificate.)
To exclude directories, files, and process image files, create a list that uses patterns to identify the item to exclude.

Procedure

  1. Open the policy or computer security configuration.
    • To edit a policy, go to Policies and double-click the policy you want to edit.
    • To edit a computer, go to Computers and double-click the computer you want to edit.
  2. In the configuration screen, go to Anti-MalwareExclusions.
  3. Choose which scan mode to configure.
    • Real-time: Configure inclusions for real-time scans.
    • Scheduled: Configure inclusions for scheduled scans.
    • Manual: Configure inclusions for manually triggered scans.
    You can choose different inclusion lists for each scan mode. Some options are only available for real-time scans.
  4. For real-time scans, you can configure Recommended Exclusions to allow the agent to automatically assign exclusions based on your environment.
    Note
    Note
    Recommended Exclusions is a TrendAI Vision One™ Endpoint Security Pro feature. Enabling the feature might require additional credits. For more information about credit usage in Endpoint Security, see How are credits calculated for TrendAI Vision One™ Endpoint Security?
    This feature can only be configure in Policies, not on individual computers.
    • Yes: Allow agents to automatically assign application-based recommended exclusions.
    • No: Disable the feature.
  5. For real-time scans, you can configure the Assigned Recommended Exclusions list to manually set which recommended applications should be excluded from scans.
    Assigned Recommended Exclusions include both commonly trusted applications and applications which might be added by Recommendation Scans. Configuring this list does not require additional credits.
    This feature can only be configure in Policies, not on individual computers.
    1. Click Assign/Unassign.
    2. Select which applications you want to exclude from scans.
    3. To remove applications, clear the selection.
  6. Configure the exclusion lists.
    You can configure the following lists:
    • File List: Select a list to exclude specified files from the malware scan. For more information, see Syntax of file lists.
    • Directory List: Select a list to exclude specified directories from the malware scan. For more information, see Syntax for directory lists.
    • File Extension List: Select a list to exclude specified file types from the malware scan. For more information, see Syntax of file extension lists.
    • Process Image File List: Only available for real-time scans. Select a list to exclude specified process image files from the malware scan. Syntax of process image file lists.
    Each list provides the following actions:
    • To disable exclusions for that list type, set the selection to Select ... List.
    • To specify which lists to exclude from a scan, select a list and click Add.
    • To create a new list, select New....
    • To edit a selected list, click the edit icon (edit_icon=e7185c2d-6f93-4c2e-b948-df234b411a9d.png).
    • To remove a selected list, click the delete icon (trash_icon=0eda34e9-d4e0-4faa-bfbf-a8c120f1ba1c.png).
  7. Click OK.