Exceptions

Objects in the exceptions list are automatically considered safe and are not added to the suspicious objects list. Manually add trustworthy objects or go to the Virtual Analyzer > Suspicious Objects screen and select suspicious objects that you consider harmless.

The following columns show information about objects in the exception list.

Table 1. Exceptions Columns

Column Name

Information

Added

Date and time Virtual Analyzer added the object to the Exceptions tab

Type

The object type (IP address, Domain, URL, or File SHA-1).

Object

The IP address, domain, URL, or SHA-1 hash value of the file

Source

The source (Apex Central, Deep Discovery Director, or local) that added the exception

Notes

Notes for the object.

Click the link to edit the notes.