
32
Lists of files to be scanned are fixed for each group.
Scan priority – A level of priority to use for the scan start:
Normal – at an average system load,
Lower – at a low system load,
Lowest – when the system load is the lowest possible,
When idle – the task will be performed only when the system is idle.
4.1.1.5 Exclusions by path
Exclusions enable you to exclude files and folders from scanning. We do not recommend that you alter these options,
to ensure that all objects are scanned for threats. However, there are situations where you may need to exclude an
object. For example, large database entries that would slow down the computer during the scan or software that has
conflicts with the scan.
Path – Path to excluded files and folders.
Threat – If there is a name of a threat next to an excluded file, it means that the file is only excluded for the given threat,
not completely. Therefore if that file becomes infected later with other malware, it will be detected by the antivirus
module. This type of exclusion can only be used for certain types of infiltrations and it can be created either in the threat
alert window reporting the infiltration (click Show advanced options and then select Exclude from detection), or in
Setup > Quarantine using the context menu option Restore and exclude from detection on the quarantined file.
Add... – Excludes objects from detection.
Edit... – Enables you to edit selected entries.
Remove – Removes selected entries.
To exclude an object from scanning:
1. Click Add...,
2. Enter the path to an object or select it in the tree structure.
You can use wildcards to cover a group of files. A question mark (?) represents a single variable character whereas an
asterisk (*) represents a variable string of zero or more characters.
Comentarios a estos manuales