[KB6985] Exclude files or folders from Real-time scanning on an individual workstation in ESET endpoint products

Issue

  • File-level scanning of some email servers, backup software, Customer Relationship Management (CRM) software, etc. causes abnormal system behavior
  • Use ESET Configuration Editor to create a configuration that excludes specific applications or folders from Real-time scanning
  • Processes Exclusions
  • Detection Exclusions

Solution

Only create exclusions when it is absolutely necessary

To ensure that all objects are scanned, we recommend only creating exclusions when it is absolutely necessary. Situations where you may need to exclude an object might include scanning large database entries that would slow your computer during a scan or software that conflicts with the scan.

ESET PROTECT On-Prem users: Perform these steps in ESET PROTECT On-Prem

  1. Open the main program window of your ESET Windows product.

  2. Press the F5 key to access Advanced setup. 
     
  3. Click Detection Engine, expand Exclusions and then click Edit next to Performance exclusions.
Figure 1-1
  1. Click Add and click Browser (...).
Figure 1-2
  1. Use the directory tree to browse for the file or folder you want to exclude, select it and then click OK.
Figure 1-3
  1. Click OKOK to save the exclusion.
Figure 1-4

Using wildcards

Use wildcards to exclude a group of files. Use a question mark (?) to exclude a single character and an asterisk (*) to exclude a string of characters. We recommend that you do not use wildcards in the middle of a path. For more information about using wildcards, visit our Online Help topic.

If you are still experiencing issues with your application, it is possible that you need to exclude it from Web access protection if it connects to the internet. Visit Unblock a safe website on an individual workstation in ESET endpoint products.

Detection Exclusions

To add an exclusion using a detection name or SHA1 file hash, use Detection Exclusions. Excluding by detection name or SHA1 file hash poses a high-security risk and is recommended only for advanced users.