Issue
- File-level scanning of some email servers, backup software, Customer Relationship Management (CRM) software, etc. causes abnormal system behavior
- Use ESET Configuration Editor to create a configuration that excludes specific applications or folders from Real-time scanning
- Processes Exclusions
- Detection Exclusions
Solution
Only create exclusions when it is absolutely necessary
To ensure that all objects are scanned, we recommend only creating exclusions when it is absolutely necessary. Situations where you may need to exclude an object might include scanning large database entries that would slow your computer during a scan or software that conflicts with the scan.
Using wildcards
Use wildcards to exclude a group of files. Use a question mark (?) to exclude a single character and an asterisk (*) to exclude a string of characters. We recommend that you do not use wildcards in the middle of a path. For more information about using wildcards, visit our Online Help topic.
If you are still experiencing issues with your application, it is possible that you need to exclude it from Web access protection if it connects to the internet. Visit Unblock a safe website on an individual workstation in ESET endpoint products.
Detection Exclusions
To add an exclusion using a detection name or SHA1 file hash, use Detection Exclusions. Excluding by detection name or SHA1 file hash poses a high-security risk and is recommended only for advanced users.