[KB7833] Exclude files or folders on endpoints from Real-time scanning using ESET PROTECT


Required user permissions

This article assumes that you have the appropriate access rights and permissions to perform the tasks below.

If you use the default Administrator user or are unable to perform the tasks below (the option is unavailable), create a second administrator user with all access rights.

  • File-level scanning of some email servers, backup software, Customer Relationship Management (CRM) software, etc. causes abnormal system behavior
  • Use ESET Configuration Editor to create a configuration that excludes specific applications or folders from Real-time scanning



 Endpoint users: Perform these steps on individual client workstations

Add a Performance exclusion

  1. Open the ESET PROTECT Web Console in your web browser and log in.

  2. Click Policies.
  3. Click your policy for client computers and select Edit.
Figure 1-1


  1. Click Settings, click Detection Engine → Exclusions, and then click Edit next to Performance exclusions.
Figure 1-2


  1. Click Add, type the directory that you want to exclude from scanning into the Path field, and add a comment for the exclusion in the Comment field. Click OK. Make sure the file path for your exclusion is in the correct format, for example, "C:\Users\[username]\Documents\file.exe".
    Do not use wildcards for directories!

    Wildcards for directories in paths are not supported. Read more about exclusions and wildcards here.

Figure 1-3
  1. Click Save when you are finished adding exclusions.

  2.  Click Finish to save your changes.

Add a Detection exclusion

  1. Open the ESET PROTECT Web Console in your web browser and log in.

  2. Click the Detections icon and then click the detection you want to exclude.
Figure 2-1
  1. Select Create Exclusion.
Figure 2-2
  1. Select the desired Exclusion criteria and click Add. Visit our online help topic for more information about Exclusion criteria.
Figure 2-3
  1. Click More (...) → Exclusions to manage the Detection exclusion.
Figure 2-4