Configure and manage exclusion settings for your endpoint security features.
Important
|
The Exclusions module manages exceptions used across endpoint protection features.
Exclusions prevents any specified rule ID or trusted program from security scans and
monitoring detections.
-
Rule exceptions allow you to manage and configure which rules you want to exclude from Anti-Malware scans.
-
The Trusted programs list allows you to specify programs you trust to exclude from scans, alerts, and other features. The following security modules and features apply the Trusted programs list:
-
Anti-Malware scans
-
Application Control lockdown mode
-
XDR for Endpoints (EDR)
-
Procedure
- To exclude certain rules from security scans, configure the Rule exceptions.
- Click Add rule.
- Specify the Rule ID for the rule you want to exclude.Rule IDs can be located by viewing event logs and copying the following fields:
-
For gray detection file-triggered logs, use the
malNamevalue. -
For gray detection behavior-triggered logs, use the
ruleNamevalue. -
For Behavior Monitoring, use the
ruleIdorruleNamevalue.
-
- To exclude programs you trust from scans and lockdown mode, select up to two Program lists under Trusted programs list.You can configure and manage program lists in policy resources.
