Avira AntiVir Server Help
With these options you can configure exception objects for the Guard (on-access scan). The relevant objects are then not included in the on-access scan. The Guard can ignore file accesses to these objects during the on-access scan via the list of processes to be omitted. This is useful, for example, with databases or back-up solutions.
Processes to be omitted by Guard
All file accesses of processes in this list are excluded from monitoring by Guard.
In this box, you can enter the name of the process that is not included in the on-access scan. No process is entered as the default setting. The names of the individual process can most easily be obtained via the task manager. The "Processes" tab in the task manager contains the names of all currently active processes. Select "your" process and enter its name under "Image Name".
You can enter up to 20 processes.
Only the first 15 characters of the process name (including the file extension) are considered. If there are 2 processes with the same name, Guard excludes both processes from the monitoring.
Please note that all file accesses by processes recorded in the list are excluded from the scan for viruses and unwanted programs! The Windows Explorer and the operating system itself cannot be excluded. A corresponding entry in the list is ignored.
With this button, you can add the process entered in the input box to the display window.
With this button you can delete a selected process from the display window.
File objects to be omitted for the Guard
All file accesses to objects in this list are excluded from monitoring by the Guard.
The entries on the list must not result more than 6000 characters in total.
In this box you can enter the name of the file object that is not included in the on-access scan. No file object is entered as the default setting.
The button opens a window in which you can select the file object to be excluded.
With this button, you can add the file object entered in the input box to the display window.
With this button you can delete a selected file object from the display window.
Please observe the following points:
The file name can only contain the wildcards * (any number of characters) and ? (a single character).
Directory names must end with a backslash \, otherwise a file name is assumed.
The list is processed from top to bottom.
Individual file extensions can also be excluded (inclusive wildcards).
If a directory is excluded, all its sub-directories are automatically also excluded.
The longer the list is, the more processor time is required for processing the list for each access. Therefore, keep the list as short as possible.
In order to also exclude objects when they are accessed with short DOS file names (DOS name convention 8.3), the relevant short file name must also be entered in the list.
In order to exclude files and folders on connected network drives from the Guard scan, specify the UNC path you use to connect the network drive in the list of exceptions.
\\<Computer name>\<Enable>\ - OR - \\<IP address>\<Enable>\
A file name that contains wildcards may not be terminated with a backslash.
This entry is not valid and not treated as an exception!
With regard to exceptions on connected network drives, please note the following: if you use the drive letter of the connected network drive, the files and folders specified are NOT excluded from the Guard scan. If the UNC path in the list of exceptions differs from the UNC path used to connect to the network drive (IP address specification in the list of exceptions – specification of computer name for connection to network drive), the specified folders and files are NOT excluded by the Guard scan. Locate the relevant UNC path in the Guard report file.
In case of dynamic drives which are mounted as a directory on another drive, the alias of the operating system for the integrated drive in the list of the exceptions has to be used:
If you use the mount point itself, for example, C:\DynDrive, the dynamic drive will be scanned nonetheless. You can determine the alias of the operating system to be used from the report file of Guard:
You can locate the path Guard uses to scan for infected files in the Guard report file. Indicate exactly the same path in the list of exceptions. Proceed as follows: set the protocol function of Guard to Complete in the configuration under Guard :: Report. Now access the files, folders, mounted drives or connected network drives with the activated Guard. You can now read the path to be used from the Guard report file. The report file can be accessed in AntiVir Server Console under Local protection :: Guard.