Configuration :: Guard :: Scan

Exceptions

With these options you can configure exception objects for the Guard (on-access scan). The relevant objects are then not included in the on-access scan. The Guard can ignore file accesses to these objects during the on-access scan via the list of processes to be omitted. This is useful, for example, with databases or back-up solutions.

Processes to be omitted by Guard

All file accesses of processes in this list are excluded from monitoring by Guard.

Input box

In this box, you can enter the name of the process that is not included in the on-access scan. No process is entered as the default setting. The names of the individual process can most easily be obtained via the task manager. The "Processes" tab in the task manager contains the names of all currently active processes. Select "your" process and enter its name under "Image Name".

Note
You can enter up to 20 processes.

Warning:
Only the first 15 characters of the process name (including the file extension) are considered. If there are 2 processes with the same name, Guard excludes both processes from the monitoring.

Warning
Please note that all file accesses by processes recorded in the list are excluded from the scan for viruses and unwanted programs! The Windows Explorer and the operating system itself cannot be excluded. A corresponding entry in the list is ignored.

Add rule

With this button, you can add the process entered in the input box to the display window.

Delete

With this button you can delete a selected process from the display window.

File objects to be omitted for the Guard

All file accesses to objects in this list are excluded from monitoring by the Guard.

Note
The entries on the list must not result more than 6000 characters in total.

Input box

In this box you can enter the name of the file object that is not included in the on-access scan. No file object is entered as the default setting.

The button opens a window in which you can select the file object to be excluded.

Add rule

With this button, you can add the file object entered in the input box to the display window.

Delete

With this button you can delete a selected file object from the display window.

Please observe the following points:

Note
A file name that contains wildcards may not be terminated with a backslash.

For example:

C:\Program Files\Application\applic*.exe
\

This entry is not valid and not treated as an exception!

 

 

Note
In case of dynamic drives which are mounted as a directory on another drive, the alias of the operating system for the integrated drive in the list of the exceptions has to be used:
e.g. \Device\HarddiskDmVolumes\PhysicalDmVolumes\BlockVolume1\
If you use the mount point itself, for example, C:\DynDrive, the dynamic drive will be scanned nonetheless. You can determine the alias of the operating system to be used from the report file of Guard:  

 

Note
You can locate the path Guard uses to scan for infected files in the Guard report file. Indicate exactly the same path in the list of exceptions. Proceed as follows: set the protocol function of Guard to Complete in the configuration under Guard :: Report. Now access the files, folders, mounted drives with the activated Guard. You can now read the path to be used from the Guard report file. The report file can be accessed in Control Center under Local protection :: Guard.

Examples:

C:

C:\

C:\*.*

C:\*

*.exe

*.xl?

*.*

C:\Program Files\Application\application.exe

C:\Program Files\Application\applic*.exe

C:\Program Files\Application\applic*

C:\Program Files\Application\applic?????.e*

C:\Program Files\

C:\Program Files

C:\Program Files\Application\*.mdb