Avira AntiVir Premium Help |
|
Configuration :: Guard :: Scan
Exceptions
With these options you can configure exception objects for the Guard (on-access scan). The relevant objects are then not included in the on-access scan. The Guard can ignore file accesses to these objects during the on-access scan via the list of processes to be omitted. This is useful, for example, with databases or back-up solutions.
Processes to be omitted by Guard
All file accesses of processes in this list are excluded from monitoring by Guard.
Input box
Note
You can enter up to 20 processes.Warning:
Only the first 15 characters of the process name (including the file extension) are considered. If there are 2 processes with the same name, Guard excludes both processes from the monitoring.Warning
Please note that all file accesses by processes recorded in the list are excluded from the scan for viruses and unwanted programs! The Windows Explorer and the operating system itself cannot be excluded. A corresponding entry in the list is ignored.Add rule
With this button, you can add the process entered in the input box to the display window.
Delete
With this button you can delete a selected process from the display window.
File objects to be omitted for the Guard
All file accesses to objects in this list are excluded from monitoring by the Guard.
Note
The entries on the list must not result more than 6000 characters in total.Input box
The button opens a window in which you can select the file object to be excluded.
Add rule
With this button, you can add the file object entered in the input box to the display window.
Delete
With this button you can delete a selected file object from the display window.
Please observe the following points:
The file name can only contain the wildcards * (any number of characters) and ? (a single character).
Directory names must end with a backslash \, otherwise a file name is assumed.
The list is processed from top to bottom.
Individual file extensions can also be excluded (inclusive wildcards).
If a directory is excluded, all its sub-directories are automatically also excluded.
The longer the list is, the more processor time is required for processing the list for each access. Therefore, keep the list as short as possible.
In order to also exclude objects when they are accessed with short DOS file names (DOS name convention 8.3), the relevant short file name must also be entered in the list.
Note
A file name that contains wildcards may not be terminated with a backslash.
For example:
C:\Program Files\Application\applic*.exe\
This entry is not valid and not treated as an exception!
Note
In case of dynamic drives which are mounted as a directory on another drive, the alias of the operating system for the integrated drive in the list of the exceptions has to be used:
e.g. \Device\HarddiskDmVolumes\PhysicalDmVolumes\BlockVolume1\
If you use the mount point itself, for example, C:\DynDrive, the dynamic drive will be scanned nonetheless. You can determine the alias of the operating system to be used from the report file of Guard:
Note
You can locate the path Guard uses to scan for infected files in the Guard report file. Indicate exactly the same path in the list of exceptions. Proceed as follows: set the protocol function of Guard to Complete in the configuration under Guard :: Report. Now access the files, folders, mounted drives with the activated Guard. You can now read the path to be used from the Guard report file. The report file can be accessed in Control Center under Local protection :: Guard.Examples:
C:
C:\
C:\*.*
C:\*
*.exe
*.xl?
*.*
C:\Program Files\Application\application.exe
C:\Program Files\Application\applic*.exe
C:\Program Files\Application\applic*
C:\Program Files\Application\applic?????.e*
C:\Program Files\
C:\Program Files
C:\Program Files\Application\*.mdb