Modern antivirus packages installed by users on Windows systems very often behave very unpredictably, recognizing some files, folders or web pages as potentially dangerous. Some programs may be identified as unwanted software. Of course, this does not apply to all antiviruses, since most often problems are observed only with Avast packages. But popular Eset protectors can also sometimes require manual user intervention.
Let's decide together how to add files, folders and installed programs to Eset to exceptions, including those that may require access to certain Internet resources in the process. There can be several options, but it all depends on which object and for what purposes it is necessary to exclude from the list of mandatory scans in both automatic and manual mode.
How to add folders to the Eset NOD32 exception when scanning a disk?
The most primitive method of setting the ignore of checking an object or group of objects is to run a selective scan, in which only those disks or directories for which the verification will be performed after the start of the process should be checked in the disk selection window with all their contents.
However, this is inconvenient in the sense that, by default, real-time file system protection is active, and the antivirus itself monitors system security anyway.
How to add files and folders to exceptions in Eset?
It is much easier to indicate to the antivirus user selected directories or files that will be ignored by absolutely all built-in protective modules (both the main antivirus and the additional firewall, which is present in the Smart Security and Internet Security modifications). To do this, you need to call the advanced settings section using the PCM menu, which is called up on the antivirus icon in the system tray, and then click on the settings change link in the exceptions box and click the add object button.
Now you can select either the entire disk (partition), or a separate directory, or some file, and then save the installed options.
Now let's see how to add only files of a certain type or format to exceptions in Eset. To do this, when specifying a disk or folder, you must use the extension task, highlighting it on the left with an asterisk. For example, in the system section, you need to exclude all DOC format files from the scan list.
In this case, you must specify the sequence shown in the image above.
Alternative Exception List Access Method
And a few more words about how to add objects selected by the user to the exception in Eset, but using alternative access to the necessary antivirus settings. Similarly to the previous example, you can use the main program window with the option to edit the file system protection settings in real time, which are located in the settings section of the main menu on the left.
After clicking on the arrow to go to custom options in the protection unit, you will need to open the drop-down list and select the exception change in it. After that, the same window for adding a new element that was presented in the previous example will appear.
To manage exceptions in terms of Internet access, a block of relevant parameters is used, which is located in the same section as the file system protection tools. Also, management can be carried out at the level of URLs, where addresses with allowed access are registered.
Note: when performing on-demand scanning, in the scan options you must definitely activate the exclusion checkpoint!
Options for disabling some protection modules
Finally, with basic questions about how to add custom objects to Eset to exceptions that are obviously not dangerous (for example, hacked programs with key or license generators like KeyGen.exe), clarity has been introduced. It remains to say that in some cases it may be advisable to disable security features in the form of monitoring the security of the file system and filtering traffic at the firewall level.
In this situation, you can either suspend protection for a certain period of time (for example, when downloading files from the Internet), or deactivate only the firewall (allow all traffic). But such actions are extremely unsafe, therefore it is strongly recommended to activate full protection at the end of downloads, installing applets, etc.