Configure and manage the Exclusions module settings.
Important
  | 
The Exclusions module manages exceptions used across endpoint protection features.
                  Exclusions prevents any specified rule ID or trusted program from security scans and
                  monitoring detections.
Procedure
- To exclude certain rules from security scans, configure the Rule exceptions.
- Click Add rule.
 - Specify the Rule ID for the rule you want to exclude.Rule IDs can be located by viewing event logs and copying the following fields:
- 
For gray detection file-triggered logs, use the
malNamevalue. - 
For gray detection behavior-triggered logs, use the
ruleNamevalue. - 
For Behavior Monitoring, use the
ruleIdorruleNamevalue. 
 - 
 
 - To exclude programs you trust from scans and lockdown mode, select a Program list under Trusted programs list.
 
		