Configure and manage the Exclusions module settings.
![]() |
Important
|
The Exclusions module manages exceptions used across endpoint protection features.
Exclusions prevents any specified rule ID or trusted program from security scans and
monitoring detections.
Procedure
- To exclude certain rules from security scans, configure the Rule exceptions.
- Click Add rule.
- Specify the Rule ID for the rule you want to exclude.Rule IDs can be located by viewing event logs and copying the following fields:
-
For gray detection file-triggered logs, use the
malName
value. -
For gray detection behavior-triggered logs, use the
ruleName
value. -
For Behavior Monitoring, use the
ruleId
orruleName
value.
-
- To exclude programs you trust from scans and lockdown mode, select a Program list under Trusted programs list.