Reference Guide
Manage Policies
226
Exclusions String
String - Comma-separated list of parameters
Specify files, folders, and drives to exclude from scanning.
Comma separated list of parameters:
<ExclusionType>,<ExclusionData>,<ExcludeSubfolders
(only applies to FileOrFolder type)>
Possible values: <FileOrFolder|FileType|ModifiedAge|
AccessedAge|CreatedAge>,<PathToFileOrFolder|
FileType|Age>,<true|false>
Examples:
FileOrFolder,C:\Users,false
FileType,xml,false
FileType,mp?,false
ModifiedAge,120,true
AccessedAge,150,false
CreatedAge,300,true
Threat First
Response
Clean file
Clean file
Delete file
Continue scanning
Specifies the first action for the scanner to take when a threat is detected.
Clean files - Removes the threat from the detected file, if possible.
Delete files - Deletes files with potential threats.
Continue scanning - Continues scanning files when a threat is detected. The
scanner does not move items to the quarantine.
Threat First
Response Fails
Delete file
Clean file
Delete file
Continue scanning
Specifies the action for the scanner to take when a threat is detected if the
first action fails.
Clean files - Removes the threat from the detected file, if possible.
Delete files - Deletes files with potential threats.
Continue scanning - Continues scanning files when a threat is detected. The
scanner does not move items to the quarantine.
Exploit
First
Response
Clean file
Clean file
Delete file
Continue scanning
Specifies the first action for the scanner to take when a potential exploit is
detected.
Clean files - Removes the threat from the detected file, if possible.
Delete files - Deletes files with potential threats.
Continue scanning - Continues scanning files when a threat is detected. The
scanner does not move items to the quarantine.
Exploit
First
Response
Fails
Delete file
Clean file
Delete file
Continue scanning
Specifies the action for the scanner to take when an exploit is detected if the
first action fails.
Clean files - Removes the threat from the detected file, if possible.
Delete files - Deletes files with potential threats.
Continue scanning - Continues scanning files when a threat is detected. The
scanner does not move items to the quarantine.