Threats and exclusions. Trusted zone

This section contains information on how to protect your computer from various kinds of malware by expanding the list of detected threats, as well as information on how to exclude from the scan some most used applications and how to configure exclusion rules.

In this section:

About threats and exclusions

Selecting the detectable threat categories

About trusted zone

Creating a trusted zone

Creating an exclusion rule

Allowed file exclusion masks

Verdict exclusion masks permitted according to Virus Encyclopedia

Threats and exclusions. Trusted zone