Skip to content

Commit 4e23cfb

Browse files
committed
Update configure-contextual-file-folder-exclusions-microsoft-defender-antivirus.md
1 parent 6bb0d2d commit 4e23cfb

File tree

1 file changed

+5
-13
lines changed

1 file changed

+5
-13
lines changed

defender-endpoint/configure-contextual-file-folder-exclusions-microsoft-defender-antivirus.md

Lines changed: 5 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -19,31 +19,23 @@ search.appverid: met150
1919

2020
# Contextual file and folder exclusions
2121

22-
**Applies to:**
23-
24-
- [Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
25-
- [Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
26-
27-
- Microsoft Defender for Business
28-
29-
- Microsoft Defender Antivirus
30-
31-
- Microsoft Defender for individuals
32-
3322
This article/section describes the contextual file and folder exclusions capability for Microsoft Defender Antivirus on Windows. This capability allows you to be more specific when you define under which context Microsoft Defender Antivirus shouldn't scan a file or folder, by applying restrictions.
3423

3524
## Overview
3625

37-
Exclusions are primarily intended to mitigate affects on performance. They come at the penalty of reduced protection value. These restrictions allow you to limit this protection reduction by specifying circumstances under which the exclusion should apply. Contextual exclusions aren't suitable for addressing false positives in a reliable way. If you encounter a false positive, you can submit files for analysis through the [Microsoft Defender](https://security.microsoft.com/) portal (subscription required) or through the [Microsoft Security Intelligence](https://www.microsoft.com/wdsi/filesubmission) website. For a temporary suppression method, consider creating a custom _allow_ indicator in [Microsoft Defender for Endpoint](indicator-file.md).
26+
Exclusions are primarily intended to mitigate affects on performance. They come at the penalty of reduced protection value. These restrictions allow you to limit this protection reduction by specifying circumstances under which the exclusion should apply. Contextual exclusions aren't suitable for addressing false positives in a reliable way. If you encounter a false positive, you can submit files for analysis through the [Microsoft Defender portal](https://security.microsoft.com/) (subscription required) or through the [Microsoft Security Intelligence](https://www.microsoft.com/wdsi/filesubmission) website. For a temporary suppression method, consider creating a custom _allow_ indicator in [Microsoft Defender for Endpoint](indicator-file.md).
3827

3928
There are four restrictions you can apply to limit the applicability of an exclusion:
4029

41-
- **File/folder path type restriction**. You can restrict exclusions to only apply if the target is a file, or a folder by making the intent specific. If the target is a file but the exclusion is specified to be a folder, it will not apply. Conversely, if the target is folder but the exclusion is specified to be a file, the exclusion will apply.
30+
- **File/folder path type restriction**. You can restrict exclusions to only apply if the target is a file, or a folder by making the intent specific. If the target is a file but the exclusion is specified to be a folder, it will not apply. Conversely, if the target is folder but the exclusion is specified to be a file, the exclusion applies.
31+
4232
- **Scan type restriction**. Enables you to define the required scan type for an exclusion to apply. For example, you only want to exclude a certain folder from Full scans but not from a "resource" scan (targeted scan).
33+
4334
- **Scan trigger type restriction**. You can use this restriction to specify that the exclusion should only apply when the scan was initiated by a specific event:
4435
- on demand
4536
- on access
4637
- or originating from behavioral monitoring
38+
4739
- **Process restriction**. Enables you to define that an exclusion should only apply when a file or folder is being accessed by a specific process.
4840

4941
## Configuring restrictions

0 commit comments

Comments
 (0)