Fortinet Document Library

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:


Table of Contents

Administration Guide

Viewing applications protected from exploits

When you view the list of applications, you can use the following button names to determine which applications are protected from exploits:

  • The applications with an Exclude button beside their names are protected from evasive exploits.
  • The applications with an Unexclude button beside their names are not protected from evasive exploits. You can protect the application by clicking the Unexclude button. See Excluding applications from protection.

See Viewing detected exploit attempts.

To view protected applications:
  1. From the Malware Protection tab, click the Settings icon. Scroll to AntiExploit and expand the Exclusion List.

    The list of protected applications displays.

Viewing applications protected from exploits

When you view the list of applications, you can use the following button names to determine which applications are protected from exploits:

  • The applications with an Exclude button beside their names are protected from evasive exploits.
  • The applications with an Unexclude button beside their names are not protected from evasive exploits. You can protect the application by clicking the Unexclude button. See Excluding applications from protection.

See Viewing detected exploit attempts.

To view protected applications:
  1. From the Malware Protection tab, click the Settings icon. Scroll to AntiExploit and expand the Exclusion List.

    The list of protected applications displays.