Fortinet Document Library

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:


Table of Contents

Administration Guide

Viewing applications protected from exploits

When you view the list of applications, you can use the following buttons to determine which applications are protected from exploits:

  • FortiClient protects applications with an Exclude button beside their name from evasive exploits.
  • FortiClient does not protect applications with an Unexclude button from evasive exploits. You can protect the application by clicking the Unexclude button. See Excluding applications from protection.

See Viewing detected exploit attempts.

From the Malware Protection tab, click the Settings icon. Scroll to AntiExploit and expand the Exclusion List. The list of protected applications displays.

Viewing applications protected from exploits

When you view the list of applications, you can use the following buttons to determine which applications are protected from exploits:

  • FortiClient protects applications with an Exclude button beside their name from evasive exploits.
  • FortiClient does not protect applications with an Unexclude button from evasive exploits. You can protect the application by clicking the Unexclude button. See Excluding applications from protection.

See Viewing detected exploit attempts.

From the Malware Protection tab, click the Settings icon. Scroll to AntiExploit and expand the Exclusion List. The list of protected applications displays.