Fortinet white logo
Fortinet white logo

Administration Guide

Viewing applications protected from exploits

Viewing applications protected from exploits

When you view the list of applications, you can use the following button names to determine which applications are protected from exploits:

  • The applications with an Exclude button beside their names are protected from evasive exploits.
  • The applications with an Unexclude button beside their names are not protected from evasive exploits. You can protect the application by clicking the Unexclude button. See .

See Viewing detected exploit attempts.

From the Malware Protection tab, click the Settings icon. Scroll to AntiExploit and expand the Exclusion List.

The list of protected applications displays.

Viewing applications protected from exploits

Viewing applications protected from exploits

When you view the list of applications, you can use the following button names to determine which applications are protected from exploits:

  • The applications with an Exclude button beside their names are protected from evasive exploits.
  • The applications with an Unexclude button beside their names are not protected from evasive exploits. You can protect the application by clicking the Unexclude button. See .

See Viewing detected exploit attempts.

From the Malware Protection tab, click the Settings icon. Scroll to AntiExploit and expand the Exclusion List.

The list of protected applications displays.