How to Add Exclusions in Dell Endpoint Security Suite Enterprise

Summary: Exclusions may be added to Dell Endpoint Security Suite Enterprise for memory protection, execution control, application control, and script control by following these instructions.

This article applies to This article does not apply to This article is not tied to any specific product. Not all product versions are identified in this article.

Instructions

Note:

This article covers how to add exclusions to Dell Endpoint Security Suite Enterprise.


Affected Products:

  • Dell Endpoint Security Suite Enterprise

Affected Operating Systems

  • Windows
  • Mac
  • Linux

Exclusions may be added to Dell Endpoint Security Suite Enterprise for compatibility with third-party software or scripts.

  1. From a web browser, go to the Dell Data Security administration console at https://servername.company.com:8443/webui.
    Note:
    • The example, servername.company.com, may differ from the server DNS in your environment.
    • The port, 8443, may differ from the Remote Management Console port in your environment.
  2. Sign in to the Dell Data Security administration console.
    Administration console
  3. From the left menu pane, expand the Populations tab and then click Enterprise.
    Enterprise
  4. From the Threat Prevention subheading, click Advanced Threat Prevention.
    Advanced Threat Prevention
  5. Click Show advanced settings.
    Show advanced settings
  6. Exclusions may be added for:

For more information about exclusions, click the appropriate control.

Note: Application Control is exclusive to Windows operating systems.

Memory Protection

How to Add Dell Endpoint Security Suite Enterprise Memory Protection Exclusions

Duration: 02:55
Closed captions: Available in multiple languages

Note: Memory Protection Enabled must be checked.
  1. Check Enable Exclude executable files.
  2. Exclude executable files by populating the relative path and file name.
    Exclude executable files
    Note:
    Example Exclusions:
    • Windows
      • Correct: \Application\SubFolder\[EXECUTABLE].exe
      • Incorrect: C:\Application\SubFolder\
      • The example Windows relative path would apply to both:
        • C:\Program\Application\SubFolder\[EXECUTABLE].exe
        • D:\Test\Application\SubFolder\[EXECUTABLE].exe
      • Use caution when adding generic relative paths as it could potentially weaken your environment’s security posture.
    • Mac
      • Correct: /Users/application.app/[EXECUTABLE]
      • Incorrect: /Users/application.app
    • [EXECUTABLE] = The application name
    • Folder exclusions do not support network paths, wildcards, or special characters.
    • Enclose an exclusion in quotation marks ("…") if any of the following characters are used:
      • Comma (,)
      • Brackets ([…])
      • Tilde (~)
  3. In the upper right, click Save.
    Save
  4. Commit the policy.
    Note:

Execution Control

How to Add Dell Endpoint Security Suite Enterprise Execution Control Exclusions

Duration: 01:52
Closed captions: Available in multiple languages

Note: Execution Control exclusions only omit the directory from product scans. To safe list files, reference How to Safe List Files in Dell Endpoint Security Suite Enterprise.
  1. Under Protection Settings, check Enable Exclude Specific Folders (includes subfolders).
  2. Exclude Specific Folders (includes subfolders) by populating the absolute path.
    Exclude specific folders
    Note:
    Example Exclusions:
    • Windows
      • Correct: C:\Program Files\Dell
      • Incorrect: \Program Files\Dell\[EXECUTABLE].exe
    • Mac
      • Correct: /Mac\ HD/Users/Application\ Support/Dell
      • Incorrect: /Mac HD/Users/Application Support/Dell/[EXECUTABLE]
    • [EXECUTABLE] = The application name
  3. In the upper right, click Save.
    Save
  4. Commit the policy.
    Note:

Application Control

How to Add Dell Endpoint Security Suite Enterprise Application Control Exclusions

Duration: 02:15
Closed captions: Available in multiple languages

Note: Application Control must be checked.
  1. Exclude Application Control Allowed Folders by populating the absolute path.
    Application Control Allowed Folders
    Note: Example Exclusions:
    • Windows
      • Correct: C:\Program Files\Dell
      • Incorrect: \Program Files\Dell\[EXECUTABLE].exe
    • [EXECUTABLE] = The application name
    • Folder exclusions do not support network paths, wildcards, or special characters.
    • Enclose an exclusion in quotation marks ("…") if any of the following characters are used:
      • Comma (,)
      • Brackets ([…])
      • Tilde (~)
  2. In the upper right, click Save.
    Save
  3. Commit the policy.
    Note:

Script Control

How to Add Dell Endpoint Security Suite Enterprise Script Control Exclusions

Duration: 02:30
Closed captions: Available in multiple languages

Note: Script Control must be checked.
  1. Check Enable Approve Scripts in Folders (and Subfolders).
  2. Enable Approve Scripts in Folders (and Subfolders) by populating the relative path of the script directory.
    Approve Scripts in Folders
    Note: Example Exclusions:
    • Windows
      • Correct: /Users/*/temp/script*.vbs
      • Incorrect: C:\Users\*\temp\script*.vbs\
      • The example Windows relative path applies to both:
        • C:\Program\Application\ApprovedScripts\
        • D:\Test\Application\ApprovedScripts\
      • Use caution when adding generic relative paths as it could potentially weaken your environment’s security posture.
    • Mac
      • Correct: /Mac\ HD/Users/Cases/ScriptsAllowed
      • Incorrect: /Mac HD/Users/*
    • Folder paths can be to a local drive, a mapped network drive, or a universal naming convention (UNC) path.
    • Any specified folder path also includes any subfolders.
    • Wildcards (*) may be used in Script Control exclusions.
      • Dell Endpoint Security Suite Enterprise Agent version 1491 or higher is required.
      • The Dell Data Security (formerly Dell Data Protection) server must have strict validation set to disabled.
      • Wildcard exclusions must use forward slashes in the UNIX style for Windows computers. For example: /windows/system*/
      • The only character that is supported for wildcards is *.
      • Folder exclusions with a wildcard must have a slash at the end of the path to differentiate between a folder and a file.
        • Folder: /Windows/system32/*/
        • File: /Windows/system32/*
      • A wildcard must be added for each level of folder depth. For example, /folder/*/script.vbs matches \folder\test\script.vbs or \folder\exclude\script.vbs, but does not work for \folder\test\001\script.vbs. This would require either /folder/*/001/script.vbs or /folder/*/*/script.vbs.
      • Wildcards support full and partial exclusions.
        • Full wildcard: /folder/*/script.vbs
        • Partial wildcard: /folder/test*/script.vbs
      • Wildcards support network paths.
    • Wildcards may lower one’s security stance if used too broadly. For example, excluding the entire \Windows\Temp folder is not recommended.
  3. In the upper right, click Save.
    Save
  4. Commit the policy.
    Note:

To contact support, reference Dell Data Security International Support Phone Numbers.
Go to TechDirect to generate a technical support request online.
For additional insights and resources, join the Dell Security Community Forum.

Affected Products

Dell Endpoint Security Suite Enterprise
Article Properties
Article Number: 000126745
Article Type: How To
Last Modified: 14 Jul 2025
Version:  17
Find answers to your questions from other Dell users
Support Services
Check if your device is covered by Support Services.