

Try WSL preview features by joining the Windows Insiders Program

A drop down menu will appear and then you can select files, folders, file types, or process. Under “Virus & threat protection settings”, select “Manage settings”, and then under “Exclusions”, select “Add or remove exclusions”.Select “Start” > “Settings” > “Update & Security” > “Windows Security” > “Virus & threat protection”.To do this you need to go to the following: In Windows you can stop Windows Security from alerting you or blocking your virtual machine by adding it to the exclusion list. This process will work on Windows 10 and Windows 11 This process will focus on implementing these exclusions with Windows Security: Setting an Exclusion Folder in Windows Security When a match is identified the file is quarantined and removed from the host system.Īlthough the antivirus program is doing its job, there are some ways that we can protect our Kali Linux Virtual Machine from being quarantined by the host Antivirus Software. The files on your host system are scanned and the antivirus program compares them against there database that contains these signatures to see if there is a match.

So how does signature based detection work?Īn antivirus signature is a sequence of bytes that are contained within a program. Many of the tools, exploits, and resources that are contained in Kali Linux have been signatured by these Antivirus products. These hacking tools are usually signatured by Antivirus programs to protect the host operating system from being infected. As time moves on Antivirus and EDR programs are working to implement new capabilities to identify hacking tools.
