Salutations,
Could you give a example of File Exclusion List would be use for?
And would File Exclusion List get infected by malware? This will
help clear my confusion.
Kind regards,
@Moose
Excluded files could be infected - especially encrypted by cryptors (e.g. CryptoWall, Critoni, etc = "cryptomalware").
File exclusion list is used to retain changes\modifications to installed softs (that the user wishes to keep) - after exiting Shadow Mode. For example, updates, various logs (so user can keep track of what happened on system - for example, when malware testing), changes to registry, or work product - like photos, graphics, documents, etc, etc.
For best security, I do not exclude or commit anything... it's not that big of burden to "re-update" something after exiting Shadow Mode. I can always make the permanent change to my system after exiting Shadow Mode - for example, installing a soft after I've fully evaluated it and decided it will work on my system and for me... plus, more importantly, that it is safe.
If I want to save system details - like logs - or work product - like spreadsheets and word files - I upload them to OneDrive while in Shadow Mode - instead of excluding them. After exiting Shadow Mode, I download them...
This is rather safe practice compared to excluding or committing files - which, when testing malwares or during an infect - and a whole lot is happening - I can get confused and\or forget - and save infection to my system.
It can be a really bad situation if I commit an active infection to my physical system...