Help Center
Antivirus detects malware in the IVPN installer, why?
False positive detections are common in the antivirus industry. They occur when a benign program is wrongfully flagged as malicious due to an overly broad detection signature or algorithm used in an antivirus product.
As long as the installation file was downloaded from our website you can rest assured it’s 100% secure and should be added to your antivirus’ exceptions list.
How to add IVPN installer to the exception list
Avast
-
Open the Avast Antivirus user interface and select
☰ Menu
▸Settings
. -
Select the
General
tab, then scroll down and click theExclusions panel
to expand the section. -
Click on the
File paths
tab: specify the IVPN installer file location manually into the text box, or alternatively clickBrowse...
, tick the relevant file, then clickOK
.
For further information see the following Avast article.
Eset
-
Open the Eset user interface and click
Setup
▸Enter application preferences
. -
Click
General
▸Setup
▸Add
. -
Navigate to the IVPN installer file, select it from the file system tree and click
OK
. -
Save the changes and restart your computer.
For further information see the following Eset article.
Norton
-
In the Norton main window, click Settings.
-
Click
Antivirus
▸Scans and Risks
tab. -
Under Exclusions / Low Risks, In the Items to Exclude from Auto-Protect, SONAR and Download Intelligence Detection row, click
Configure
. -
In the window that appears, click
Add Files
& select the IVPN installer file. -
Click
Ok
&Apply
.
For further information see the following Norton article.
AVG
-
Double-click the
AVG icon
on your desktop to open the program. -
Go to
Menu
▸Settings
▸Components
and clickCustomize
next to File Shield. -
Select the
Exceptions
tab. -
Type the file or folder location manually into the text box or click
browse
and tick the relevant folder, then clickOK
to confirm. -
Click
Add
.
For further information see the following AVG article.
Related Articles
- Does IVPN protect SSH connections?
- What is the default encryption cipher for VPN connections?
- What technologies do you use at IVPN?
- What are TCP connections?
Still have questions?
Get in touch and we'll get back to you in a few hours.
Contact supportInterested in privacy?
Read our latest privacy news and keep up-to-date on IVPN services.
Visit IVPN Blog