A modified hosts file may trigger a detection (Redirected hosts file) even if you have intentionally modified the hosts file entry manually or with a program that you use. The scanning engines in our security products are not able to tell if entries in the hosts file were modified on purpose or by a malicious software.
To exclude the hosts file from scanning in the future:
Go to the main user interface, and select Tools.
Select App and file control.
With the Quarantined tab selected, select the hosts file (the detected file) and select Allow.
Select Yes. This restores the file from quarantine and excludes it from future scannings.
The hosts file appears in the security product's Excluded tab.