Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
?
Solved

McAfee on-access scan exclusion query

Posted on 2008-11-02
1
Medium Priority
?
3,331 Views
Last Modified: 2013-12-09
Hi

We are running McAfee ePO 4.0 along with VirusScan 8.5

I need to exclude a folder from the on-access scan...however, I notice that I can do this either via amending one of the following policies..

On-Access Default Processes Policies
On-Access General Policies
On-Access High-Risk Processes Policies
On-Access Low-Risk Processes Policies

I'm confused which one(s) I need to edit to exclude that particular folder...can anyone help?

Is it also recommended to exclude such folders from the on-demand scan policy?

Cheers!
0
Comment
Question by:kam_uk
1 Comment
 
LVL 7

Accepted Solution

by:
Valleriani earned 2000 total points
ID: 22860811
McAfee will use On-Access Default Processes Policies on default, so set what you want excluded there.

But if you want to understand McAfee low/high risk, then you can check out:

https://knowledge.mcafee.com/article/871/9162748_f.SAL_Public.html

From what I see, you can set files to be low/high risk for scanning, and when you scan you change the policy, but this is probably not needed for you, mCafee will just use the default processes policies, so stick to that one.
0

Featured Post

Evaluating UTMs? Here's what you need to know!

Evaluating a UTM appliance and vendor can prove to be an overwhelming exercise.  How can you make sure that you're getting the security that your organization needs without breaking the bank? Check out our UTM Buyer's Guide for more information on what you should be looking for!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

PREFACE The purpose of this guide is to provide information to successfully add specific IIS 7.0 role services for the Symantec Endpoint Protection Manager (SEPM) to function properly when installed on Windows 2008. AUDIENCE Information Technol…
Curious about the latest ransomware attack? Check out our timeline of events surrounding the spread of this new virus along with tips on how to mitigate the damage.
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

579 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question