Solved

Trend Micro CSM and Hyper V

Posted on 2009-06-29
4
1,440 Views
Last Modified: 2013-11-06
I have Trend Micro CSM client installed on two of my clients' Hyper V host machines. I randomly have virtual machines disappear. During initial configuration, I created a folder on the D: parition called "Virtual Machines" where the VMs are stored instead of the default location. This is the only folder that I have excluded but they seem to randomly disappear. Do I need more exclusions? Also it showes the exclusion as D:\Virtual Machines. Would the space make it not exclude this directory?
0
Comment
Question by:StephenMcCollum
4 Comments
 
LVL 1

Accepted Solution

by:
bjinfo earned 350 total points
ID: 24743271
Hello,

this problem was already discussed in Expert Exchange, see a possible solution on:

http://www.experts-exchange.com/Microsoft/Applications/Virtual_Server/Hyper-V/Q_24384173.html

Should help.

Best regards

Pascal
0
 
LVL 1

Author Closing Comment

by:StephenMcCollum
ID: 31597921
Did not really get the answer. Accepted answer was as close as I got and this question has been open for a long time.
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Setting up a VPN 60 142
how should I extend my cat5 cable by 20 feet? 11 72
How to simulate latency? 5 32
Multiple MPLS Circuits Connecting to LAN 3 30
Short answer to this question: there is no effective WiFi manager in iOS devices as seen in Windows WiFi or Macbook OSx WiFi management, but this article will try and provide some amicable solutions to better suite your needs.
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
Internet Business Fax to Email Made Easy - With  eFax Corporate (http://www.enterprise.efax.com), you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, f…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

803 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question