Solved

EPO Exclusions

Posted on 2009-06-30
1
852 Views
Last Modified: 2013-12-09
Hello All,

I seem to be having problems with my exclusions on my applications servers.  I have setup a new on-access police with the following information
Item: E:\Application\, Exclude Subfolders: Yes, Read/Write
Overwrite client exclusions.

This seems to have populated down to the servers, however the application manager seems to belive that the exclusion is not working.

I have cross referenced the registry on the server and checked the folloiwng settings.

\Software\Network Associates\TVD\On Access Scanner\McShield\Configuration\Default
ExcludedItem_0  REG_SZ  5|10|
ExcludedItem_1  REG_SZ  3|15|E:\Application
ExcludedItem_2  REG_SZ  5|10|
ExcludedItem_3  REG_SZ  3|15|E:\Application\Dir

\Software\Network Associates\TVD\On Access Scanner\McShield\Configuration\High
ExcludedItem_0  REG_SZ  3|15|\\SERVERNAME\E:\Application
ExcludedItem_1  REG_SZ  3|15|\\SERVERNAME\Device\harddiskvolume5\Application
ExcludedItem_2  REG_SZ  3|15|\\SERVERNAME\F:
Exclusions         REG_SZ

\Software\Network Associates\TVD\On Access Scanner\McShield\Configuration\Low
ExcludedItem_0  REG_SZ  5|10|
ExcludedItem_1  REG_SZ  3|15|\\SERVERNAME\E:\Application
ExcludedItem_2  REG_SZ  3|15|\\SERVERNAME\Device\harddiskvolume5\Application
ExcludedItem_3  REG_SZ  3|15|\\SERVERNAME\F:

What is the correct way to configure the exclusions and is there a way to detect if they are working correctly?
0
Comment
Question by:GarryBaker
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 5

Accepted Solution

by:
marques_salazar earned 250 total points
ID: 24796695
Uncheck "Exclude Subfolders"....the way it is worded makes it sound like if you check it, the scan won't hit the subfolders, but it does!  Took me forever to realize that too.
0

Featured Post

Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

PREFACE The purpose of this guide is to explain what the SEPC Status Utility is and how it works. I have written the utility using AutoIt and have included the source code for your review. You are welcome to modify the code to your liking, but I wi…
UPDATE - 6/15/2011 Added support for Release Update 6 Maintenance Patch 2 Point Patch 1 (RU6 MP2 PP1). Fixed a defect in the username field that was hard-coded to look for a specific domain (left over code from testing). This release will be the …
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

729 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question