Solved

Recommendations for Sophos virus scan file/folder exclusions for Windows Server 2008

Posted on 2009-07-02
2
4,076 Views
Last Modified: 2013-11-06
I am installing several Windows 2008 server virtual machines on Windows Hyper-V. I am using Sophos Enterprise Console and would like to know what the best practice recommendations are for file/folder exclusions when doing daily scans of Windows 2008 servers. I found a list for Exchange specific exclusions but not for servers running other various roles such as AD, Web Servers, Print Servers, etc.

Does anyone have a proven list of exclusions for these types of servers?

Thanks in advance.

Dave
0
Comment
Question by:dcadler
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
2 Comments
 
LVL 15

Accepted Solution

by:
plimpias earned 500 total points
ID: 24767113
0
 
LVL 15

Expert Comment

by:plimpias
ID: 24767126
I have not seen one big list with everything, your best bet is to search on either the manufactures site or technet for specific microsoft roles,

Good luck,

Paul
0

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Introduction In one of my previous articles (http://www.experts-exchange.com/Microsoft/Applications/Virtual_Server/Hyper-V/A_10686-Creating-a-Hyper-V-Cluster-on-Windows-2012.html), I explained how to create a native Windows 2012 Cluster.  The metho…
I was prompted to write this article after the recent World-Wide Ransomware outbreak. For years now, System Administrators around the world have used the excuse of "Waiting a Bit" before applying Security Patch Updates. This type of reasoning to me …
This tutorial will walk an individual through locating and launching the BEUtility application and how to execute it on the appropriate database. Log onto the server running the Backup Exec database. In a larger environment, this would generally be …
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

738 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question