Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

Antivirus directory exceptions

Posted on 2014-09-09
3
Medium Priority
?
331 Views
Last Modified: 2014-09-10
Does anyone see any potential issues with the following directory exceptions (using Bitdefender Cloud for Endpoint Security).

I'm pretty sure most of these exclusions came from Trend Micro's recommended exclusion lists, but I'm pretty sure they are several years old at this point.

1. %WinDir%\IIS Temporary Compressed Files
2. %WinDir%\NTDS
3. %WinDir%\ntfrs
4. %WinDir%\SoftwareDistribution\Datastore
5. %WinDir%\System32\dhcp
6. %WinDir%\System32\dns
7. %WinDir%\System32\LogFiles
8. %WinDir%\System32\spool
9. %WinDir%\sysvol
10. C:\inetpub\logs\
11. C:\inetpub\temp\IIS Temporary Compressed Files
12. C:\inetpub\wwwroot
13. C:\WINNT\NTDS
14. C:\WINNT\SYSVOL

File Extension Exclusions:
edb,sdb,chk,jrs,dit,pat,mdf,ldf,ndf,bak,trn,vmdk,vmem,avhd,iso,vfd,vhd,vsv,log,dat,tmp,pol,pf
0
Comment
Question by:pzozulka
  • 2
3 Comments
 
LVL 28

Accepted Solution

by:
jhyiesla earned 2000 total points
ID: 40312373
Those seem OK.. I use most of them in my exceptions list as well. If you are protecting an Exchange server or SQL server, you  may want to add some of those folders in as well, but I'd check with your vendor or MS for the specifics.
0
 
LVL 8

Author Comment

by:pzozulka
ID: 40312464
I checked with Bitdefender. They claim that Exchange, SQL, etc. exclusions are already built-in.
0
 
LVL 28

Expert Comment

by:jhyiesla
ID: 40312516
And that may be... each vendor is different. As far as I know what I use has no exceptions built in, but they recommend certain ones that basically agree with what you put in your Question. In fact I don't think I've ever used one that had it built in, of course I've never used BD.
0

Featured Post

 The Evil-ution of Network Security Threats

What are the hacks that forever changed the security industry? To answer that question, we created an exciting new eBook that takes you on a trip through hacking history. It explores the top hacks from the 80s to 2010s, why they mattered, and how the security industry responded.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Securing your business data in current era should be your biggest priority. Numerous people are unaware of the fact that insiders commit more than 60 percent of security breaches. You need to figure out the underlying cause and invoke your potential…
The Internet has made sending and receiving information online a breeze. But there is also the threat of unauthorized viewing, data tampering, and phoney messages. Surprisingly, a lot of business owners do not fully understand how to use security t…
This video Micro Tutorial shows how to password-protect PDF files with free software. Many software products can do this, such as Adobe Acrobat (but not Adobe Reader), Nuance PaperPort, and Nuance Power PDF, but they are not free products. This vide…
In a question here at Experts Exchange (https://www.experts-exchange.com/questions/29062564/Adobe-acrobat-reader-DC.html), a member asked how to create a signature in Adobe Acrobat Reader DC (the free Reader product, not the paid, full Acrobat produ…

824 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question