Solved

Confirm Mcafee Virus Scan Exclusions.

Posted on 2014-12-01
1
304 Views
Last Modified: 2015-01-16
Hello Experts,

I need to create virus scan exclusions for McAfee VS 8.8 and need some clarification on the below.

What's the difference between 1 & 2?
1. \Program Files\Microsoft SQL Server\MSSQL$instancename\DATA\
2. C:\Program Files\Microsoft SQL Server\MSSQL$instancename\DATA\

How do I exclude an entire drive from scanning?
Q:\ ??
0
Comment
Question by:CNBELGIN
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 63

Accepted Solution

by:
btan earned 500 total points
ID: 40475624
This may help in understanding as below examples.
e.g. **\Temp\** - Exclude the Temp folder in any location, on any drive
e.g. <drive:>\**\*.tmp - Exclude all files with the tmp extension (*.tmp) in any folder on a specific drive:
https://kc.mcafee.com/corporate/index?page=content&id=KB54812

You can even be more specific to use exclusion based on physical instead of above logical path.
E.g: \Device\HardDiskVolume1\Windows\File1.txt rather than C:\Windows\File1.txt
https://kc.mcafee.com/corporate/index?page=content&id=KB61000

Hence in your case (1) it is actually referring to physical path which is not accurate. Your case (2) is referring to a folder under that logical path for exclusion in C drive. And for case (3), it is correct as exclusion for the whole logical Q: drive
0

Featured Post

Guide to Performance: Optimization & Monitoring

Nowadays, monitoring is a mixture of tools, systems, and codes—making it a very complex process. And with this complexity, comes variables for failure. Get DZone’s new Guide to Performance to learn how to proactively find these variables and solve them before a disruption occurs.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

These are on the increase and getting more common these days. Users who use the Google search engine may complain of having their search redirected to unwanted sites, regardless of what browser is used. This happens when the system is infected with…
OVERVIEW This guide provides information on the process performed when the Symantec Endpoint Protection (SEP) client checks in with the Symantec Endpoint Protection Manager (SEPM). AUDIENCE Information Technology personnel responsible for suppo…
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

738 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question