Link to home
Create AccountLog in
Anti-Virus Apps

Anti-Virus Apps

--

Questions

--

Followers

Top Experts

Avatar of OncleBob
OncleBob

Can I delete *.dmp files located in OfficeScan Client folder?
Hi there,

We're running OfficeScan Enterprise and I noticed that one laptop has accumulated 14gb worth of *.DMP files in its OfficeScan\Client folder.
File name mask looks like
20141207-164625.dmp
yyymmdd-012345.dmp

Can I nuke these?
Looked on Trend's site but can't find a clear answer.

Cheers,
David

Zero AI Policy

We believe in human intelligence. Our moderation policy strictly prohibits the use of LLM content in our Q&A threads.


Avatar of arnoldarnold🇺🇸

do the dmp files correspond with application crashes, use windbg to check whether that is what they are and if so, you can dump them if there is no need to diagnose ......

Avatar of OncleBobOncleBob

ASKER

Thank you Arnold.
I was looking more for an OfficeScan based answer.

Sincerely,
David

ASKER CERTIFIED SOLUTION
Avatar of OncleBobOncleBob

ASKER

Link to home
membership
Log in or create a free account to see answer.
Signing up is free and takes 30 seconds. No credit card required.
Create Account

Authoritative answer from software vendor.
Solution is product specific and properly documented.

Reward 1Reward 2Reward 3Reward 4Reward 5Reward 6

EARN REWARDS FOR ASKING, ANSWERING, AND MORE.

Earn free swag for participating on the platform.

Anti-Virus Apps

Anti-Virus Apps

--

Questions

--

Followers

Top Experts

Anti-virus software was originally developed to detect and remove computer viruses. However, with the proliferation of other kinds of malware, antivirus software started to provide protection from other computer threats. In particular, modern antivirus software can protect from malicious browser helper objects (BHOs), browser hijackers, ransomware, keyloggers, backdoors, rootkits, trojan horses, worms, malicious layered service providers (LSPs), dialers, fraud tools, adware and spyware. Some products also include protection from other computer threats, such as infected and malicious URLs, spam, scam and phishing attacks, online identity theft (privacy), online banking attacks, social engineering techniques, Advanced Persistent Threat (APT), botnets and DDoS attacks.