Comprehensive AV Exclusion Recommendations
Comprehensive AV Exclusion Recommendations
EXCLUSION
RECOMMENDATIONS
Brian Abstract
Helmick
Field file,
Engineer
- Microsoft
This document will provide a baseline forPremier
the proper
directory,
and
process antivirus exclusions to be applied to Windows servers and clients with
special attention to specific roles.
Version
1.0
1.1
Revised By
Brian Helmick
Brian Helmick
Date
5/15/2013
8/1/2013
Comments
Original Draft
Added Lync
Exclusions
TABLE OF CONTENTS
Purpose and Use..................................................................................................................... 6
General Exclusions Applies to Windows Server 2008 R2, Windows Server 2008, Windows
Server 2003, Windows XP, Windows Vista, and Windows 7.....................................................6
Microsoft Forefront files....................................................................................................... 6
Windows Update or Automatic Update related files.............................................................6
Windows Security files......................................................................................................... 6
Group Policy related files..................................................................................................... 7
Domain Controllers - Windows Server 2008 R2, Windows Server 2008, Windows Server 2003
................................................................................................................................................ 7
Active Directory and Active Directory-related files...............................................................7
SYSVOL files......................................................................................................................... 7
DFS files............................................................................................................................... 9
DHCP files............................................................................................................................ 9
DNS files.............................................................................................................................. 9
WINS files............................................................................................................................ 9
Exchange 2003....................................................................................................................... 9
File and Directory Exclusions............................................................................................... 9
Process Exclusions............................................................................................................. 10
Exchange 2007..................................................................................................................... 10
File and Directory Exclusions.............................................................................................10
Mailbox server role......................................................................................................... 10
Process Exclusions............................................................................................................. 13
Additional Process Exclusions (If deploying ForeFront Security for Exchange Server)........14
File Name Extension Exclusions.........................................................................................14
Exchange 2010/2013............................................................................................................ 15
File and Directory Exclusions.............................................................................................15
Mailbox servers.............................................................................................................. 15
Client Access servers...................................................................................................... 16
Process Exclusions............................................................................................................. 17
File Name Extension Exclusions.........................................................................................17
Lync 2010.............................................................................................................................. 18
File and Directory Exclusions.............................................................................................18
Process Exclusions............................................................................................................. 18
Microsoft Cluster Servers...................................................................................................... 19
File and Directory Exclusions.............................................................................................19
Microsoft Hyper-V Servers, SCVMM........................................................................................19
File and Directory Exclusions.............................................................................................19
Process Exclusions............................................................................................................. 19
SQL Server............................................................................................................................ 19
Files and Directory Exclusions............................................................................................19
Process Exclusions............................................................................................................. 21
SQL Server 2012............................................................................................................ 21
SQL Server 2008 R2....................................................................................................... 21
SQL Server 2005............................................................................................................ 21
Configuration Manager 2007/2012........................................................................................21
File and Directory Exclusions.............................................................................................21
Process Exclusions............................................................................................................. 22
SCOM 2007/2012.................................................................................................................. 23
File and Directory Exclusions.............................................................................................23
SQL Database Servers.................................................................................................... 23
Operations Manager (Management Servers, Gateways and Agents)..............................23
Process exclusions............................................................................................................. 23
SharePoint............................................................................................................................. 23
SharePoint Foundation 2013.............................................................................................. 23
File and Directory Exclusions..........................................................................................23
SharePoint Server 2013..................................................................................................... 24
File and Directory Exclusions..........................................................................................24
SharePoint Foundation 2010.............................................................................................. 24
File and Directory Exclusions..........................................................................................24
SharePoint Server 2010..................................................................................................... 25
File and Directory Exclusions..........................................................................................25
Windows SharePoint Services 3.0......................................................................................26
File and Directory Exclusions..........................................................................................26
SharePoint Server 2007..................................................................................................... 27
File and Directory Exclusions..........................................................................................27
SharePoint Portal Server 2003...........................................................................................27
IIS Server............................................................................................................................... 27
Process Exclusions............................................................................................................. 28
WSUS.................................................................................................................................... 28
File and Directory Exclusions.............................................................................................28
CAB Files - Method 1.......................................................................................................... 28
CAB Files - Method 2.......................................................................................................... 28
App-V Clients......................................................................................................................... 29
File and Directory Exclusions.............................................................................................29
Windows Vista, Windows Server 2008 or later................................................................29
Windows XP or Windows Server 2003............................................................................29
Med-V.................................................................................................................................... 29
File and Directory Exclusions.............................................................................................29
DPM Server........................................................................................................................... 29
File and Directory Exclusions.............................................................................................29
Process Exclusions............................................................................................................. 30
ISA Server 2004/2006......................................................................................................... 30
Files and Directory Exclusions............................................................................................30
Process Exclusions............................................................................................................. 30
Forefront TMG - 2010............................................................................................................ 30
Files and Directory Exclusions............................................................................................30
Process Exclusions............................................................................................................. 31
Forefront UAG 2010............................................................................................................... 31
Files and Directory Exclusions............................................................................................31
Process Exclusions............................................................................................................. 32
Appendix A Sources............................................................................................................ 34
Prior Compilations.............................................................................................................. 34
General Exclusions............................................................................................................. 34
Domain Controllers............................................................................................................ 34
Exchange........................................................................................................................... 34
Lync................................................................................................................................... 34
Cluster Servers.................................................................................................................. 34
Hyper-V and SCVMM.......................................................................................................... 34
SQL.................................................................................................................................... 34
Configuration Manager...................................................................................................... 34
SCOM................................................................................................................................. 35
Sharepoint......................................................................................................................... 35
IIS...................................................................................................................................... 35
WSUS................................................................................................................................. 35
App-V Clients..................................................................................................................... 35
Med-V................................................................................................................................. 35
DPM................................................................................................................................... 35
ISA..................................................................................................................................... 35
Forefront TMG.................................................................................................................... 35
Forefront UAG.................................................................................................................... 35
%windir%\SoftwareDistribution\Datastore
o
Tmp.edb
%ProgramData%\Microsoft\Search\Data\Applications\Windows
o
Log files
%windir%\SoftwareDistribution\Datastore
o Datastore.edb
%windir%\SoftwareDistribution\Datastore\Logs
o Res*.log
o Edb*.jrs
o Edb.chk
o Tmp.edb
%windir%\Security\Database
o *.edb
o *.sdb
o *.log
o
o
*.chk
*.jrs
%allusersprofile%
o NTUser.pol
%Systemroot%\System32\GroupPolicy
o Registry.pol
Note: Do not exclude any one of these files based on the file name extension. For example,
do not exclude all files that have a .chk extension. Microsoft has no control over other files
that may use the same extensions as the files that are described above.
Note: All the files and folders that are noted above are protected by default permissions to
allow only SYSTEM and administrator access, and they contain only operating system
components. Excluding an entire folder may be simpler but may not provide as much
protection as excluding specific files based on file names.
NTDS database files - The location of these files is specified in the following registry
key:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\NTDS\Parameters\DSA
Database File. The default location is %windir%\Ntds.
o Ntds.dit
Active Directory transaction log files - The location of these files is specified in the
following registry key:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\NTDS\Parameters\Databas
e Log Files Path. The default location is %windir%\Ntds.
o EDB*.log
o Res*.log
o Edb*.jrs
o Ntds.pat
NTDS Working folder The location of this folder is specified in the following registry
key:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\NTDS\Parameters\DSA
Working Directory
o
o
Temp.edb
Edb.chk
SYSVOL FILES
File Replication Service (FRS) Working folder files The location of this folder is
specified in the following registry key:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\NtFrs\Parameters\Working
Directory. The default location is %windir%\Ntfrs
o edb.chk in the %windir%\Ntfrs\jet\sys folder
o Ntfrs.jdb in the %windir%\Ntfrs\jet folder
o *.log in the %windir%\Ntfrs\jet\log folder
FRS Database Log files The location of this folder is specified in the following
registry key:
HKEY_LOCAL_MACHINE\System\Currentcontrolset\Services\Ntfrs\Parameters\DB Log
File Directory. The default location is %windir%\Ntfrs.
o Edb*.log (if the registry key is not set).
o FRS Working Dir\Jet\Log\Edb*.jrs (Windows Server 2008 and Windows Server
2008 R2).
Staging folder files The location of this folder is specified in the following registry
key.
o HKEY_LOCAL_MACHINE\System\Currentcontrolset\Services\NtFrs\Parameters\R
eplica Sets\GUID\Replica Set Stage. By default, staging uses the following
location: %systemroot%\Sysvol\Staging areas
Nntfrs_cmp*.*
Sysvol\Sysvol files - The current location of the Sysvol\Sysvol folder and all its
subfolders is the file system reparse target of the replica set root. The Sysvol\Sysvol
folder uses the following location: %systemroot%\Sysvol\Domain
o *.adm
o *.admx
o *.adml
o Registry.pol
o *.aas
o *.inf
o Fdeploy.inf
o Scripts.ini
o *.ins
o Oscfilter.ini
FRS Preinstall folder files Replica_root\DO_NOT_REMOVE_NtFrs_PreInstall_Directory
o Ntfrs*.*
DFSR database and working folder files - The location is specified by the following
registry key:
HKEY_LOCAL_MACHINE\System\Currentcontrolset\Services\DFSR\Parameters\Replicati
on Groups\GUID\Replica Set Configuration File=Path >. In this registry key, "Path" is
the path of an XML file that states the name of the Replication Group. In this
example, the path would contain "Domain System Volume." The default location is
the following hidden folder: %systemdrive%\System Volume Information\DFSR
o $db_normal$
o FileIDTable_*
o SimilarityTable_*
o *.xml
o $db_dirty$
o $db_lost$
o Dfsr.db
o Fsr.chk
o *.frx
o *.log
o Fsr*.jrs
Tmp.edb
If any one of these folders or files is moved or is put in a different location, scan or exclude
the equivalent element.
DFS FILES
The same resources that are excluded for a SYSVOL replica set must also be excluded when
FRS or DFSR is used to replicate shares that are mapped to the DFS root and link targets on
Windows Server 2008 R2-based, Windows Server 2008-based, Windows Server 2003-based,
or Windows 2000-based member computers or domain controllers.
DHCP FILES
DNS FILES
WINS FILES
Note: Use a version of antivirus software that is designed to work with Active Directory
domain controllers and that uses the correct Application Programming Interfaces (APIs) to
access files on the server. Older versions of most vendor software inappropriately change a
file's metadata as the file is scanned. This causes the File Replication Service engine to
recognize a file change and therefore schedule the file for replication. Newer versions
prevent this problem.
Note: Do not put Active Directory or FRS database and log files on NTFS file system
compressed volumes.
EXCHANGE 2003
FILE AND DIRECTORY EXCLUSIONS
Exchange databases and log files across all storage groups. By default, these are
located in the Exchsrvr\Mdbdata folder.
Exchange MTA files in the Exchsrvr\Mtadata folder.
Additional log files such as the Exchsrvr\server_name.log directory.
The Exchsrvr\Mailroot virtual server folder.
The working folder that is used to store streaming .tmp files that are used for
message conversion. By default, this folder is Exchsrvr\Mdbdata, but the location is
configurable.
The Exchsrvr\Conndata folder.
Note: You may want to exclude the whole Exchsrvr folder from both on-demand file-level
scanners and memory-resident file-level scanners.
The temporary folder that is used in conjunction with offline maintenance utilities
such as Eseutil.exe. By default, this folder is the location where the .exe file is run
from, but you can configure where you run the file from when you run the utility.
Site Replication Service (SRS) files in the Exchsrvr\Srsdata folder.
Microsoft Internet Information Services (IIS) system files in the %SystemRoot
%\System32\Inetsrv folder.
Any messaging antivirus program folders.
Exclude the folder that contains the checkpoint (.chk) file
Note: Even if you move the Exchange databases and log files to new locations and exclude
those folders, the .chk file may still be scanned.
PROCESS EXCLUSIONS
Cdb.exe
Cidaemon.exe
Store.exe
Emsmta.exe
Mad.exe
Mssearch.exe
Inetinfo.exe
W3wp.exe
EXCHANGE 2007
FILE AND DIRECTORY EXCLUSIONS
MAILBOX SERVER ROLE
Mailbox Databases
Exchange databases, checkpoint files, and log files across all storage groups.
By default, these are located in sub-folders under the %Program Files
%\Microsoft\Exchange Server\Mailbox folder. You can obtain the directory
location by running the following commands in the Exchange Management
Shell:
To determine the location of a transaction log and checkpoint file, run the
following command: Get-StorageGroup -server <servername>| fl *path*
To determine the location of a mailbox database, run the following
command: Get-MailboxDatabase -server <servername>| fl *path*
To determine the location of a public folder database, run the following
command: Get-PublicFolderDatabase -server <servername>| fl *path*
o Database content indexes. By default, these are located in storage group subfolders under the %Program Files%\Microsoft\Exchange Server\Mailbox folder.
o General log files, such as message tracking log files. These files are located in
subfolders under the %Program Files%\Microsoft\Exchange
Server\TransportRoles\Logs folder and %Program Files%\Microsoft\Exchange
Server\Logging folder. To determine the log paths being used, run the
following command in the Exchange Management Shell: Get-MailboxServer
<servername>| fl *path*
o The Offline Address Book files that are located in subfolders under the
%Program Files%\Microsoft\Exchange Server\ExchangeOAB folder
o IIS system files in the %SystemRoot%\System32\Inetsrv folder
o The temporary folder that is used with offline maintenance utilities, such as
Eseutil.exe. By default, this folder is the location where the .exe file is run
from. However, you can configure where you perform the operation from when
you run the utility.
o The temporary folders that are used to perform conversions:
Content conversions are performed in the servers TMP folder.
OLE conversions are performed in %Program Files%\Microsoft\Exchange
Server\Working\OleConvertor folder.
The Mailbox database temporary folder: %Program Files
%\Microsoft\Exchange Server\Mailbox\MDBTEMP
o Any Exchange-aware antivirus program folders
Clustered Mailbox server (in addition to those listed above)
o The quorum disk and the %Winnt%\Cluster folder
o The file share witness. This is located on another server in the environment,
typically a Hub Transport server.
o The ExchangeOAB directory on a shared drive. The location is specified by the
registry key
SYSTEM\CurrentControlSet\Services\MSExchangeSA\Parameters\<CMSname>\OabDropFolderLocation
By default, the ExchangeOAB directory is at the following location:
%Program Files%\Microsoft\Exchange Server\ExchangeOAB
Hub Transport server role
o General log files, for example, message tracking. These files are located in
subfolders under the %Program Files%\Microsoft\Exchange
Server\TransportRoles\Logs folder. To determine the log paths being used, run
the following command in the Exchange Management Shell: GetTransportServer <servername>| fl *logpath*,*tracingpath*
o
o
Edge
o
The message folders that are located under the %Program Files
%\Microsoft\Exchange Server\TransportRoles folder. To determine the paths
being used, run the following command in the Exchange Management Shell:
Get-TransportServer <servername>| fl *dir*path*
The transport server role queue database, checkpoint, and log files that are
located in the %Program Files%\Microsoft\Exchange
Server\TransportRoles\Data\Queue folder.
The transport server role Sender Reputation database, checkpoint, and log
files that are located in the %Program Files%\Microsoft\Exchange
Server\TransportRoles\Data\SenderReputation folder
The transport server role IP filter database, checkpoint, and log files that are
located in the %Program Files%\Microsoft\Exchange
Server\TransportRoles\Data\IpFilter folder
The temporary folders that are used to perform conversions:
Content conversions are performed in the servers TMP folder.
OLE conversions are performed in %Program Files%\Microsoft\Exchange
Server\Working\OleConvertor folder.
Any Exchange-aware antivirus program folders
Transport server role
The Active Directory Application Mode (ADAM) database and log files that are
located in the %Program Files%\Microsoft\Exchange
Server\TransportRoles\Data\Adam folder. For more information about how to
obtain the directory location if the ADAM database files have been moved
from the default location, see How to Modify ADAM Configuration.
General log files, for example message tracking. These files are located in
subfolders under the %Program Files%\Microsoft\Exchange
Server\TransportRoles\Logs folder. To determine the log paths being used, run
the following command in the Exchange Management Shell: GetTransportServer <servername>| fl *logpath*,*tracingpath*
The message folders that are located under the %Program Files
%\Microsoft\Exchange Server\TransportRoles folder. To determine the log paths
being used, run the following command in the Exchange Management Shell:
Get-TransportServer <servername>| fl *dir*path*
The transport server role queue database, checkpoint, and log files that are
located in the %Program Files%\Microsoft\Exchange
Server\TransportRoles\Data\Queue folder. For more information about how to
obtain the directory location if the queue database files have been moved
from the default location, see Working with the Queue Database on Transport
Servers.
The transport server role Sender Reputation database, checkpoint, and log
files that are located in the %Program Files%\Microsoft\Exchange
Server\TransportRoles\Data\SenderReputation folder
The transport server role IP filter database, checkpoint, and log files that are
located in the %Program Files%\Microsoft\Exchange
Server\TransportRoles\Data\IpFilter folder
The temporary folders that are used to perform conversions:
Content conversions are performed in the servers TMP folder.
OLE conversions are performed in %Program Files%\Microsoft\Exchange
Server\Working\OleConvertor folder.
PROCESS EXCLUSIONS
Cdb.exe
Cidaemon.exe
Cluster.exe
Dsamain.exe
Edgecredentialsvc.exe
Edgetransport.exe
Galgrammargenerator.exe
Inetinfo.exe
Mad.exe
Microsoft.Exchange.Antispamu
pdatesvc.exe
Microsoft.Exchange.Contentfilter
.Wrapper.exe
Microsoft.Exchange.Edgesyncsv
c.exe
Microsoft.Exchange.Imap4.exe
Microsoft.Exchange.Imap4servic
e.exe
Microsoft.Exchange.Infoworker.
Assistants.exe
Microsoft.Exchange.Monitoring
.exe
Microsoft.Exchange.Pop3.exe
Microsoft.Exchange.Pop3service
.exe
Microsoft.Exchange.Search.Ex
search.exe
Microsoft.Exchange.Servicehost.
exe
Msexchangeadtopologyservice.
exe
Msexchangefds.exe
Msexchangemailboxassistants.e
xe
Msexchangemailsubmission.exe
Msexchangetransport.exe
Msexchangetransportlogsearch.
exe
Msftefd.exe
Msftesql.exe
Oleconverter.exe
Powershell.exe
Sesworker.exe
Speechservice.exe
Store.exe
Transcodingservice.exe
Umservice.exe
Umworkerprocess.exe
W3wp.exe
Fsccontroller.exe
Fscdiag.exe
Fscexec.exe
Fscimc.exe
Fscmanualscanner.exe
Fscmonitor.exe
Fscrealtimescanner.exe
Fscstarter.exe
Fscstatsserv.exe
Fsctransportscanner.exe
Fscutility.exe
Fsemailpickup.exe
Fssaclient.exe
Getenginefiles.exe
Perfmonitorsetup.exe
Scanenginetest.exe
Semsetup.exe
Application-related extensions
o *.config
o *.dia
o *.wsb
Database-related extensions
o *.chk
o *.log
o *.edb
o *.jrs
o *.que
Offline Address Book-related extensions:
o *.lzx
Content Index-related extensions
o *.ci
o *.dir
o *.wid
o *.000
o *.001
o *.002
Unified Messaging-related extensions
o *.cfg
o *.grxml
ForeFront Security for Exchange Serverrelated extensions
o
o
o
o
o
o
o
o
o
o
o
o
o
o
o
o
o
o
o
o
o
*.avc
*.cab
*.cfg
*.config
*.da1
*.dat
*.def
*.dt
*.fdb
*.fdm
*.ide
*.key
*.klb
*.kli
*.lst
*.mdb
*.ppl
*.set
*.v3d
*.vdb
*.vdm
EXCHANGE 2010/2013
You must exclude specific directories for each Exchange server on which you run a file-level
antivirus scanner. This section describes the directories that you should exclude from filelevel scanning.
FILE AND DIRECTORY EXCLUSIONS
MAILBOX SERVERS
Mailbox Databases
o Exchange databases, checkpoint files, and log files. By default, these are
located in sub-folders under the %ExchangeInstallPath%Mailbox folder. To
determine the location of a mailbox database, transaction log, and checkpoint
file, run the following command: Get-MailboxDatabase -Server <servername>|
Format-List *path*
o Database content indexes. By default, these are located in the same folder as
the database file.
o Group Metrics files. By default, these files are located in the
%ExchangeInstallPath%GroupMetrics folder.
o General log files, such as message tracking and calendar repair log files. By
default, these files are located in subfolders under the %ExchangeInstallPath
%TransportRoles\Logs folder and %ExchangeInstallPath%Logging folder. To
determine the log paths being used, run the following command in the
Exchange Management Shell: Get-MailboxServer <servername> | Format-List
*path*
The Offline Address Book files. By default, these are located in subfolders
under the %ExchangeInstallPath%ClientAccess\OAB folder.
o IIS system files in the %SystemRoot%\System32\Inetsrv folder.
o The Mailbox database temporary folder: %ExchangeInstallPath
%Mailbox\MDBTEMP
Members of Database Availability Groups
o All the items listed in the Mailbox databases list, and the cluster quorum
database that exists at %Windir%\Cluster.
o The witness directory files. These files are located on another server in the
environment, typically a Client Access server that isnt installed on the same
computer as a Mailbox server. By default, the witness directory files are
located in %SystemDrive%:\DAGFileShareWitnesses\<DAGFQDN>.
Transport service
o Log files, for example, message tracking and connectivity logs. By default,
these files are located in subfolders under the %ExchangeInstallPath
%TransportRoles\Logs folder. To determine the log paths being used, run the
following command in the Exchange Management Shell: Get-TransportService
<servername> | Format-List *logpath*,*tracingpath*
o Pickup and Replay message directory folders. By default, these folders are
located under the %ExchangeInstallPath%TransportRoles folder. To determine
the paths being used, run the following command in the Exchange
Management Shell: Get-TransportService <servername>| fl *dir*path*
o The queue databases, checkpoints, and log files. By default, these are located
in the %ExchangeInstallPath%TransportRoles\Data\Queue folder.
o The Sender Reputation database, checkpoint, and log files. By default, these
are located in the %ExchangeInstallPath
%TransportRoles\Data\SenderReputation folder.
o The temporary folders that are used to perform conversions:
By default, content conversions are performed in the Exchange servers
%TMP% folder.
By default, OLE conversions are performed in %ExchangeInstallPath
%Working\OleConverter folder.
o The content scanning component is used by the Malware agent and data loss
prevention (DLP). By default, these files are located in the
%ExchangeInstallPath%FIP-FS folder.
Mailbox Transport service
o Log files, for example, connectivity logs. By default, these files are located in
subfolders under the %ExchangeInstallPath%TransportRoles\Logs\Mailbox
folder. To determine the log paths being used, run the following command in
the Exchange Management Shell: Get-MailboxTransportService <servername>
| Format-List *logpath*
Unified Messaging
o The grammar files for different locales, for example en-EN or es-ES. By
default, these are stored in the subfolders in the %ExchangeInstallPath
%UnifiedMessaging\grammars folder.
o The voice prompts, greetings and informational message files. By default,
these are stored in the subfolders in the %ExchangeInstallPath
%UnifiedMessaging\Prompts folder
o The voicemail files that are temporarily stored in the %ExchangeInstallPath
%UnifiedMessaging\voicemail folder.
o
Web components
o For servers using Internet Information Services (IIS) 7.0, the compression
folder that is used with Microsoft Outlook Web App. By default, the
compression folder for IIS 7.0 is located at %SystemDrive%\inetpub\temp\IIS
Temporary Compressed Files.
o IIS system files in the %SystemRoot%\System32\Inetsrv folder
o Inetpub\logs\logfiles\w3svc
POP3 and IMAP4 protocol logging
o POP3 folder: %ExchangeInstallPath%Logging\POP3
o IMAP4 folder: %ExchangeInstallPath%Logging\IMAP4
Front End Transport service
o Log files, for example, connectivity logs and protocol logs. By default, these
files are located in subfolders under the %ExchangeInstallPath
%TransportRoles\Logs\FrontEnd folder. To determine the log paths being used,
run the following command in the Exchange Management Shell: GetFrontEndTransportService <servername> | Format-List *logpath*
PROCESS EXCLUSIONS
Cdb.exe
Cidaemon.exe
Clussvc.exe
Dsamain.exe
EdgeCredentialSvc.exe
EdgeTransport.exe
ExFBA.exe
Inetinfo.exe
MSExchangeSubmission.exe
MSExchangeTransport.exe
MSExchangeTransportLogSearch.
exe
MSExchangeThrottling.exe
Msftefd.exe
Msftesql.exe
OleConverter.exe
Powershell.exe
ScanEngineTest.exe
ScanningProcess.exe
TranscodingService.exe
UmService.exe
Microsoft.Exchange.Pop3ser
vice.exe
Microsoft.Exchange.ProtectedSer
viceHost.exe
Microsoft.Exchange.RPCClientAcc
ess.Service.exe
Microsoft.Exchange.Search.S
ervice.exe
Microsoft.Exchange..Servicehost.
exe
Microsoft.Exchange.Store.Service
.exe
Microsoft.Exchange.Store.W
orker.exe
Microsoft.Exchange.TransportSyn
cManagerSvc.exe
Microsoft.Exchange.AntispamUpd
ateSvc.exe
Microsoft.Exchange.UM.Call
Router.exe
Microsoft.Exchange.ContentFilter.
Wrapper.exe
MSExchangeDelivery.exe
Microsoft.Exchange.Diagnos
tics.Service.exe
MSExchangeFrontendTransport.e
xe
Microsoft.Exchange.Directory.Top
ologyService.exe
MSExchangeHMHost.exe
Microsoft.Exchange.EdgeSyncSvc
.exe
MSExchangeHMWorker.exe
Microsoft.Exchange.Imap4.e
xe
Microsoft.Exchange.Imap4service
.exe
Microsoft.Exchange.Monitoring.e
xe
Microsoft.Exchange.Pop3.ex
e
MSExchangeLESearchWorker.exe
MSExchangeMailboxAssistants.ex
MSExchangeMailboxReplicat
MSExchangeRepl.exe
ion.exe
UmWorkerProcess.exe
UpdateService.exe
W3wp.exe
Application-related extensions:
o *.config
o *.dia
o *.wsb
Database-related extensions:
o *.chk
o *.edb
o *.jrs
o *.jsl
o *.log
o *.que
Offline address book-related extensions:
o *.lzx
Content Index-related extensions:
o *.ci
o *.dir
o *.wid
o *.000
o *.001
o *.002
Unified Messaging-related extensions:
o *.cfg
o *.grxml
Group Metrics-related extensions:
o *.dsc
o *.txt
LYNC 2010
FILE AND DIRECTORY EXCLUSIONS
Folder and file locations listed below are the default locations for Lync Server 2010. For any
locations for which you did not use the default, exclude the locations you specified for your
organization instead of the default locations specified in this topic.
%systemroot%\System32\LogFiles
%systemroot%\SysWow64\LogFiles
%systemroot%\Windows\Assembly\GAC_MSIL
%SystemDrive%\RtcReplicaRoot
File share store (specified in Topology Builder). File stores are specified in Topology
Builder.
SQL Server data and log files, including those for the back-end database, user store,
archiving store, monitoring store, and application store. Database and log files can be
specified in Topology Builder.
PROCESS EXCLUSIONS
ASMCUSvc.ex
e
DataProxy.exe
MasterReplicatorAgen
t.exe
MeetingMCUSvc.e
xe
QmsSvc.exe
AVMCUSvc.ex
e
FileTransferAgent
.exe
MediaRelaySvc.exe
MRASSvc.exe
ReplicaReplicatorAge
nt.exe
DataMCUSvc.
exe
IMMCUSvc.exe
MediationServerSvc.e
xe
OcsAppServerHos
t.exe
RTCArch.exe
RtcCdr.exe
RTCSrv.exe
Note: The temp folder exclusion does not apply to clusters on Server 2008 or above as a
specific service account is no longer used.
PROCESS EXCLUSIONS
Vmms.exe
Vmwp.exe
SQL SERVER
FILES AND DIRECTORY EXCLUSIONS
3.
On the General tab, notice the directory under Temporary file folder.
Note : Optionally, you can add a second temporary directory for Analysis Services 2000 by
using the TempDirectory2 registry entry. If you use this registry entry, consider excluding
from virus scanning the directory to which this registry entry points
PROCESS EXCLUSIONS
SQL SERVER 2012
ConfigMgrInstallDir
o Install.map
ConfigMgrInstallDir\Inboxes
*.adc
*.dc
*.mif
*.pck
*.sha
*.box
*.ddr
*.mof
*.sic
*.ccr
*.i*
*.nal
*.pkg
*.sid
*.cfg
*.ins
*.ncf
*.pkn
*.srq
*.cmn
*.ist
*.nhm
*.rpl
*srs
*.ct0
*.job
*.ofn
*.rpt
*.ssu
*.ct1
*.lkp
*.ofr
*.sca
*.svf
*.ct2
*.lo_
*.p*
*.scd
*.tmp
*.dat
*.log
*.pcf
*.scu
*.udc
ConfigMgrInstallDir\Logs
o *.log
Drive:\SMSPKG
Drive:\SMSPKG?$ ($=driveletter)
Drive:\SMSPKGSIG
Drive:\SMSSIG$
Drive:\SCCMContentLib
Drive:\Program Files\SMS_CCM\ServiceData
o *.msg
o *.que
o *.xml
Drive:\Program Files\SMS_CCM\Logs
o *.log
Boot Image Folders - Temporary folder for these cases is
C:\Windows\TEMP\BootImages\{GUID}
o Exclude C:\Windows\TEMP\BootImages and subfolders.
Offline Servicing
o Temporary folder for offline servicing is
DRIVE:\ConfigMgr_OfflineImageServicing
and several subfolders used for different purposes staging files, mounting
OS, etc. where DRIVE: is the StagingDrive value from the Offline Servicing
Manager section of the site control file. If this value is missing, we use the
drive where the site is installed. Exclude
DRIVE:\ConfigMgr_OfflineImageServicing and subfolders.\
Note: For the configuration manager clients the following exclusion can be added:
%windir%ccmcache
PROCESS EXCLUSIONS
Smsexec.exe
Ccmexec.exe
CmRcService.exe
Sitecomp.exe
Smswriter.exe
Smssqlbbkup.exe
SCOM 2007/2012
FILE AND DIRECTORY EXCLUSIONS
The following file name extension-specific exclusions for Operations Manager includes realtime scans, scheduled scans, and local scans.
SQL DATABASE SERVERS
These exclusions include the SQL Server database files that are used by Operations Manager
components and the system database files for the master database and for the tempdb
database.
For example:
*.mdf
*.ldf
*.edb
*.chk
*.log
Note: Page files should also be excluded from any real-time scans.
PROCESS EXCLUSIONS
Monitoringhost.exe
SHAREPOINT
SHAREPOINT FOUNDATION 2013
FILE AND DIRECTORY EXCLUSIONS
Note: The Applications folder must be excluded only if the computer is running the
SharePoint Foundation Search service. If the folder that contains the index file is located
elsewhere, you must also exclude that folder.
Drive:\ProgramData\Microsoft\SharePoint
Drive:\Users\account that the search service is running as\AppData\Local\Temp
Note: The search account creates a folder in the Gthrsvc_spsearch4 Temp folder to which it
periodically has to write.
Drive:\WINDOWS\System32\LogFiles
Drive:\Windows\Syswow64\LogFiles
Note: If you use a specific account for SharePoint services or application pools identities,
you may also have to exclude the following folders:
Drive:\Users\ServiceAccount\AppData\Local\Temp
Drive:\Users\Default\AppData\Local\Temp
Note: If you do not want to exclude the whole Microsoft Office Servers folder from antivirus
scanning, you can exclude only the following folders:
Note: This folder is used for the indexing process. If the index files are configured to be
located in a different folder, you also have to exclude that location.
Note: If you have SharePoint Server 2013, these folders should be excluded in addition to
the folders that are listed in the "SharePoint Foundation 2013" section.
SHAREPOINT FOUNDATION 2010
FILE AND DIRECTORY EXCLUSIONS
Note: If you do not want to exclude the whole Web Server Extensions folder from antivirus
scanning, you can exclude only the following two folders:
Note: The Applications folder must be excluded only if the computer is running the
SharePoint Foundation Search service. If the folder that contains the index file is located
elsewhere, you must also exclude that folder.
Drive:\ProgramData\Microsoft\SharePoint
Drive:\Users\account that the search service is running as\AppData\Local\Temp
Note: The search account creates a folder in the Gthrsvc_spsearch4 Temp folder to which it
periodically has to write.
Drive:\WINDOWS\system32\LogFiles
Drive:\Windows\Syswow64\LogFiles
Note: If you use a specific account for SharePoint services or application pools identities,
you may also have to exclude the following folders:
Drive:\Users\ServiceAccount\AppData\Local\Temp
Drive:\Users\Default\AppData\Local\Temp
Note: If you do not want to exclude the whole Microsoft Office Servers folder from antivirus
scanning, you can exclude only the following folders:
Note: This folder is used for the indexing process. If the Index files are configured to be
located in a different folder, you also have to exclude that location.
Note: If you have SharePoint Server 2010, these folders should be excluded in addition to
the folders that are listed in the "SharePoint Foundation 2010" section.
WINDOWS SHAREPOINT SERVICES 3.0
FILE AND DIRECTORY EXCLUSIONS
Note: If you do not want to exclude the whole Web Server Extensions folder from antivirus
scanning, you can exclude only the following two folders:
Note: The Applications folder must be excluded only if the computer is running the Windows
SharePoint Services Search service. If the folder that contains the index file is located
elsewhere, you must also exclude that folder.
Note: If you are running a 64-bit version of Windows, you should also include the following
directory:
Note: The search account creates a folder in the "gthrsvc Temp" folder to which it
periodically has to write.
Drive:\WINDOWS\system32\LogFiles
Drive:\Windows\Syswow64\LogFiles
Note: If you use a specific account for SharePoint services or application pools identities,
you may also have to exclude the following folders:
Note: If you do not want to exclude the whole Microsoft Office Servers folder from antivirus
scanning, you can exclude only the following folders:
Note: This folder is used for the indexing process. If the index files are configured to be
located in a different folder, you also have to exclude that location.
Note: If you have SharePoint Server 2007, these folders should be excluded in addition to
the folders that are listed in the "Windows SharePoint Services 3.0" section.
Note: When you install SharePoint Server 2007 or apply a hotfix to an existing installation of
SharePoint Server 2007, you may have to disable the real-time option of the antivirus
software. Or, you may have to exclude the Drive:\Windows\Temp folder from antivirus
scanning if this is required.
SHAREPOINT PORTAL SERVER 2003
Note: Drive: is the drive letter where you installed SharePoint Portal Server.
If drive M is mounted, you must exclude this drive from the scan.
If any data was placed in another location throughout the installation process you
must exclude that location also.
If you are using Microsoft SharePoint Portal Server 2003 and you apply Service Pack 1
(SP1), you must exclude the following folder from Anti Virus scans:
o
Drive:\Windows\Temp\Frontpagetempdir
IIS SERVER
Exclude the IIS compression directory from the antivirus software's scan list.
The default compression directory in IIS 6.0 is %systemroot%\IIS Temporary Compressed
Files. This directory may have been changed to another location. In IIS 7.0, the default
location of the compressed file cache is %SystemDrive%\inetpub\temp\IIS Temporary
Compressed Files.
To verify the compression directory:
1.
Click Start, point to Programs, point to Administrative Tools, and then click Internet
Information Services (IIS) Manager.
In IIS Manager, right-click the Web Sites folder, and then click Properties.
Click the Service tab.
2.
3.
Under HTTP Compression, make sure that Compress static files is selected, and then locate
the path to the temporary directory.
PROCESS EXCLUSIONS
%systemroot%\system32\inetsrv\w3wp.exe
%systemroot%\SysWOW64\inetsrv\w3wp.exe
WSUS
FILE AND DIRECTORY EXCLUSIONS
\WSUS\WSUSContent
\WSUS\UpdateServicesDBFiles
\SoftwareDistribution\Datastore
\SoftwareDistribution\Download
Note: Because the Wsusscan.cab file and the Wsusscn2.cab file contain several nested
cabinet files, excluding only these files is not typically sufficient to reduce unusually high
CPU usage. To significantly reduce CPU usage, also exclude nested cabinet files that are
within the Wsusscan.cab file and the Wsusscn2.cab file.
Note: If a virus is present in a .cab file, the virus should be detected when the file is
uncompressed. Therefore, there is almost no increased risk in using this method.
CAB FILES - METHOD 2
Note: If a virus is present in a .cab file, the virus should be detected when the file is
uncompressed. Therefore, there is almost no increased risk in using this method.
APP-V CLIENTS
FILE AND DIRECTORY EXCLUSIONS
WINDOWS VISTA, WINDOWS SERVER 2008 OR LATER
%USERPROFILE%\AppData\Local\SoftGrid Client
%USERPROFILE%\AppData\Roaming\SoftGrid Client
%PROGRAMDATA%\Microsoft\Application Virtualization Client\SoftGrid Client
MED-V
FILE AND DIRECTORY EXCLUSIONS
*.vhd
*.vmc
*.ckm
*.vsv
Packed image format used by MED-V (Kidaro Compressed Machine.) These will be
present on MED-V Servers, Image Distribution Servers, locally packed images on
MED-V Administration workstations, and as pre-staged images on clients
o
*.vud
*.index
*.evhd
DPM SERVER
FILE AND DIRECTORY EXCLUSIONS
PROCESS EXCLUSIONS
PROCESS EXCLUSIONS
PROCESS EXCLUSIONS
APPENDIX A SOURCES
PRIOR COMPILATIONS
http://social.technet.microsoft.com/wiki/contents/articles/953.microsoft-anti-virus-exclusionlist.aspx http://blogs.technet.com/b/jeff_stokes/archive/2010/05/19/anti-virus-exclusions-andyou.aspx
GENERAL EXCLUSIONS
http://support.microsoft.com/kb/822158
DOMAIN CONTROLLERS
http://support.microsoft.com/kb/822158
EXCHANGE
http://technet.microsoft.com/en-us/library/bb332342.aspx
http://technet.microsoft.com/en-us/library/bb332342%28EXCHG.80%29.aspx
http://support.microsoft.com/kb/328841
LYNC
http://technet.microsoft.com/en-us/library/gg195736(v=ocs.14).aspx
CLUSTER SERVERS
http://support.microsoft.com/kb/250355
HYPER-V AND SCVMM
http://support.microsoft.com/kb/961804/en-us
http://support.microsoft.com/kb/2628135
SQL
http://support.microsoft.com/kb/309422
CONFIGURATION MANAGER
http://blogs.technet.com/b/configurationmgr/archive/2010/11/30/configmgr-2007-antivirusscan-and-exclusion-recommendations.aspx
http://blogs.technet.com/b/systemcenterpfe/archive/2013/01/11/updated-system-center2012-configuration-manager-antivirus-exclusions-with-more-details.aspx
http://www.systemcenterblog.nl/2012/05/09/anti-virus-scan-exclusions-for-configurationmanager-2012/
SCOM
http://support.microsoft.com/kb/975931
SHAREPOINT
http://support.microsoft.com/kb/952167
IIS
http://support.microsoft.com/kb/817442
WSUS
http://technet.microsoft.com/en-us/library/dd939908(WS.10).aspx#av
APP-V CLIENTS
http://support.microsoft.com/kb/2576031
MED-V
http://social.technet.microsoft.com/wiki/contents/articles/566.aspx
DPM
http://technet.microsoft.com/en-us/library/ff399439.aspx
ISA
http://technet.microsoft.com/en-us/library/cc707727.aspx
FOREFRONT TMG
http://technet.microsoft.com/en-us/library/cc707727.aspx
FOREFRONT UAG
http://technet.microsoft.com/en-us/library/cc707727.aspx