File and Folder Exclusion Articles
File and Folder Exclusion Articles
This article contains links to articles and pre-filtered lists of content. It covers only the
most frequently used articles on file and folder exclusions for ENS 10.x and VSE 8.x in
the Knowledge Center on the ServicePortal. The list is not comprehensive and does not
contain specific issues that you might experience when you set exclusions. Search the
Knowledge Center for either the error you received or a description of the issue you
experienced.
IMPORTANT: The Microsoft exclusions and McAfee applications listed in this article are
not required for ENS if you select the option Let McAfee Decide when choosing when to
scan files with the On-Access Scanner. For more information about how the option Let
McAfee Decide uses the AMCore trust model for scan avoidance, see the community
post at: https://community.mcafee.com/t5/Documents/Explanation-of-AMCore-Trust-
Model-v1p3-pdf/ta-p/550630.
Environment
Summary
It is recommended that you exclude the following locations in the Default Processes for
the On-Access Scanner to ensure that the DHCP and WINS databases function
correctly:
Environment
Summary
• ENS:
o "Configuring exclusions" section of the Endpoint Security 10.5 Product Guide
(PD26799)
o KB88595 - Understanding ENS scan profiles and how to exclude an
application executable from On-Access Scanning
2
• VSE:
o KB66909 - Consolidated list of ENS/VSE exclusion articles
o KB55898 - Understanding VSE Exclusions
o KB67544 - How to create low-risk and high-risk process exclusions for VSE
8.x in ePolicy Orchestrator
o KB50998 - How to manage file and folder exclusions in VSE 8.x using
wildcards
o KB61000 - VSE exclusions and hardware paths (physical address versus
logical address)
Environment
Summary
To ensure compatibility with Microsoft SharePoint server and MSMS, you must exclude
the following folders in the ENS/VSE On-Access Scanner.
3
Exclude Comment
NOTES:
• The first path shown in the table is the default installation path. If you have
chosen to install MSMS to a non-default folder, ensure that you specify that path
for the exclusion.
• The PSHData folder is created under the installation folder by default and
contains the Quarantine Database; however, this is configurable in the MSMS
interface under Settings & Diagnostics, Detected Items. If you choose to locate
the Quarantine Database in a different folder (or even a different local drive),
ensure that the correct path is excluded.
• ENS: "Configuring exclusions" section of the Endpoint Security 10.5 Product Guide
(PD26799)
• VSE:
o KB66909 - Consolidated list of Endpoint Security/VirusScan Enterprise
exclusion articles
o KB55898 - Understanding VirusScan Enterprise Exclusions
o KB67544 - How to create low-risk and high-risk process exclusions for
VirusScan Enterprise 8.x in ePolicy Orchestrator
o KB50998 - How to manage file and folder exclusions in VirusScan
Enterprise 8.x using wildcards
o KB61000 - VirusScan Enterprise exclusions and hardware paths (physical
address versus logical address)
4
Slow performance with Java-based applications when Endpoint
Security or VirusScan Enterprise is installed
Technical Articles ID: KB58727
Last Modified: 7/19/2018
Rated:
Environment
Problem
Slow performance occurs with Java-based applications when ENS or VSE is installed.
Cause
Java uses .JAR and .CLASS archive files. ENS/VSE include the ability to scan these archive
types for malicious content. Archive scanning requires that each file in the archive be
extracted and scanned individually. For large archives or programs that access multiple
archives, this can cause slow system performance and an increase in the CPU resources
used by the McShield.exe process.
Solution 1
NOTE: There is minimal risk when archive scanning is disabled. When an archive is
extracted, each file must still be scanned before it is saved.
5
3. Click Default Processes or All Processes.
4. Click Advanced, and then deselect Scan inside archives (e.g. .ZIP).
NOTE: For computers managed by ePolicy Orchestrator (ePO), you must make this
change in the On-Access Default Processes Policies for VSE. Click the Advanced tab,
deselect Scan inside archives (e.g. .ZIP), and then click Apply. See the ePolicy
Orchestrator Product Guide for detailed information on configuring policies in ePO.
Solution 2
NOTE: Processes in the High Risk processes policy should never be excluded.
Solution 3
Exclude files with JAR, CLA, JAV extensions from Default Processes scanning
Exclude by extension only if Java files are accessed by a large number of processes or by
processes that should not be added to Low Risk processes.
NOTE: Although it is generally advised not to disable scanning of file types (exclusion by
extension) that are accessed by any process, you can exclude these file types if they are
known to be safe.
6
Environment
Summary
7
Environment
Summary
The following table outlines the exclusions required for running ENS/VSE on an Oracle
Database server.
NOTES:
8
When configuring exclusions, always apply the principle that the more precise the
exclusion, the smaller the potential security risk. For instructions to configure exclusions,
refer to the following documentation:
• ENS: "Configuring exclusions" section of the Endpoint Security 10.5 Product Guide
(PD26799)
Related Information
How to exclude SAN and NAS mount points from scanning with
VirusScan Enterprise
Technical Articles ID: KB54457
Last Modified: 7/19/2018
Rated:
Environment
Summary
To exclude SAN and NAS devices and servers that use mount points from scanning with
VSE, create an On-Access Scanner process exclusion for the volume names of the SAN /
NAS devices and servers.
IMPORTANT: These exclusions will not work with Endpoint Security. Endpoint Security
does not support physical path exclusions yet.
To receive email notification when this article is updated, click Subscribe on the right
side of the page. You must be logged on to subscribe.
9
Use the following syntax for exclusions:
Examples:
\Device\Harddisk\*
\Device\HarddiskVolume*
\Device\HarddiskVolume1\
\Device\HarddiskVolume1\Exchsrvr*
Environment
Summary
This article provides guidance to implement the suggested settings from the Veritas
article General recommendations for virus scanner exclusions working with NetBackup
10
(https://www.veritas.com/support/en_US/article.TECH152328) into VirusScan Enterprise.
Backup programs such as Backup Exec touch a large number of files. This can cause
performance issues if each read and write operation triggers a scan by the VirusScan
Enterprise On-Access Scanner. This article explains how to add Low Risk Processes
policies and exclusions for Backup Exec in VirusScan Enterprise.
Solution
Add Low Risk Processes policies and exclusions for Backup Exec, and add Access
Protection exclusions for Backup Exec:
NOTES:
o Change the path as appropriate, depending on which root volume the
Media Server or Remote Agent has been installed.
o For a complete current list of processes to add, see section B, Processes
to Exclude in https://www.veritas.com/support/en_US/article.TECH152328
9. When all of the above processes have been added, with Low-Risk Processes
selected, select the Scan items tab.
11
10. Deselect When writing to disk and When reading from disk.
IMPORTANT: Be advised that adding processes to the Low Risk profile, and
applying step 10 for that profile, means that files accessed by those listed
processes are not scanned by the On-Access scanner. Ensure that you only add
fully trusted processes to this list.
7. Add two asterisks (**) to the path as wildcards after each path has been added.
Example:
NOTE: Disable the Opened for Backup option on Media Servers and Remote
Agents. This can be done locally or using ePolicy Orchestrator.
The Access Protection rule "Anti-virus Standard Protection --> Prevent use of tftp.exe" is
disabled by default. If it is enabled, the following exclusions must be added:
12
1. Click Start, Programs, McAfee, VirusScan Console.
2. Double-click Access Protection.
3. Select Anti-virus Standard Protection.
4. Select Prevent use of tftp.exe, and click Edit.
5. In the Processes to exclude: box, add the Backup Exec process names separated
by a comma:
NOTE: For a complete current list of processes to add, see section B, Processes
to Exclude in https://www.veritas.com/support/en_US/article.TECH152328
Environment
Summary
13
NOTE: The default location for this process is C:\Program Files\McAfee\Solidcore.
When configuring exclusions in ENS/VSE, always apply the principle that the
more precise the exclusion, the smaller the potential security risk. For
instructions to configure exclusions, refer to the following documentation:
Environment
Summary
After you install DLP Endpoint, if scanning significantly affects your system
performance, you might need to exclude DLP Endpoint content from scans. This article
contains a list of the DLP Endpoint processes and folders to exclude from being scanned
by the ENS or VSE scanning engine.
• fcags.exe
• fcagte.exe
• fcagswd.exe
• fcag.exe
14
NOTE: The default location for these processes is:
C:\Program Files\McAfee\DLP\Agent
C:\ProgramData\McAfee\DLP\
/usr/local/McAfee/DlpAgent/
/etc/cma.d/DATALOSS2000/
/usr/local/McAfee/fmp/config/DlpAgent/
15
Environment
Summary
This article describes configuration changes you can make to improve ENS/VSE
performance with MVM. It is recommended that you add all the executables and
processes for MVM to the exclusion list in ENS/VSE to avoid conflicts.
Solution
Add all the executables and processes for MVM to the ENS/VSE exclusion list to avoid
conflicts.
1. Create an On-Access Scanner low-risk process exclusion for the following MVM
processes. Disable scanning when writing to or reading from disk.
o FCAgent.exe
o FCAgentSettings.exe
o FCMConsole.exe
o FCServer.exe
o FSAPI.exe
o FSAssessment.exe
o FSDataSync.exe
o FSDiscovery.exe
o FSLogDispatcher.exe
o FSLogToDiskSvc.exe
o FSNotification.exe
o FSPatch.exe
o FCPatchInstallAgent.exe
o FCPatchInstallApiServer.exe
o FCPatchInstallController.exe
o FCPatchInstallDataSync.exe
o FCPatchInstallEngine.exe
o FCPatchInstallNotification.exe
o FCPatchInstallPortal.exe
o FCPatchInstallReportServer.exe
16
o FCPatchInstallServer.exe
o FCPatchInstallUpdate.exe
o FSScanCtrlSvc.exe
o FSScanEngineSvc.exe
o FSUpdate.exe
o FSUpdateService.exe
o LCDServices.exe
o RegFS.exe
o ReportServer.exe
o TransformerX.exe
• ENS: "Configuring exclusions" section of the Endpoint Security 10.5 Product Guide
(PD26799)
17