![]() ![]() If you configured Windows Defender to scan UNC paths, run the Microsoft Powershell script to exclude the paths from being scanned.Ĭonfigure Microsoft Defender Antivirus scanning options Windows Defender UNC paths are not scanned by default. Sophos Endpoint: File and folder exclusions do not work Sophos Endpoint Security and Control: Exclude Windows items from scanning Recommended vendor exclusions for use with Sophos products Sophos standard recommendations for servers to create exceptions Virus Scan Enterprise exclusions (Master Article) McAfee standard recommendations for servers to create exceptions ![]() Symantec standard recommendations for servers to create exceptionsĬreating Centralized Exceptions in Symantec Endpoint Protection Manager 11Ĭreating Exceptions Policies in the Endpoint Protection Manager ![]() Issues caused by antivirus software on Cluster Services that are not cluster awareĬonfiguring and viewing Forefront Endpoint Protection (FEP) group policy settingsĬonfiguring and Viewing FEP Group Policy Settings Standard Microsoft recommendations for servers running SQL Server Microsoft recommendations on antivirus exclusion for current operating systems For information, contact the vendor.Īvailable Services in Commvault Version 11Īvailable Services in Commvault Version 10 Legacy operating systems and antivirus software might require the names of processes to be truncated. Javaw.exe: Verify that the antivirus software does not lock this file.Ĭommvault processes must be excluded from antivirus read, write, and scan processes. Java.exe: Verify that the antivirus software does not lock this file. If the executables and folders are scanned by the antivirus software, it might cause some problems with the CommCell Console. The following executables and folders are used by the stand-alone CommCell console, the web-browser CommCell Console, and any workstations that access either version of the CommCell Console. If the LITE mode cache location is a shared location, exclude the UNC path of the cache On computers where the Outlook Add-In with ContentStore is installed, exclude the following folders:Ĭ:\Program Files\CVArchiverAddin or C:\Program Files (x86)\CVArchiverAddin Outlook Add-In with ContentStore Email Viewer Web Server Cache folder (HKEY_LOCAL_MACHINE\SOFTWARE\ Commvault\Galaxy\Instance001\DM2WebSearchServer\sZCACHEDATAFILESPATH) The entire CI Engine install folders (CIServer and CVCIEngine folders) Temp folder (for example, C:\Users\ Commvault Services account\AppData\Local\Temp) Note: If you use a UNC path to access the magnetic libraries, exclude the UNC path as well.įor disk libraries (CV_MAGNETIC folder), exclude the following:įor deduplication engines (CV_SIDB folder), exclude the following: The information provided is not a complete list of exclusions because the Commvault software might change with updates and new releases. The goal is for the antivirus software's rules and schedules to allow Commvault operations to run normally and complete successfully. Coordinate with your antivirus software vendor to achieve proper configuration and tuning of the antivirus software. During normal operations, monitor Commvault processes and how those processes interact with antivirus software. Test Commvault features and and functions. Also, most virus-scanning applications use real-time scanning, which can degrade performance or cause failures during Commvault backups and other operations. For example, antivirus software might lock the collect files that are generated during a backup. Improperly configured antivirus exclusions can cause outages of applications and services due to contention or file locking. To ensure stable, optimal performance for your Commvault access nodes, you must exclude certain folders and files from antivirus read, write, and scan processes. Software Upgrades, Updates, and Uninstallation >Ĭommvault for Managed Service Providers (MSPs) > Recommended Antivirus Exclusions for UNIX and Mac System and Hardware Requirements for Commvault >Īdditional Packages Installed with the CommServe ServerĬonfiguring Secured Access for Web Applications ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |