Product guide

sysvol Exclude
NOTE: If any one of these folders or files have been moved or placed in a different location,
scan or exclude the equivalent element.
The location of the files or folder if it is not in the default location:
Replica_root\DO_NOT_REMOVE_NtFrs_PreInstall_Directory
DFS
The same resources that are excluded for a SYSVOL replica set must also be excluded when
FRS is used to replicate shares. These shares are mapped to the DFS root and link targets on
Windows 2000 or Windows Server 2003-based member computers or domain controllers.
For further information, refer to Microsoft Knowledge Base article:
http://support.microsoft.com/kb/822158/
Excluding administration tools from PUPs removal
VirusScan Enterprise might consider some of the system tools you use as potentially unwanted
programs (PUPs). If you configure exclusions for those files VirusScan Enterprise won't delete
them.
CAUTION: Some malware might be delivered with the same name as an administrator tool. But
VirusScan Enterprise would usually find and stop any malware attack, using other protection
processes, caused by the files described in this best practice for exclusion.
Excluding the administration tool from modification by VirusScan Enterprise requires the following
two-step process:
1 Look in the log file to determine the detection name contained in the DAT.
2 Configure an exclusion to stop the administration tool from modification.
Determine the administration tool detection name
Perform the following steps to determine the administration tool detection name:
NOTE: The following process uses the open source remote desktop software, TightVNC, as an
example.
1 Open the OnAccessScanlog.txt or Ondemandscanlog.txt files found at the following path:
C:\Documents and Settings\All Users\Application Data\McAfee\DesktopProtection
2 Find the log entry for the TightVNC PUP detection. Following is an example:
3/6/2009 4:50:17 PM No Action Taken ??????????\\administrator C:\WINDOWS\Explorer.EXE
C:\Program Files\TightVNC\vncviewer.exe RemAdm-TightVNC (Remote Admin Tool)
The following table lists the needed information from the log file output:
DescriptionExample output
Filenamevncviewer.exe
Detection name contained in the DAT.
NOTE: This is the name to use when configuring an
exclusion.
RemAdm-TightVNC
Group this Unwanted Program is associated with in the
DAT
(Remote Admin Tool)
Configuring Performance Improvements
Excluding administration tools from PUPs removal
25McAfee VirusScan Enterprise 8.8