ASP.NET
As UMP uses ASP.NET with IIS, the folders should below should be excluded from Anti-virus scanning:
|
■
|
The physical file folders for the web sites content, whether it’s a local folder or a network share. |
The default location is mentioned below, however note that your content may reside in a different directory as well. Check the path to your website and it’s virtual directories to identify the correct path.
|
■
|
.Net Framework config directory: |
|
●
|
C:\Windows\Microsoft.NET\Framework\v2.0.50727\CONFIG |
|
●
|
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\CONFIG |
|
●
|
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Config |
|
●
|
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Config |
|
■
|
ASP.net temp file directory: |
|
●
|
C:\Windows\Microsoft.NET\Framework\v2.0.50727\Temporary ASP.NET Files |
|
●
|
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\Temporary ASP.NET Files |
|
●
|
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Temporary ASP.NET Files |
|
●
|
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Temporary ASP.NET Files |
|
■
|
IIS config folder: In case you are running IIS in shared configuration and your server hosts the configuration on a different location, ensure to exclude it from the scan. More information regarding shared configuration can be found here. |
%SystemDrive%\Windows\System32\inetsrv\config\
|
■
|
IIS Temporary Compressed Files: |
%SystemDrive%\inetpub\temp\IIS Temporary Compressed Files