ASP.NET

As UMP uses ASP.NET with IIS, the folders should below should be excluded from Anti-virus scanning:

The physical file folders for the web sites content, whether it’s a local folder or a network share.

The default location is mentioned below, however note that your content may reside in a different directory as well. Check the path to your website and it’s virtual directories to identify the correct path.

C:\inetpub\wwwroot
.Net Framework config directory:
C:\Windows\Microsoft.NET\Framework\v2.0.50727\CONFIG
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\CONFIG
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Config
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Config
ASP.net temp file directory:
C:\Windows\Microsoft.NET\Framework\v2.0.50727\Temporary ASP.NET Files
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\Temporary ASP.NET Files
C:\Windows\Microsoft.NET\Framework\v4.0.30319\Temporary ASP.NET Files
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Temporary ASP.NET Files
IIS config folder: In case you are running IIS in shared configuration and your server hosts the configuration on a different location, ensure to exclude it from the scan. More information regarding shared configuration can be found here.

%SystemDrive%\Windows\System32\inetsrv\config\

IIS Temporary Compressed Files:

%SystemDrive%\inetpub\temp\IIS Temporary Compressed Files