Common mistakes to avoid when defining exclusions - Microsoft Defender for Endpoint (2024)

  • Article

Applies to:

  • Microsoft Defender for Endpoint Plan 1
  • Microsoft Defender for Endpoint Plan 2
  • Microsoft Defender for Endpoint Plan 1
  • Microsoft Defender Antivirus

Platforms

  • Windows
  • macOS
  • Linux

Important

Add exclusions with caution. Exclusions for Microsoft Defender Antivirus scans reduce the level of protection for devices.

You can define an exclusion list for items that you don't want Microsoft Defender Antivirus to scan. However, excluded items could contain threats that make your device vulnerable. This article describes some common mistakes that you should avoid when defining exclusions.

Tip

Before defining your exclusion lists, see Important points about exclusions and review the detailed information in Exclusions for Microsoft Defender for Endpoint and Microsoft Defender Antivirus.

Excluding certain trusted items

Certain files, file types, folders, or processes shouldn't be excluded from scanning even though you trust that they're not malicious. Don't define exclusions for the folder locations, file extensions, and processes that are listed in the following sections:

  • Folder locations
  • File extensions
  • Processes

Folder locations

Important

Certain folders shouldn't be excluded from scans because they can end up being folders where malicious files can get dropped.

In general, don't define exclusions for any of the following folder locations:

  • %systemdrive%
  • C:, C:\, or C:\*
  • %ProgramFiles%\Java or C:\Program Files\Java
  • %ProgramFiles%\Contoso\, C:\Program Files\Contoso\, %ProgramFiles(x86)%\Contoso\, or C:\Program Files (x86)\Contoso\
  • C:\Temp, C:\Temp\, or C:\Temp\*
  • C:\Users\ or C:\Users\*
  • C:\Users\<UserProfileName>\AppData\Local\Temp\ or C:\Users\<UserProfileName>\AppData\LocalLow\Temp\. Note the following important exceptions for SharePoint: Do exclude C:\Users\ServiceAccount\AppData\Local\Temp or C:\Users\Default\AppData\Local\Temp when you use file-level antivirus protection in SharePoint.
  • %Windir%\Prefetch, C:\Windows\Prefetch, C:\Windows\Prefetch\, or C:\Windows\Prefetch\*
  • %Windir%\System32\Spool or C:\Windows\System32\Spool
  • C:\Windows\System32\CatRoot2
  • %Windir%\Temp, C:\Windows\Temp, C:\Windows\Temp\, or C:\Windows\Temp\*

Linux and macOS Platforms

In general, don't define exclusions for the following folder locations:

  • /
  • /bin or /sbin
  • /usr/lib

File extensions

Important

Certain file extensions shouldn't be excluded because they can be file types that are used in an attack.

In general, don't define exclusions for the following file extensions:

  • .7z
  • .bat
  • .bin
  • .cab
  • .cmd
  • .com
  • .cpl
  • .dll
  • .exe
  • .fla
  • .gif
  • .gz
  • .hta
  • .inf
  • .java
  • .jar
  • .job
  • .jpeg
  • .jpg
  • .js
  • .ko or .ko.gz
  • .msi
  • .ocx
  • .png
  • .ps1
  • .py
  • .rar
  • .reg
  • .scr
  • .sys
  • .tar
  • .tmp
  • .url
  • .vbe
  • .vbs
  • .wsf
  • .zip

Processes

Important

Certain processes shouldn't be excluded because they get used during attacks.

In general, don't define exclusions for the following processes:

  • AcroRd32.exe
  • addinprocess.exe
  • addinprocess32.exe
  • addinutil.exe
  • bash.exe
  • bginfo.exe
  • bitsadmin.exe
  • cdb.exe
  • csi.exe
  • cmd.exe
  • cscript.exe
  • dbghost.exe
  • dbgsvc.exe
  • dnx.exe
  • dotnet.exe
  • excel.exe
  • fsi.exe
  • fsiAnyCpu.exe
  • iexplore.exe
  • java.exe
  • kd.exe
  • lxssmanager.dll
  • msbuild.exe
  • mshta.exe
  • ntkd.exe
  • ntsd.exe
  • outlook.exe
  • psexec.exe
  • powerpnt.exe
  • powershell.exe
  • rcsi.exe
  • svchost.exe
  • schtasks.exe
  • system.management.automation.dll
  • windbg.exe
  • winword.exe
  • wmic.exe
  • wscript.exe
  • wuauclt.exe

Note

You can choose to exclude file types, such as .gif, .jpg, .jpeg, or .png if your environment has a modern, up-to-date software with a strict update policy to handle any vulnerabilities.

Linux and macOS Platforms

In general, don't define exclusions for the following processes:

  • bash
  • java
  • python and python3
  • sh
  • zsh

Using just the file name in the exclusion list

Malware might have the same name as that of a file that you trust and want to exclude from scanning. Therefore, to avoid excluding potential malware from scanning, use a fully qualified path to the file that you want to exclude instead of using just the file name. For example, if you want to exclude Filename.exe from scanning, use the complete path to the file, such as C:\program files\contoso\Filename.exe.

Using a single exclusion list for multiple server workloads

Don't use a single exclusion list to define exclusions for multiple server workloads. Split the exclusions for different application or service workloads into multiple exclusion lists. For example, the exclusion list for your IIS Server workload must be different from the exclusion list for your SQL Server workload.

Using incorrect environment variables as wildcards in the file name and folder path or extension exclusion lists

Microsoft Defender Antivirus Service runs in system context using the LocalSystem account, which means it gets information from the system environment variable, and not from the user environment variable. Use of environment variables as a wildcard in exclusion lists is limited to system variables and those applicable to processes running as an NT AUTHORITY\SYSTEM account. Therefore, don't use user environment variables as wildcards when adding Microsoft Defender Antivirus folder and process exclusions. See the table under System environment variables for a complete list of system environment variables.

See Use wildcards in the file name and folder path or extension exclusion lists for information on how to use wildcards in exclusion lists.

See also

  • Exclusions for Microsoft Defender for Endpoint and Microsoft Defender Antivirus
  • Configure custom exclusions for Microsoft Defender Antivirus
  • Configure and validate exclusions for Microsoft Defender for Endpoint on Linux
  • Configure and validate exclusions for Microsoft Defender for Endpoint on macOS

Tip

Do you want to learn more? Engage with the Microsoft Security community in our Tech Community: Microsoft Defender for Endpoint Tech Community.

Common mistakes to avoid when defining exclusions - Microsoft Defender for Endpoint (2024)
Top Articles
Steps to mount a drive with an xfs file system
Easy Protein Pancakes (Made In a Blender)
Euro (EUR), aktuální kurzy měn
Rabbits Foot Osrs
Lost Ark Thar Rapport Unlock
Fusion
Pickswise the Free Sports Handicapping Service 2023
CHESAPEAKE WV :: Topix, Craigslist Replacement
Jesse Mckinzie Auctioneer
Sinai Web Scheduler
You can put a price tag on the value of a personal finance education: $100,000
Santa Clara Valley Medical Center Medical Records
Tcu Jaggaer
Urban Dictionary Fov
ᐅ Bosch Aero Twin A 863 S Scheibenwischer
800-695-2780
Available Training - Acadis® Portal
Busted Barren County Ky
Uky Linkblue Login
Spergo Net Worth 2022
Band Of Loyalty 5E
MLB power rankings: Red-hot Chicago Cubs power into September, NL wild-card race
Morristown Daily Record Obituary
Www Va Lottery Com Result
8000 Cranberry Springs Drive Suite 2M600
The Creator Showtimes Near R/C Gateway Theater 8
Booknet.com Contract Marriage 2
Access a Shared Resource | Computing for Arts + Sciences
Unity Webgl Car Tag
Hrconnect Kp Login
Loopnet Properties For Sale
Fbsm Greenville Sc
Edward Walk In Clinic Plainfield Il
Car Crash On 5 Freeway Today
Directions To 401 East Chestnut Street Louisville Kentucky
Pinellas Fire Active Calls
Emerge Ortho Kronos
State Legislatures Icivics Answer Key
Has any non-Muslim here who read the Quran and unironically ENJOYED it?
Mixer grinder buying guide: Everything you need to know before choosing between a traditional and bullet mixer grinder
Second Chance Apartments, 2nd Chance Apartments Locators for Bad Credit
Shuaiby Kill Twitter
Gravel Racing
Tableaux, mobilier et objets d'art
Gli italiani buttano sempre più cibo, quasi 7 etti a settimana (a testa)
John Wick: Kapitel 4 (2023)
Motorcycles for Sale on Craigslist: The Ultimate Guide - First Republic Craigslist
Das schönste Comeback des Jahres: Warum die Vengaboys nie wieder gehen dürfen
Diamond Spikes Worth Aj
Craigslist Indpls Free
Sunset On November 5 2023
Salem witch trials - Hysteria, Accusations, Executions
Latest Posts
Article information

Author: Sen. Ignacio Ratke

Last Updated:

Views: 5844

Rating: 4.6 / 5 (56 voted)

Reviews: 87% of readers found this page helpful

Author information

Name: Sen. Ignacio Ratke

Birthday: 1999-05-27

Address: Apt. 171 8116 Bailey Via, Roberthaven, GA 58289

Phone: +2585395768220

Job: Lead Liaison

Hobby: Lockpicking, LARPing, Lego building, Lapidary, Macrame, Book restoration, Bodybuilding

Introduction: My name is Sen. Ignacio Ratke, I am a adventurous, zealous, outstanding, agreeable, precious, excited, gifted person who loves writing and wants to share my knowledge and understanding with you.