FileHold Desktop Application (FDA) antivirus best practices
The goal is to set antivirus software (McAfee, Trend Micro, AVG, Nod32, Kaspersky, Symantec, etc.) so it does not do real time threat/file analysis on specific folders that are heavily used by the FileHold Desktop Application.
Real time threat analysis can impair or interfere with the operation of FileHold Desktop Application (FDA) in the areas of importing files, checking in, checking out, adding files. It can also interfere with scanning applications when scanning, indexing, OCR'ing, or exporting to PDF and generating the XML batch file.
Add the FDA.exe as an exception from real time threat analysis via a centralized exception setting change. If on a scanning workstation, add the scanning software exe as well as an exception. Also set an exception for the working folder structure(s) used by the scanning application to create and export PDFss and XML files. For example: C:\Scans\* . Make sure all scanning folders and sub folders are added. Some antivirus software does not do child folders.
To set exceptions to FileHold Desktop Application (FDA) folders
- FileHold Desktop Application > Program Folder
Windows 10 example: C:\Program Files (x86)\FileHold\FDA
- FDA User Settings Folder
Windows 10 example: C:\Users\YOUR USER NAME\AppData\Roaming\FileHold\FDA
- My Documents > My FileHold documents folder. If you do not know where the working folder is, check the user preferences.
Windows 10 default location: C:\Users\YOURUSERNAME\Documents\My FileHold Documents