Desktop Application (FDA) Antivirus Best Practices

Objective: The goal is to set antivirus software (McAfee, Trend Micro, AVG, Nod32, Kaspersky, Symantec, etc.) so it does not do real time threat/file analysis on specific folders that are heavily used by the FileHold Desktop Application.

Real time threat analysis can impair or interfere with the operation of FileHold Desktop Application (FDA) in the areas of  importing files, checking in, checking out, adding files.

It can also interfere with scanning applications when scanning, indexing, OCR'ing, or exporting to PDF and generating the XML batch file.

Some sample screenshots are supplied using Symantec as an example.

General Overview

Add the FDA.exe as an exception from real time threat analysis via a centralized exception setting change. If on a scanning workstation, add the scanning software exe as well as an exception. Also set an exception for the working folder structure(s) used by the scanning application to create and export PDFss and XML files.

Example: C:\Scans\* (you want to make sure all scanning folders and sub folders are added. Some antivirus software does not do child folders.

Set exceptions to the following FileHold Desktop Application (FDA) folders

  1. FileHold Desktop Application > Program Folder
  • Windows 10 example: C:\Program Files (x86)\FileHold\FDA

  1. FDA User Settings Folder
  • Example for Windows 10: C:\Users\YOUR USER NAME\AppData\Roaming\FileHold\FDA

  1. My Documents \ My FileHold documents folder
  • Windows 10 example for where this folder is typically stored: C:\Users\YOURUSERNAME\Documents\My FileHold Documents

FileHold Desktop Client Local Working Folder location found in My FileHold > User Preferences:

FDA working documents folder location

Antivirus Exceptions Example: Remember to add the scanning application exe if scanning on this workstation:

Symantec exceptions for Windows 7