Configuring Antivirus Software
Published : April 8, 2005 | Updated : August 17, 2005
DPM is compatible with most popular antivirus software products. However, antivirus products can affect DPM performance, and, if they are not configured properly, can cause data corruption of replicas and shadow copies. This section provides instructions for mitigating such problems.
Configuring Real-Time Monitoring for Viruses
To minimize performance degradation on the DPM server, disable antivirus real-time monitoring of replicas and transfer logs for all protected volumes by disabling real-time monitoring of the DPM process msdpmfsagent.exe, which is located in the folder Microsoft Data Protection Manager\DPM\bin. Real-time monitoring of replicas and transfer logs degrades performance because it causes the antivirus software to scan the transfer logs each time DPM synchronizes with the file server, and to scan all affected files each time DPM applies changes to the replicas.
Additionally, if you experience degraded performance while using DPM Administrator Console, disable real-time monitoring of the csc.exe process, which is located in the folder Windows\Microsoft.net\Framework\v1.1.4322. The csc.exe process is the C# compiler. Real-time monitoring of the csc.exe process can degrade performance because it causes the antivirus software to scan files that the csc.exe process emits when generating XML messages.
For instructions for configuring real-time monitoring for individual processes, see your antivirus product documentation.
Setting Options for Infected Files
To prevent data corruption of replicas and shadow copies, configure the antivirus software on the DPM server to delete infected files rather than automatically cleaning or quarantining them. Automatic cleaning and quarantining can result in data corruption because these processes cause the antivirus software to modify files with changes that DPM cannot detect. Any time that DPM attempts to synchronize a replica that has been modified by another program, data corruption of the replica and shadow copies can result. Configuring the antivirus software to delete infected files avoids this problem. Note, however, that you must run manual synchronization with consistency check each time that the antivirus software deletes files from a replica. For instructions for configuring your antivirus software to delete infected files, see the product documentation.