To ensure stable, optimal performance for your Commvault access nodes, you must exclude certain folders and files from antivirus read, write, and scan processes.
Improperly configured antivirus exclusions can cause outages of applications and services due to contention or file locking. For example, antivirus software might lock the collect files that are generated during a backup. Also, most virus-scanning applications use real-time scanning, which can degrade performance or cause failures during Commvault backups and other operations.
Test Commvault features and and functions. During normal operations, monitor Commvault processes and how those processes interact with antivirus software. Coordinate with your antivirus software vendor to achieve proper configuration and tuning of the antivirus software. The goal is for the antivirus software's rules and schedules to allow Commvault operations to run normally and complete successfully.
The information provided is not a complete list of exclusions because the Commvault software might change with updates and new releases.
Make sure that no scheduled or on-demand antivirus scans run during Commvault backups.
Degraded backup performance and unknown backup failures might be caused by host intrusion prevention systems (HIPS).
If you experience performance and consistency problems with SQL Server when certain modules are loaded into the server, see Microsoft KB 2033238.
Exclusions to Implement
Exclude the following folders. Some of the folders might be moved outside the default installation folder.
Software installation folder
For example, /opt/commvault/**
Job Results folder
For example, /opt/commvault/iDataAgent/JobResults
Index Cache folder
For example, /opt/commvault/IndexCache
Folder to extract installation binaries: /tmp/.gxsetup
Magnetic libraries: */CV_MAGNETIC/**
The following executables and folders are used by the stand-alone CommCell console, the web-browser CommCell Console, and any workstations that access either version of the CommCell Console. If the executables and folders are scanned by the antivirus software, it might cause some problems with the CommCell Console.
Java Program Files folders
Legacy operating systems and antivirus software might require the names of processes to be truncated. For information, contact the vendor.
Related Topics, External References
Configuring and viewing Forefront Endpoint Protection (FEP) group policy settings
Symantec standard recommendations for servers to create exceptions
McAfee standard recommendations for servers to create exceptions
Sophos standard recommendations for servers to create exceptions
Windows Defender scanning options
Windows Defender UNC paths are not scanned by default. If you configured Windows Defender to scan UNC paths, run the Microsoft Powershell script to exclude the paths from being scanned.
Implementing the antivirus exclusions described in this document may increase the attack vulnerability risk to computers or network by malicious users or by malware or viruses. Before making these changes, it is recommended that the attack vulnerability risks that are associated with implementing these settings be evaluated. It is up to the discretion of the reader's and their company's policies whether to implement the guidelines recommended within this document.
Minor revisions and/or service packs that are released by application and operating system vendors are supported by our software. We will provide information on any known caveat for the revisions and/or service packs. In some cases, these revisions and/or service packs affect the working of our software. Changes to the behavior of our software resulting from an application or operating system revision/service pack may be beyond our control. The older releases of our software may not support the platforms supported in the current release. However, we will make every effort to correct the behavior in the current or future releases when necessary. Please contact your Software Provider for any problem with a specific application or operating system.
Additional considerations regarding minimum requirements and End of Life policies from application and operating system vendors are also applicable.