Using the Virtual Image Exception tool on a base image

Article:HOWTO55325  |  Created: 2011-06-29  |  Updated: 2011-12-16  |  Article URL http://www.symantec.com/docs/HOWTO55325
Article Type
How To


Subject


Using the Virtual Image Exception tool on a base image

To increase performance and security in your virtual desktop infrastructure (VDI) environment, you can leverage base images to build virtual machines. The Symantec Virtual Image Exception tool lets your clients bypass scanning base image files for threats, which reduces the resource load on disk I/O. It also improves CPU scanning process performance in your VDI environment.

Note:

Symantec Endpoint Protection supports the Virtual Image Exception tool for managed clients and unmanaged clients.

Table: Process to use the Virtual Image Exception tool describes the process for using the Virtual Image Exception tool on a base image.

Table: Process to use the Virtual Image Exception tool

Step

Action

Step 1

On the base image, perform a full scan all of the files to ensure that the files are clean.

If the Symantec Endpoint Protection client quarantines infected files, you must repair or delete the quarantined files to remove them from quarantine.

See Setting up scheduled scans that run on Windows computers.

See Specify when quarantined files are automatically deleted.

Step 2

Ensure that the client's quarantine is empty.

See Using the Risk log to delete quarantined files on your client computers.

Step 3

Run the Virtual Image Exception tool from the command line to mark the base image files.

See Running the Virtual Image Exception tool

Step 4

Enable the feature in Symantec Endpoint Protection Manager so that your clients know to look for and bypass the marked files when a scan runs.

See Bypassing the scanning of base image files.

Step 5

Remove the Virtual Image Exception tool from the base image.

The Virtual Image Exception tool supports fixed, local drives. It works with the files that conform to the New Technology File System (NTFS) standard.


Legacy ID



v52230190_v59371754


Article URL http://www.symantec.com/docs/HOWTO55325


Terms of use for this information are found in Legal Notices