These PowerShell scripts generate a list of file, folder, process file extension exclusions for configuring antivirus software that will be running on an Exchange 2013 or Exchange 2016 servers. The correct exclusions are recommended to prevent antivirus software from interfering with the operation of Exchange Server.
The scripts are based on information published by Microsoft:
- Exchange Server 2013 antivirus exclusions
- Exchange Server 2016 antivirus exclusions
- Exchange Server 2019 antivirus exclusions
Use the scripts to generate the exclusion list based on a single server. You can then apply the same exclusions to all servers that have the same configuration. If your antivirus software has a policy-based administration console then that can make the configuration of multiple servers more efficient.
Run the script in the Exchange Management Shell locally on the server you wish to generate the exclusions list for.
You can download the scripts from the Github.
For Exchange 2013 servers:
.\Get-Exchange2013AVExclusions.ps1
For Exchange 2016 servers:
.\Get-Exchange2016AVExclusions.ps1
For Exchange 2016 servers running on Windows Server 2016 (and Exchange Server 2019):
.\Get-Exchange2016AVExclusions.ps1 -ConfigureWindowsDefender
Results are output to text files, which you can import or manually enter in your antivirus configuration.
Written by: Paul Cunningham Modified by: Frank Zoechling (Original script was archived and readonly)
Find me on:
- My Blog: https://paulcunningham.me
- Twitter: https://twitter.com/paulcunningham
- LinkedIn: https://au.linkedin.com/in/cunninghamp/
- Github: https://github.com/cunninghamp
Check out my books and courses to learn more about Office 365 and Exchange Server.
Additional credit:
- Matt K (via blog comment)
- Frank Zoechling FrankysWeb