Antivirus Exclusion List for Easy2PatchV3
Easy2Patch 3.1
To ensure optimal performance and to avoid conflicts with antivirus or endpoint protection solutions, we recommend adding the following Easy2Patch folders and files to your antivirus exclusion list.
These exclusions prevent antivirus software from interfering with critical operations such as software downloads, patch deployments, and PowerShell script executions.
Recommended Folder Exclusions
The following directory should be excluded recursively (all subfolders and files):
This folder is used to store update packages and temporary content required during patch processing.
Recommended File Exclusions
Please add the following executable and script files to your antivirus exclusion list:
C:\Program Files\Easy2Patch\Easy2Patch.exe
Main user interface executable
C:\Program Files\Easy2Patch\Easy2PatchSvc.exe
Windows service responsible for background processing
C:\Program Files\Easy2Patch\Data\Applications\DtScriptTemplate.ps1
PowerShell script template used for deployment
C:\Program Files\Easy2Patch\Resources\E2PDTTool.exe
Script runner for installing 3rd party updates
C:\Program Files\Easy2Patch\Resources\E2PUI.exe
UI support component used by internal modules
Notes
These exclusions are safe and do not pose any security risk. All files are signed and maintained by E2P.
If your antivirus solution provides options for real-time protection, on-access scanning, or script monitoring, make sure to apply the exclusions under all relevant categories.
For enterprise antivirus solutions (e.g., Microsoft Defender ATP, McAfee, Symantec, CrowdStrike, etc.), please refer to their documentation for how to set up exclusions via policies or GPO.
Example (Microsoft Defender)
If you're using Microsoft Defender Antivirus, you can apply exclusions using PowerShell:
Last updated
Was this helpful?