Hi all,
i use fire wall ask to allow, so i can allow of block new firewall requests.
Now Microsoft uses background updates, it creates a brand new exe in a random update folder.
From research, i think these are Microsoft Store apps (including UWP, MSIX, and newer packaged apps) and Microsoft 365 apps utilize background processes to stay updated, often checking for updates every 8 hours. These updates generally install automatically, frequently when the app is not in use, and are designed to be non-disruptive
i use the Avast exceptions options, but nothing seams to work using *\onedrivelauncher.exe
website/domain file/folder command Line
So essentially, ‘the ask to allow’ does not exempt a .exe the .exe and the folder is exempt, but its not even clear if the exceptions list covers fire wall? it says ‘‘exclude from all shields and scans.’’
‘‘All scans, Behavior Shield detections, File Shield detections, Hardened Mode detections
CyberCapture detections.
As for example;
onedrivelauncher.exe is allowed, but then Microsoft creates
05.216.1104.0002\onedrivelauncher.exe
125.222.1112.0002\onedrivelauncher.exe
and so on, across all their apps, office, excel, outlook and all the background services exes they use.
Any ideas or comments would be helpful, i presume this might just be something for Avast to tweak, so onedrivelauncher.exe can be allowed no mate what folder it pops up in
