To ensure proper functionality of the Softdrive platform, we recommend configuring your endpoint detection and response (EDR) or antivirus solution to trust Softdrive components. Where possible, Softdrive strongly recommends using digital certificate–based allowlisting instead of based only on process names. Many enterprise-grade EDR solutions support verifying the digital signatures of trusted applications, which provides a more secure and resilient approach than name-based rules.
Softdrive Client / Local Computer
If security software is installed on the local computer where the Softdrive Desktop launcher is running, allowlist the following directories and processes to prevent interference with client connectivity and session stability.
Allowlisted Directories
%localappdata%\Programs\softdrive-launcher
%appdata%\softdrive-launcherAllowlisted Processes
CrashHandler.exe
SendMessageToMailSlot.exe
SoftdriveClient.exe
Softdrive.exeSoftdrive Server / Softdrive Cloud Desktop
If security software is installed on Softdrive Cloud Desktops, allowlist the directories and processes below to ensure reliable communication between the virtual desktop and the Softdrive platform.
Allowlisted Directories
Softdrive Server
C:\SoftdriveQEMU Guest Agent
C:\Program Files\Qemu-gaAllowlisted Processes
Softdrive Server
CrashHandler.exe
SendMessageToMailSlot.exe
SendMessageToServer.exe
SoftdriveServer.exe
SoftdriveServerUser.exe
SoftdriveService.exeqemu-agent
Note: qemu-ga is not currently signed by Softdrive.
qemu-ga.exeWas this article helpful?
That’s Great!
Thank you for your feedback
Sorry! We couldn't be helpful
Thank you for your feedback
Feedback sent
We appreciate your effort and will try to fix the article