Slow performance or errors caused by antivirus scanning
Problem
After deploying KONNEKT, users experience one or more of the following symptoms on mapped drives:
Browsing folders is noticeably slow or times out
Opening files takes much longer than expected
File uploads fail intermittently (errors appear under Errors in the KONNEKT Explorer window)
The KONNEKT tray icon briefly turns red during normal usage
These symptoms are often intermittent, they appear during certain times of the day (typically mornings) and resolve on their own after some time.
Background
KONNEKT works online. Every file read on a KONNEKT mapped drive results in a request to SharePoint Online via the Microsoft Graph API. Microsoft applies throttling limits to these requests. When the limit is exceeded, SharePoint Online responds with HTTP 429 (Too Many Requests) and KONNEKT must wait before retrying.
Real-time antivirus (AV) scanning is one of the most common causes of unexpected throttling. When AV software scans a KONNEKT drive letter, it reads every file it encounters. Each file read consumes API capacity (called Resource Units). A single AV sweep of a library with 5,000 files can consume significant API capacity in a very short time, leaving little room for actual user activity.
This affects all real-time AV products, including:
Microsoft Defender for Endpoint
CrowdStrike Falcon
SentinelOne
Sophos
Other endpoint protection platforms
Note: This is not a bug in KONNEKT or in your AV software. It is expected behavior when real-time scanning is applied to an online-only drive. The solution is to exclude KONNEKT paths from real-time scanning.
Solution
Add exclusions for KONNEKT drive letters and processes in your AV product. The exact steps depend on your AV solution and management method.
Microsoft Defender via Intune (recommended)
If Tamper Protection is managed via Intune, you must configure exclusions through Intune Endpoint Security policy. PowerShell commands will not work when Tamper Protection is enabled.
Open the Microsoft Intune admin center
Navigate to Endpoint security > Antivirus
Create or edit a Microsoft Defender Antivirus policy
Under Configuration settings, add the following:
Path exclusions: add each KONNEKT drive letter your organization uses, e.g.:
Process exclusions:
Assign the policy to the appropriate device or user groups
Allow time for the policy to sync to endpoints
Microsoft Defender via PowerShell (fallback)
If Tamper Protection is not managed via Intune, you can use PowerShell:
Important: Replace
M:\andS:\with the actual drive letters used in your KONNEKT deployment. If you use auto-mapping, consider which drive letters are assigned to your users.
Microsoft Defender - Attack Surface Reduction (ASR) rules
If you use ASR rules, also see "Risky action blocked" for additional KONNEKT exclusions required for ASR.
CrowdStrike Falcon
Open the Falcon console
Navigate to Endpoint security > Prevention policies
Under Machine Learning and / or Sensor Visibility Exclusions, add:
Directory exclusions: Your KONNEKT drive letters (e.g. M:\, S:\)
Process exclusions: Konnekt.exe, KonnektStarter.exe
SentinelOne
Open the SentinelOne Management Console
Navigate to Sentinels > Exclusions
Add Path Exclusions for your KONNEKT drive letters
Add Process Path exclusions for:
Other AV products
For any other AV product, configure the following exclusions in your endpoint protection management console:
Path / Directory
Each KONNEKT drive letter, e.g. M:\, S:\
Process
C:\Program Files\Konnekt\Konnekt.exe
Process
C:\Program Files\Konnekt\KonnektStarter.exe
How to verify the issue
If you are unsure whether AV scanning is causing the problem, you can check using the following steps:
Open the KONNEKT Preferences (right-click the KONNEKT tray icon)
Set Log-Level to Debug (see also Debug log preparation)
Reproduce the slow behavior
In the debug log, look for repeated entries indicating throttling (HTTP 429 responses or retry messages) during periods when no user is actively working with files
If you see throttling entries occurring at regular intervals or during times when AV scheduled scans are configured, this strongly indicates AV scanning as the cause.
Recommendation
We recommend configuring AV exclusions for KONNEKT drive letters and processes before deploying KONNEKT to end users. This prevents throttling incidents from occurring during rollout and avoids user-facing errors that may generate unnecessary support tickets.
It is generally recommended to deploy these exclusions via Intune policy or GPO to ensure they are applied consistently across all devices.
See also: Offline attribute, KONNEKT's built-in mechanism to reduce bandwidth usage from previews and indexing.
Last updated
Was this helpful?