I have a managed SEP 12.1.4 installed on a Windows 7 computer with a whitelist enabled. One of the applications installed creates a series of temporary executables within the C:\Users\Username\Temp\.... folder. The file fingerprint does not capture these executables because their filename is different each time the application is run. Is there any way to create an exception to unblock the low-level folder within Temp and all of its files?
I found this article: https://support.symantec.com/en_US/article.TECH104326.html
I tried creating a folder exception in SEPM and applied it to the application and device control policy but it didn't seem to make a difference.