
OPERATIONAL DEFECT DATABASE
...

...
The TDR Host Sensor may classify temporary files from Windows Background Intelligent Transfer Service (BITS) as malicious. These files are located in %APPDATA%\local\temp\ with names such as BITxxxx.tmp.These files are benign and do not pose a threat.
Add a custom exclusion in TDR: In the TDR Web UI, navigate to Configuration > Exclusion.Add a new exclusion for files matching c:\Users\*\Appdata\Local\Temp\BIT*.tmp There is no security risk in creating this exclusion. The temporary file in this location is incomplete and does not pose a threat. When the file download is complete, the temporary file is renamed and moved to its final destination. The TDR Host Sensor detects this move and fully scans the file when it is downloaded.
Click on a version to see all relevant bugs
WatchGuard Technologies Integration
Learn more about where this data comes from
Bug Scrub Advisor
Streamline upgrades with automated vendor bug scrubs
BugZero Enterprise
Wish you caught this bug sooner? Get proactive today.