For the last 5 years, I have not run virus protection. On many machines it can eat up a LOT of system resources and compute time unnecessarily.
In 10 and 7, I always disable defender as well. I know what some will say; and frankly, I don't care... lol. It works for me, and I have yet to get bugs on machines that mine or do their own tasks without user intervention.
I haven't gotten a virus.bug in a LONG time now.... I always check stuff in a sandbox before I use them on my real machines.
The days of the MSG_OOB bug and the like are far behind us....
I know there's always exploitable holes in windows; but they aren't as system/kernel deep as they used to be.
But on friends machines that want to earn a few bucks with their GPU, I have to do the same before I even try to download the scripts and miners, add a custom folder to the ignore list on defender, spyware and virus apps.
It's annoying how botnets caused cpuminer and sometimes ccminer to be seen as a virus. I personally am curious as to what heuristic they use to detect a miner app. It can possibly be changed with a little code shuffling in the app.
Also by using this common batch file to point at the correct mining folder in the cloud storage, all rigs runs the same copy of Claymore miner for each rig. This made my ssd clones consistent for all rigs.
are you passing an argv/argc to the batch via command line to have a rig identifier to distinguish them online? something like: "X:\>miner.bat RackMiner-1"??
In zpool I can add a miner/worker name to the password string to identify which miner is online and not.
I like your idea of leaving it on GD and executing remotely.... The cloud is a wondrous thing, but I don't like leaving my important things in others' hands... lol.