You should be able to add exclusions for the Visual Studio exec(s) to the access protection rule.
Can you tell me where exactly to put that exception rule, I guess I'm not sure where to look.
In ePO, go to the policy catalog. Choose VirusScan Enterprise for the product and Access Protection Policies for the category. Click on the "Edit Settings" link for the policy that is applied to the computer(s) generating the alerts. Choose "Anti-spyware Maximum Protection" under Categories, and select "Prevent all programs from running files from the Temp folder". Click on the Edit... button below the list. Under "Processes to exclude:", add whatever exe file is causing the alerts to the comma-separated list. Click OK then Save. Once the computer gets the new policy and enforces it, the alerts should no longer be generated.
If you aren't using ePO, open the VirusScan console on the computer generating the alerts. Double-click on the Access Protection task. The rest of the steps are similar to those listed above, starting at "Choose "Anti-spyware Maximum Protection" under Categories...".
Thanks so much, I guess I missed that somehow. That seems to have solved the problem.