We have found that it is easier to set Exclusions based on process rather than the file being accessed. It easier to whitelist trusted processes rather than trying to track down hat safe file IO is acceptable.
We have also found the vendors publish files to be excluded, so for Example Microsoft recommend the following:
Richard Carpenter, CISSP
Certified McAfee Product Specialist - ePO
McAfee Volunteer Moderator