There's growing evidence that anti-virus actually exposes you to more security flaws than it protects you against. Security researchers have found dozens of critical vulnerabilities in common AV clients that expose you to anything up to remote code execution. There was a recent one where a researcher emailed a proof of concept of an attack on Symantec AV to them, but it turned out they used their own AV to protect their email servers and the PoC code brought down the server:
https://www.wired.com/2016/06/symantecs-woes-expose-antivirus-software-security-gaps/
Moreover, AV is really bad at handling the most common threats out there at the moment. It's useless for defending against most ransomware for example, especially if Cryptolocker or whatever is actually on your clients and is attacking a fileshare or something. No AV will protect your files in that case.
I work for a security vendor and we strongly recommend that no AV is installed on any of the servers where our software is deployed for exactly this reason. If you want to defend yourself:
- use only the MS built in AV (whatever it's called this week - MSE or Defender or something) don't bother with anything else
- restrict access to the server, only open up those ports necessary for your applications
- wherever possible don't RDP onto a Windows server. Use remote management tools or Powershell Remoting instead
- rotate passwords frequently. If you use SSH keys on Linux/Unix, rotate them as well. Better yet, use two-factor for everything.
- implement application whitelisting
- protect all services, especially web pages, with SSL