Quantcast
Channel: Symantec Connect - Endpoint Protection - Discussions
Viewing all 10484 articles
Browse latest View live

Locked SEPM admin account ?

$
0
0
I need a solution

Hi People,

How do I reset the local admin account for SEPM console ?

The SEPM Database is running on separate SQL Server box.

Thanks,

0

AD Integrated SEPM Admin login ?

$
0
0
I need a solution

Hi All,

Due to PCI requirement, I need to separate the AD user account for Administrative purpose.

So In my case here I have already created AD security group called IT Admin group.

How do I assign the member of that group to be the SEPM v12.1 administrator so the AD credential is all managed by AD for the password and the group membership side.

Thanks,

0

SEPM - alert if service on clients hangs

$
0
0
I need a solution

Hi there fellow security guys :-)

i just had a client (W7 enterprise, SEP 12.1.6608.6300), where SEP was installed but the service was not started. Is there chance to configure an alert/a notification for that kind of status.

e.g.: if a client is reachable (ping), has a client/server OS but has no SEP installed (or is out of date) the send a mail to the admin.

any tipp would be appreciated.

cheers from austria

0
1461307354

SEPM 12.1.6 MP4 - The Installer Integrity Check Failed

$
0
0
I need a solution

I am unable to upgrade my SEPM to version 12.1.6 MP4. The setup error says the "The installer integrity check failed. Common causes for this failure include and incomplete download, damaged media, or problems with tth Trusted Root cert. store." Since I'm confident it's not an issue with the first 2, I'm guessing the install is looking for something in the cert store that's not there. Is there a specific cert. that I need to put in our Trusted Root cert. store? If so, which cert. (specifically) and where can I obtain it? Is this a new 'feature' that we have to deal with moving forward? Thanks for the help!

John

0
1461260053

SEP - IPSDefs folder keeping definitions

$
0
0
I need a solution

Hi,

I found in this folder : Chenage for whatever SEP version as -SEPVersionNumber12345-

C:\ProgramData\Symantec\Symantec Endpoint Protection\SEPVersionNumber12345\Data\Definitions\IPSDefs

In several versions including the latest, the IPSDefs folder keep the old definitions, not deleting after new one is installed.

I wonder if is needed and why SEP is not able to delete the previous ones.

Looks like the only needed definition is the last one, avalaible in:

https://www.symantec.com/security_response/definit...

Example list :

07/04/16  04.58    <DIR>          20160406.011
08/04/16  05.09    <DIR>          20160407.011
09/04/16  06.17    <DIR>          20160408.011
12/04/16  08.31    <DIR>          20160411.011
13/04/16  09.31    <DIR>          20160412.011
14/04/16  10.38    <DIR>          20160413.011
15/04/16  10.46    <DIR>          20160414.011
16/04/16  11.45    <DIR>          20160415.011
19/04/16  13.59    <DIR>          20160418.011
20/04/16  03.07    <DIR>          20160419.011
21/04/16  04.11    <DIR>          20160420.011 

Thanks,

0

Lockdown Hash Exception?

$
0
0
I need a solution

We're running 12.1.6  on the server and all the 64-bit Win7 clients. I took and merged all clients' fingerprint files and put a half dozen or so into a new Group running with the Whitelist Policy on Log Unapproved Applications. Here are my questions: 

1. If I JUST took fingerprint files and haven't installed any programs or updates since, why would it immediately start log Unapproved Applications. 

2. I have a list of Hashes, Target and Caller ones. If I have to go through and add them to an exception list, where/how is this done?  The Unapproved Applications GUI doesn't allow for right-click or export options. 

Thanks!

Lee @ TACHC

0

Firewall feature enabled

$
0
0
I need a solution

I needed to enable the Firewall feature but not the intrusion protection. Since I did that the SEP client has an error in Network Threat protection "waiting for updates" I am assuming since intrusion protection is not enabled that why am getting this error. If thats the case is that ok to leave as is? Thanks

2_0.JPG

1_0.JPG

0

Help finding "Endpoint status = Disabled" in SEP database

$
0
0
I need a solution

Hello all

I am trying to find out which table and which rows apply to the view in the SEP management console that relates to the small "Endpoint Status" window, specifically which computers have a status of Disabled...

I have tried to search myself but am coming up short, and i am not seeing much correlation between the database rows and the report from the management console.

Below is the window i am refering to.

Please if anyone could point me in the general direction it would be greatly appreciated!

status disabled.png

0

SEP clients not able to get virus definition update from SEPM

$
0
0
I need a solution

Few of our clients are not getting virus definitions update from SEPM. We not using GUP for these clients.

I run Secars test and it came out clear with an OK. I have attached Sylink file from one of the client.

Could someone please help me in this?

0

SEPM: Cannot export unique package for MacOS

$
0
0
I need a solution

I'm using SEPM 12.1.6. -  Windows 2008-R2.
I cannot export a unique package for MacOS

The Package Export finishs with the message "Succeed export".

Instead to create an unique package for MacOS (filename_*.dmg) , it created a multiples files and sub-directories.

In the pass, with SEPM 11.x, I could export the MacOS without problem.
I'm soo disappointed to using this software.

Any help, advised will be appreciated.

Thanks.

0

DoScan is not working under SYSTEM account in azure

$
0
0
I need a solution

Hi,

SEP version: 12.1.6 (12.1 RU6 MP1) 12.1.6306.6100

In Azure I have worker role which checks uploaded files for viruses using DoScan.exe utility.

It runs with NT AUTHORITY\SYSTEM account.

I tested it with EICAR test virus:

DoScan works only if I run it with current logged in admin user.

But when I run it with SYSTEM user rights (i wrote simple console app and run it with psexec.exe utility) DoScan silently finishes its execution with error code = 0. And it's unable to find this test virus.

I tried this approach: https://support.symantec.com/en_US/article.TECH199513.html

But it did not help me.

I am unable to change user in Azure environment.

So I need to run DoScan with SYSTEM account.

0

symantec virus definition not working

$
0
0
I need a solution

I have 1200 clients on SEPM but only updating 850.

I have check SEPM configuration but it's Ok.

any idea?

0

virus definition not working

$
0
0
I need a solution

i have a problem with SEPM, our SEPM have 1200 clients but only updating 850.

i have checked the SEPM configuration. My SEMP be configure how explicit group update provider  with yours GUP.

We have one GUP by region.

our devices use SEPM to update by WAN but only updated 850 devices.

any idea?

0

Communication settings not updating for vShield Security Virtual Appliances

$
0
0
I need a solution

We recently set up four vShield Shared Insight Cache security virtual appliances for our VDI system.  SInce then, we have introduced an additional SEPM server (Server-B).  At the time we created the SVAs, we only had one SEPM management server (Server-A), so the exported sylink.xml wouldn't have known about Server-B.  Server-A and Server-B are failover/load balancing peers using a shared MS-SQL database, so this setup doesn't involve replication partners.  SEPM is running 12.1 RU6 MP4, The SVAs are version 12.1.5337.5000.

I created a new communication policy for our clients which tells them to prefer Server-B, but to use Server-A with a lower priority.  The clients appear to be communicating with Server-B as desired, but I'm not convinced that our Shared Insight Cache appliances got the memo.  We are not using SSL communication.  I turned on Apache web server logging on both servers and can see all of the SVAs contacting Server-A in the access log, but never Server-B.  Our Windows clients (VDI and non-VDI) are logging entries with Server-B.

Are the vShield SVAs supposed to pick up the new communication settings like the regular Windows clients do?

If so, does it require a reboot of the SVA or some other action to trigger the change (and will that have negative impact on our VDI clients if we reboot it)?

If it is not automatic, is there a way to update the communication settings on the SVAs without creating them all over again?

Thanks.

0

Unable to install SEP and SEPM

$
0
0
I need a solution

Hi,

I had this CD that came with a "new" outdated PC which I acquired quite some time ago and I had finally decided to use it as a server. The CD was labelled as "Symantec Endpoint Protection 11.0.4". Inside the CD has SEP and SEPM which I am trying to install and it is no longer working/supported. I need advise on how to get it installed, upgraded to latest version or check the license so I can get proper techinical support on this piece of software on this CD that came with it.

1) Running the Setup.exe from the CD (for SEP Client) - Program compatibililty issues (Symantec Endpoint Protection)

2) Tried running Symantec Antivirus.msi (for SEP Client), the software seems to run and complete but SEP did start and I couldnt find the software on the server.

3) Tried running setup.exe for SEPM - Program runs but I keep hitting an error that I need to install IIS, World Wide publishing service error (which i already had the service installed).

SEP Client Version 11.0.4000.2295
SEPM Version 11.0.4000.2295

Is there a way I can find the license for either of the software that I have for a "proper" support as advise by SEP ?

0

Unexpected Server Error

$
0
0
I do not need a solution (just sharing information)

Since this morning, I am getting the subject error with no error code.

SEPM 12.1.5 running on Windows 7 Machine.

I'm afraid if I repair(through add remove program) the SEPM, I may lose all the settings.

How can I get back the SEPM in a working condition?

Thanks in advance.

0

Symantec Endpoint Manager Upgarde to 12.1.6 MR 4 hangs at SET up ACl 16%

$
0
0
I need a solution

Dear All,

My Upgarde from SEP 12.16.MR 3 to MR4 hangs showing SET UP ACL 16 %. the upgrade has completed upto to 58%. It has been like this for past 1.5 hrs nowPlsssss Help Urgeltly. Its my production environment . I am admin on server

The logs from tomcat\logs\upgrade.log

2016-04-25 09:43:46.435 THREAD 1 SEVERE: ================== Server Environment ===================
2016-04-25 09:43:46.435 THREAD 1 SEVERE: os.name = Windows Server 2008 R2
2016-04-25 09:43:46.435 THREAD 1 SEVERE: os.version = 6.1
2016-04-25 09:43:46.435 THREAD 1 SEVERE: os.arch = x64
2016-04-25 09:43:46.435 THREAD 1 SEVERE: java.version = 1.7.0_80
2016-04-25 09:43:46.450 THREAD 1 SEVERE: java.vendor = Oracle Corporation
2016-04-25 09:43:46.450 THREAD 1 SEVERE: java.vm.name = Java HotSpot(TM) Client VM
2016-04-25 09:43:46.450 THREAD 1 SEVERE: java.vm.version = 24.80-b11
2016-04-25 09:43:46.450 THREAD 1 SEVERE: java.home = C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\jre
2016-04-25 09:43:46.450 THREAD 1 SEVERE: catalina.home = C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\tomcat
2016-04-25 09:43:46.450 THREAD 1 SEVERE: java.user = null
2016-04-25 09:43:46.450 THREAD 1 SEVERE: user.language = en
2016-04-25 09:43:46.450 THREAD 1 SEVERE: user.country = US
2016-04-25 09:43:46.450 THREAD 1 SEVERE: scm.server.version = 12.1.6860.6400
2016-04-25 09:43:46.450 THREAD 1 INFO: Main> Main>> Checking upgrade arguments... Command-line argument length is: 1
2016-04-25 09:43:46.450 THREAD 1 INFO: Main> Main>> Upgrade args length = 1
2016-04-25 09:43:46.450 THREAD 1 INFO: Main> Main>> Upgrade args = SQL
2016-04-25 09:43:46.450 THREAD 1 INFO: Main> retrieveAdminInfo>> Waited for 1 seconds to get info from stdin.
2016-04-25 09:43:46.450 THREAD 1 INFO: Main> retrieveAdminInfo>> Get string from stdin = username=sa
2016-04-25 09:43:46.450 THREAD 1 INFO: Main> retrieveAdminInfo>> adminUserID = sa
2016-04-25 09:43:46.450 THREAD 1 INFO: Main> retrieveAdminInfo>> Password is received.
2016-04-25 09:43:46.450 THREAD 1 INFO: Get string from stdin:END_INPUT_FROM_STDIN
2016-04-25 09:43:46.450 THREAD 1 INFO: Main> Main>> Unable to retrieve the admin password.
2016-04-25 09:43:46.450 THREAD 1 INFO: Main> Main>> Server Home = C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\tomcat
2016-04-25 09:43:50.132 THREAD 1 INFO: Main> Main>> Database server is MSSQL. Testing DB connection... Current time = Mon Apr 25 09:43:50 AST 2016
2016-04-25 09:43:50.132 THREAD 1 INFO: DatabaseUtilities> testDBConnection>> Testing DB connection using 'DefaultDatabaseConnection' method. Parameters used (needDateFormat: false, isRetryUntilDBUp: false, defaultConnectionMaxRetry: 20)
2016-04-25 09:43:50.460 THREAD 1 INFO: Main> Main>> DB(MSSQL) test connection succeeded. Continuing with upgrade process...Current time = Mon Apr 25 09:43:50 AST 2016
2016-04-25 09:43:50.787 THREAD 1 INFO: Has valid SAV license
2016-04-25 09:43:50.787 THREAD 1 INFO: Info>> No SNAC license file in C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\tomcat\etc\license
2016-04-25 09:43:51.021 THREAD 1 INFO: Main> executePreLaunchSteps>> Config schema format is getting upgraded from (schema version from db): 12.1.6.4
2016-04-25 09:43:51.864 THREAD 1 INFO: Saving disaster recovery data to: C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\tomcat\..\Server Private Key Backup\recovery_2016-04-25-09-43-51.zip
2016-04-25 09:43:52.207 THREAD 1 INFO: Main> executePreLaunchSteps>> DbVersion: 12.1.6.4 schemaVersionFromDB: 12.1.6.4 isSpm51Mr7: false hasOtherOSAgents: false dbcompanySize: 0 dbConnected: true isTelemetryOptedInFromDB: true
2016-04-25 09:43:52.207 THREAD 1 INFO: Main> checkUpgradeFeasibility>> Checking for upgrade feasibility, current schema version = 12.1.6.5, schema version from db = 12.1.6.4
2016-04-25 09:43:52.223 THREAD 1 INFO: VersionToBeSupported: 12.1.6.4
2016-04-25 09:43:52.223 THREAD 1 INFO: SchemaVersion>> isSupported> versionToBeSupported '12.1.6.4  is supported for this release
2016-04-25 09:43:52.332 THREAD 1 INFO: Main> displayOnlineServerListIfAny>> Checking online servers. siteId = EF99E9ED0A1A05840190F6C3FA754B5C
2016-04-25 09:43:52.379 THREAD 1 INFO: SYSOUT : Checking onlist status for server VMSHOFSYMN530
2016-04-25 09:43:52.379 THREAD 1 INFO: SYSOUT : [name=VMSHOFSYMN530,id=E4230F430A1A058401926AFE775A6004] is offline
2016-04-25 09:43:52.379 THREAD 1 INFO: SYSOUT : Checking onlist status for server VMSREFSYMN669
2016-04-25 09:43:52.379 THREAD 1 INFO: SYSOUT : Not checking status. offline status detected
2016-04-25 09:43:52.379 THREAD 1 INFO: SYSOUT : [name=VMSREFSYMN669,id=58E2B5300A10054601FB2E991FDF9EF4] is offline
2016-04-25 09:43:52.379 THREAD 1 INFO: Main> displayOnlineServerListIfAny>> Checking online servers. Exclude local server id = E4230F430A1A058401926AFE775A6004
2016-04-25 09:43:52.394 THREAD 1 INFO: Main> displayOnlineServerListIfAny>> Online servers = []
2016-04-25 09:43:52.394 THREAD 1 INFO: Main> launchMainFrame>> Launching the UI.
2016-04-25 09:43:53.346 THREAD 1 INFO: DatabaseUtilities> getDatabaseConnectionWithNTLMv2Retry>> isWinAuth = false
2016-04-25 09:43:53.346 THREAD 1 INFO: DatabaseUtilities> getDatabaseConnectionWithNTLMv2Retry>> Trying jdbcURL = jdbc:jtds:sqlserver://MSHOFSQL125:1433/SymantecEPclients;instance=MSHOFSQL125;socketkeepalive=true;socketTimeout=1800
2016-04-25 09:43:53.439 THREAD 1 INFO: DatabaseUtilities> getDatabaseConnectionWithNTLMv2Retry>> Created DB connection.
2016-04-25 09:43:53.439 THREAD 1 INFO: ServerConfigurationRemediator >> needChooseLaunchServicePort >> ServerVersion.FERRARI_VERSION=12.1.4426.5000
2016-04-25 09:43:53.439 THREAD 1 INFO: ServerConfigurationRemediator >> needChooseLaunchServicePort >> needChooseLaunchServicePort=false serverVersionPreUpgrade=12.1.6608.6300
2016-04-25 09:43:53.486 THREAD 1 INFO: isLicenseInstallationValid:  sep.slf =true  OD file=true
2016-04-25 09:43:53.502 THREAD 1 INFO: MainFrame >> needShowUpgradeDBTasksConfigPanel >> skipping panel because preUpgradeVersion=12.1.6608.6300
2016-04-25 09:43:53.502 THREAD 1 INFO: MainFrame >> needShowTelemetryPanel >> skipping telemetry panel as it is already opted-in
2016-04-25 09:44:11.957 THREAD 15 INFO: Run LiveUpdate during upgrade=false
2016-04-25 09:44:11.988 THREAD 19 WARNING: Upgrade> doUpgrade>> Upgrade process started @ : 0
2016-04-25 09:44:11.988 THREAD 19 INFO: UpgradeStep >> checkUpgradeStatus.
2016-04-25 09:47:34.217 THREAD 19 WARNING: Upgrade> doUpgrade>> Stopping SemSrv...
2016-04-25 09:47:34.545 THREAD 19 INFO: The Symantec Endpoint Protection Manager service is not started.More help is available by typing NET HELPMSG 3521.
2016-04-25 09:47:34.545 THREAD 19 INFO: SemServiceManager> serviceControl>> Executed command - stop semsrv, process return value = 2
2016-04-25 09:47:34.545 THREAD 19 INFO: SemServiceManager> waitForServiceTermination>> Waiting for service termination: semsrv
2016-04-25 09:47:34.545 THREAD 19 INFO: SemServiceManager> getServiceStatus>> Retrieve status for service semsrv
2016-04-25 09:47:34.981 THREAD 19 INFO: SemServiceManager> getServiceStatus>> The status for semsrv' service is 1
2016-04-25 09:47:35.013 THREAD 19 INFO: SemServiceManager> waitForServiceTermination>> Service is stopped.
2016-04-25 09:47:35.371 THREAD 19 INFO: The Symantec Endpoint Protection Manager Webserver service is not started.More help is available by typing NET HELPMSG 3521.
2016-04-25 09:47:35.371 THREAD 19 INFO: SemServiceManager> serviceControl>> Executed command - stop semwebsrv, process return value = 2
2016-04-25 09:47:35.761 THREAD 19 INFO: The Symantec Endpoint Protection Launcher service is not started.More help is available by typing NET HELPMSG 3521.
2016-04-25 09:47:35.761 THREAD 19 INFO: SemServiceManager> serviceControl>> Executed command - stop semlaunchsrv, process return value = 2
2016-04-25 09:47:35.761 THREAD 19 INFO: SemServiceManager> waitForServiceTermination>> Waiting for service termination: semlaunchsrv
2016-04-25 09:47:35.761 THREAD 19 INFO: SemServiceManager> getServiceStatus>> Retrieve status for service semlaunchsrv
2016-04-25 09:47:36.058 THREAD 19 INFO: SemServiceManager> getServiceStatus>> The status for semlaunchsrv' service is 1
2016-04-25 09:47:36.089 THREAD 19 INFO: SemServiceManager> waitForServiceTermination>> Service is stopped.
2016-04-25 09:47:36.089 THREAD 19 WARNING: Upgrade> doUpgrade>> Stopping SemSrv done!
2016-04-25 09:47:36.105 THREAD 19 INFO: DatabaseUtilities> testDBConnection>> Testing DB connection using 'DefaultDatabaseConnection' method. Parameters used (needDateFormat: false, isRetryUntilDBUp: false, defaultConnectionMaxRetry: 20)
2016-04-25 09:47:36.401 THREAD 19 INFO: isLicenseInstallationValid:  sep.slf =true  OD file=true
2016-04-25 09:47:37.041 THREAD 19 INFO: UpgradeDBUtil> createODBC>> Creating ODBC... [dbServer: MSHOFSQL125\MSHOFSQL125, dbDomain: null, dbUser: dsa000, dbPwd: ***, dbName: SymantecEPclients, dbServerPort: 1433, dbVendor: MSSQLServer, SPMport: 8443, remotePort: 9090]
2016-04-25 09:47:37.056 THREAD 19 INFO: createODBC: the SQL Server port number:1433
2016-04-25 09:47:38.928 THREAD 19 INFO: UpgradeDBUtil> createODBC>> Creating ODBC done!
2016-04-25 09:47:38.928 THREAD 19 INFO: Upgrade> grantSEMUserSQLDBOwnerPrivilege>> Granting 'dsa000''db_owner' privilege...
2016-04-25 09:47:38.928 THREAD 19 INFO: DatabaseUtilities> getDatabaseConnectionWithNTLMv2Retry>> isWinAuth = false
2016-04-25 09:47:38.928 THREAD 19 INFO: DatabaseUtilities> getDatabaseConnectionWithNTLMv2Retry>> Trying jdbcURL = jdbc:jtds:sqlserver://MSHOFSQL125:1433/SymantecEPclients;instance=MSHOFSQL125;socketkeepalive=true;socketTimeout=1800
2016-04-25 09:47:39.069 THREAD 19 INFO: DatabaseUtilities> getDatabaseConnectionWithNTLMv2Retry>> Created DB connection.
2016-04-25 09:47:39.069 THREAD 19 INFO: Upgrade> grantSEMUserSQLDBOwnerPrivilege>> Granting 'dsa000' db_owner privilege done!
2016-04-25 09:47:39.662 THREAD 19 INFO: UpgradeStep >> checkUpgradeStatus.
2016-04-25 09:47:39.662 THREAD 19 INFO: UpgradeStep >> checkUpgradeStatus.
2016-04-25 09:47:39.662 THREAD 19 INFO: Set the config manager cache threshold to 500!
2016-04-25 09:47:39.849 THREAD 19 INFO: Upgrade> setUnrestrictedMaxLogFileSize>> Max Log File Size from DB: 20000
2016-04-25 09:47:39.849 THREAD 19 INFO: setTransactionLogSizeUnrestricted ALTER DATABASE SymantecEPclients MODIFY FILE ( NAME = SymantecEPclients_log1, MAXSIZE = UNLIMITED )
2016-04-25 09:47:40.598 THREAD 19 WARNING: Upgrade> doUpgrade>> Upgrading database schema... [formatVersion = 12.1.6.4, dbVersion = 12.1.6.4]
2016-04-25 09:47:40.629 THREAD 19 INFO: Process SQL script file:MSSQLServerPorscheMP3ToPorscheMP4.sql
2016-04-25 09:47:40.629 THREAD 19 INFO: Process SQL InputStream sqlis:sun.net.www.protocol.jar.JarURLConnection$JarURLInputStream@cdc8e7
2016-04-25 09:47:40.644 THREAD 19 INFO: DatabaseUtilities> execCommandFromScript>> cmdSeperator : ;; , sqlStr :  DROP PROCEDURE SEM_REPORT_NEW_RISK
2016-04-25 09:47:40.644 THREAD 19 INFO:  DROP PROCEDURE SEM_REPORT_NEW_RISK
2016-04-25 09:47:40.660 THREAD 19 INFO: CREATE PROCEDURE SEM_REPORT_NEW_RISK     @timebase NVARCHAR(30),      @filterDateTimeFrom NVARCHAR(19),      @filterDateTimeTo NVARCHAR(19),     @top_num INT,     @adminType INT,     @adminId NVARCHAR(32),     @domainId NVARCHAR(32),     @legacyDomainNames NVARCHAR(4000),     @legacyGroupNames NVARCHAR(4000),     @computerNameXml XML,     @ipAddressXml XML   AS  BEGIN  /* For defect 1926711, create this procedure to enhance performace */  /* If record count = 0, the procedure will return one recordset : the record count */  /* If record count > 0, the procedure will return one more recordsets: all or top num detailed records */    DECLARE @rec_count INT    DECLARE @sql NVARCHAR(4000)  DECLARE @sql_virus_query NVARCHAR(4000)  DECLARE @sql_virus_group NVARCHAR(4000)  DECLARE @sql_hpp_query NVARCHAR(4000)  DECLARE @sql_hpp_group NVARCHAR(4000)  DECLARE @top_num_str NVARCHAR(10)  DECLARE @permissionFilter NVARCHAR(MAX);  DECLARE @computerNameFilter NVARCHAR(MAX);  DECLARE @ipAddressFilter NVARCHAR(MAX);   SET CONCAT_NULL_YIELDS_NULL, ANSI_WARNINGS, ANSI_PADDING ON  SET NOCOUNT ON    EXEC SEM_GET_PERMISSION_FILTER @adminType, @adminId, @domainId, @legacyDomainNames, @legacyGroupNames, @permissionFilter OUTPUT;  EXEC SEM_GET_CLIENT_FILTER @computerNameXml, 'I.COMPUTER_NAME', @computerNameFilter OUTPUT;  EXEC SEM_GET_CLIENT_FILTER @ipAddressXml, 'I.IP_ADDR1_TEXT', @ipAddressFilter OUTPUT;      /* Define temporary tables */  CREATE TABLE #TEMP_RPT_VIRUS (VIRUSNAME_IDX VARCHAR(32), FIRSTTIME DATETIME)  CREATE TABLE #TEMP_RPT_HPP (HPP_APP_IDX VARCHAR(32), FIRSTTIME DATETIME)  CREATE TABLE #TEMP_RECORD_COUNT(RECORD_COUNT INT)    /* Extract interim result to temporary table */  SET @sql = 'INSERT INTO #TEMP_RPT_VIRUS ' +             'SELECT VIRUSNAME_IDX, MIN(' + @timebase + ')' +             'FROM ALERTS WITH(NOLOCK) ' +             'WHERE SOURCE != ''Heuristic Scan'' and ALERT_IDX in(1, 2) ' +             'GROUP BY VIRUSNAME_IDX ' +             'HAVING MIN(' + @timebase + ') >= cast({ts''' + @filterDateTimeFrom + '''} as datetime) ' +             '   AND MIN(' + @timebase + ') <= cast({ts''' + @filterDateTimeTo + '''} as datetime)'  EXECUTE sp_executesql @sql    SET @sql = 'INSERT INTO #TEMP_RPT_HPP ' +             'SELECT HPP_APP_IDX, MIN(' + @timebase + ') ' +             'FROM ALERTS WITH(NOLOCK) ' +             'WHERE SOURCE = ''Heuristic Scan'' and ALERT_IDX in(1, 2) ' +             'GROUP BY HPP_APP_IDX ' +             'HAVING MIN(' + @timebase + ') >= cast({ts''' + @filterDateTimeFrom + '''} as datetime) ' +             '   AND MIN(' + @timebase + ') <= cast({ts''' + @filterDateTimeTo + '''} as datetime)'  EXECUTE sp_executesql @sql  /* COLLATE DATABASE_DEFAULT */  SET @sql_virus_query =               'SELECT A.SERVERGROUP_IDX, A.CLIENTGROUP_IDX, A.USER_NAME, ' +                    'A.PARENTSERVER_IDX, A.SOURCE, I.COMPUTER_NAME, ' +                    'V.VIRUSNAME, V.CATEGORY, V.TYPE2, V.TYPE, V.VIRUSNAME as VirusHelp, ' +                    'convert(char,A.' + @timebase + ', 120) as firsttime, ' +                    'left(convert(char, V.DISCOVERED, 120), 10) AS Discovered, ' +                    'MIN(A.IDX) AS Alert_Idx ' +             'FROM #TEMP_RPT_VIRUS SUB ' +             'INNER JOIN ALERTS A with (NOLOCK) ON SUB.VIRUSNAME_IDX COLLATE DATABASE_DEFAULT = A.VIRUSNAME_IDX COLLATE DATABASE_DEFAULT AND SUB.firsttime = A.' + @timebase + '' +             'INNER JOIN VIRUS V with (NOLOCK) ON V.VIRUSNAME_IDX = A.VIRUSNAME_IDX ' +             'INNER JOIN V_SEM_COMPUTER I with (NOLOCK) on A.COMPUTER_IDX = I.COMPUTER_ID ' +             'INNER JOIN V_AGENT_INCL_GROUP_ID SA with (NOLOCK) on SA.COMPUTER_ID = I.COMPUTER_ID ' +             'INNER JOIN V_GROUPS G with (NOLOCK) on G.ID = SA.GROUP_ID ' +             'INNER JOIN V_DOMAINS S with (NOLOCK) on S.ID = SA.DOMAIN_ID '    SET @sql_virus_query = @sql_virus_query + ' WHERE A.ALERT_IDX IN (1,2,10) '     SET @sql_virus_group =             ' GROUP BY A.SERVERGROUP_IDX, A.CLIENTGROUP_IDX, A.USER_NAME, A.PARENTSERVER_IDX, A.SOURCE, ' +                      'I.COMPUTER_NAME, V.VIRUSNAME, V.CATEGORY, V.TYPE2, V.TYPE,  ' +                      'convert(char,A.' + @timebase + ', 120), V.DISCOVERED '    SET @sql_hpp_query =              'SELECT A.SERVERGROUP_IDX, A.CLIENTGROUP_IDX, A.USER_NAME, ' +                    'A.PARENTSERVER_IDX, A.SOURCE, I.COMPUTER_NAME, ' +                    'HP.APP_NAME as VIRUSNAME, V.CATEGORY, V.TYPE2, V.TYPE, V2.VIRUSNAME as VirusHelp, ' +                    'convert(char,A.' + @timebase + ', 120) as firsttime, ' +                    'left(convert(char, V.DISCOVERED, 120), 10) AS Discovered, ' +                    'MIN(A.IDX) AS Alert_Idx ' +             'FROM #TEMP_RPT_HPP SUB ' +             'INNER JOIN ALERTS A with (NOLOCK) ON SUB.HPP_APP_IDX COLLATE DATABASE_DEFAULT = A.HPP_APP_IDX COLLATE DATABASE_DEFAULT AND SUB.firsttime = A.' + @timebase + '' +             'INNER JOIN VIRUS V with (NOLOCK) ON  V.VIRUSNAME_IDX = A.VIRUSNAME_IDX ' +             'INNER JOIN HPP_APPLICATION HP with (NOLOCK) on HP.APP_IDX = A.HPP_APP_IDX ' +             'INNER JOIN VIRUS V2 with (NOLOCK) on V2.VIRUSNAME_IDX = HP.HELP_VIRUS_IDX ' +             'INNER JOIN V_SEM_COMPUTER I with (NOLOCK) on A.COMPUTER_IDX = I.COMPUTER_ID ' +             'INNER JOIN V_AGENT_INCL_GROUP_ID SA with (NOLOCK) on SA.COMPUTER_ID = I.COMPUTER_ID ' +             'INNER JOIN V_GROUPS G with (NOLOCK) on G.ID = SA.GROUP_ID ' +             'INNER JOIN V_DOMAINS S with (NOLOCK) on S.ID = SA.DOMAIN_ID '         SET @sql_hpp_query = @sql_hpp_query + ' WHERE A.ALERT_IDX IN (1,2,10) '    SET @sql_hpp_group =             ' GROUP BY A.SERVERGROUP_IDX, A.CLIENTGROUP_IDX, A.USER_NAME, A.PARENTSERVER_IDX, A.SOURCE, ' +                      'I.COMPUTER_NAME, HP.APP_NAME, V.CATEGORY, V.TYPE2, V.TYPE, ' +                      'convert(char,A.' + @timebase + ', 120), V.DISCOVERED, V2.VIRUSNAME '                        /* Extract the record count into #TEMP_RECORD_COUNT by using INSERT EXEC */  INSERT INTO #TEMP_RECORD_COUNT       EXEC('SELECT COUNT(1) FROM (' +                 @sql_virus_query  + @permissionFilter + @computerNameFilter + @ipAddressFilter + @sql_virus_group +           '  UNION ALL ' +                 @sql_hpp_query  + @permissionFilter + @computerNameFilter + @ipAddressFilter + @sql_hpp_group +            ') SUB')  SELECT @rec_count = RECORD_COUNT FROM #TEMP_RECORD_COUNT    /* The first record set is generated by this clause */  SELECT @rec_count as anzahl    /* The second record set is generated by EXEC */  IF (@rec_count > 0)   BEGIN      IF (@top_num = 0)            EXEC('SELECT * FROM (' +                     @sql_virus_query  + @permissionFilter + @computerNameFilter + @ipAddressFilter + @sql_virus_group +               '  UNION ALL ' +                     @sql_hpp_query + @permissionFilter + @computerNameFilter + @ipAddressFilter + @sql_hpp_group +                ') SUB ORDER BY SUB.firsttime DESC, SUB.VIRUSNAME ASC')      ELSE       BEGIN          SELECT @top_num_str = str(@top_num)          EXEC('SELECT TOP ' + @top_num_str + ' * FROM (' +                     @sql_virus_query  + @permissionFilter + @computerNameFilter + @ipAddressFilter + @sql_virus_group +               '  UNION ALL ' +                     @sql_hpp_query + @permissionFilter + @computerNameFilter + @ipAddressFilter + @sql_hpp_group +                ') SUB ORDER BY SUB.firsttime DESC, SUB.VIRUSNAME ASC')      END  END    /* Drop temporary tables */  DROP TABLE #TEMP_RPT_VIRUS  DROP TABLE #TEMP_RPT_HPP  DROP TABLE #TEMP_RECORD_COUNT    END
2016-04-25 09:47:40.676 THREAD 19 INFO:   /* used for the SONAR chart on av summary view */ DROP PROCEDURE SEM_AV_SUMMARY_SONAR
2016-04-25 09:47:40.676 THREAD 19 INFO: CREATE PROCEDURE SEM_AV_SUMMARY_SONAR     @userId char(32),     @InputXml XML,     @reportStartDate DATETIME,     @reportEndDate DATETIME,     @computerNameXml XML,     @ipAddressXml XML  AS BEGIN  DECLARE @sql NVARCHAR(MAX); DECLARE @computerNameFilter NVARCHAR(MAX); DECLARE @ipAddressFilter NVARCHAR(MAX);  SET CONCAT_NULL_YIELDS_NULL, ANSI_WARNINGS, ANSI_PADDING ON  SET NOCOUNT ON  IF NOT EXISTS (SELECT 1 FROM ADMIN_GROUPS WHERE USER_ID=@userId)    BEGIN          SELECT SUM(A.NOOFVIRUSES) as SUM, H.APP_NAME          FROM ALERTS A with (NOLOCK), V_AGENT_INCL_GROUP_ID as SA, SEM_COMPUTER as I, HPP_APPLICATION H, HPP_ALERTS HA with (NOLOCK), V_GROUPS as G, V_SERVERS as P, V_DOMAINS as S               WHERE A.HPP_APP_IDX=H.APP_IDX AND HA.IDX = A.IDX and A.SOURCE='Heuristic Scan' and A.ALERT_IDX != 9 and I.COMPUTER_ID=SA.COMPUTER_ID and I.COMPUTER_ID=A.COMPUTER_IDX                 and G.ID=SA.GROUP_ID and P.ID=SA.LAST_SERVER_ID and S.ID=SA.DOMAIN_ID and              A.ALERTDATETIME BETWEEN @reportStartDate AND @reportEndDate AND               A.MOTHER_IDX='' AND A.DELETED=0 AND               A.computer_idx in (select I.COMPUTER_ID from V_SEM_COMPUTER as I with (NOLOCK)  where  I.DELETED = 0) AND                 SA.DOMAIN_ID IN (                    SELECT ParamValues.ID.value('.', 'char(32)')          FROM @InputXml.nodes('/domainIds/domainId/text()') AS ParamValues(ID)                    )            GROUP BY H.APP_NAME ORDER BY SUM DESC     END ELSE   BEGIN      EXEC SEM_GET_CLIENT_FILTER @computerNameXml, 'I.COMPUTER_NAME', @computerNameFilter OUTPUT;     EXEC SEM_GET_CLIENT_FILTER @ipAddressXml, 'I.IP_ADDR1_TEXT', @ipAddressFilter OUTPUT;      SET @sql = 'SELECT SUM(A.NOOFVIRUSES) as SUM, H.APP_NAME          FROM ALERTS A with (NOLOCK), V_AGENT_INCL_GROUP_ID as SA, V_SEM_COMPUTER as I, HPP_APPLICATION H, HPP_ALERTS HA with (NOLOCK), V_GROUPS as G, V_SERVERS as P, V_DOMAINS as S               WHERE A.HPP_APP_IDX=H.APP_IDX AND HA.IDX = A.IDX and A.SOURCE=''Heuristic Scan'' and A.ALERT_IDX != 9 and I.COMPUTER_ID=SA.COMPUTER_ID and I.COMPUTER_ID=A.COMPUTER_IDX                 and G.ID=SA.GROUP_ID and P.ID=SA.LAST_SERVER_ID and S.ID=SA.DOMAIN_ID and              A.ALERTDATETIME BETWEEN @reportStartDate AND @reportEndDate AND               A.MOTHER_IDX='''' AND A.DELETED=0 AND               A.computer_idx in (select I.COMPUTER_ID from V_SEM_COMPUTER as I with (NOLOCK)  where  I.DELETED = 0) AND               SA.DOMAIN_ID IN (                   SELECT ParamValues.ID.value(''.'', ''char(32)'')         FROM @InputXml.nodes(''/domainIds/domainId/text()'') AS ParamValues(ID)                   )               and  SA.GROUP_ID IN (SELECT GROUP_ID FROM ADMIN_GROUPS WHERE USER_ID=@userId UNION ALL select ID from IDENTITY_MAP with (NOLOCK) where TYPE = ''LegacyGroup'') '              + @computerNameFilter + @ipAddressFilter + '              GROUP BY H.APP_NAME ORDER BY SUM DESC ';       EXEC sp_executesql @sql, N'@userId char(32), @InputXml XML, @reportStartDate DATETIME, @reportEndDate DATETIME',                                  @userId, @InputXml, @reportStartDate, @reportEndDate;   END  END
2016-04-25 09:47:40.676 THREAD 19 INFO:        /* used for the Risk Distribution by Group chart on the av summary view */ DROP PROCEDURE SEM_AV_SUMMARY_GROUP
2016-04-25 09:47:40.691 THREAD 19 INFO: CREATE PROCEDURE SEM_AV_SUMMARY_GROUP     @userId char(32),     @InputXml XML,     @reportStartDate DATETIME,     @reportEndDate DATETIME,     @computerNameXml XML,     @ipAddressXml XML  AS BEGIN  DECLARE @sql NVARCHAR(MAX); DECLARE @computerNameFilter NVARCHAR(MAX); DECLARE @ipAddressFilter NVARCHAR(MAX);  SET CONCAT_NULL_YIELDS_NULL, ANSI_WARNINGS, ANSI_PADDING ON  SET NOCOUNT ON  IF NOT EXISTS (SELECT 1 FROM ADMIN_GROUPS WHERE USER_ID=@userId)    BEGIN         SELECT G.NAME as Clientgroup, SUM(A.NOOFVIRUSES) as anzahl               FROM ALERTS as A with (NOLOCK) INNER JOIN  V_AGENT_INCL_GROUP_ID as SA with (NOLOCK) ON SA.COMPUTER_ID = A.COMPUTER_IDX INNER JOIN V_DOMAINS S on S.ID=SA.DOMAIN_ID               INNER JOIN V_SERVERS P on P.ID=SA.LAST_SERVER_ID INNER JOIN V_GROUPS G with (NOLOCK) on G.ID=SA.GROUP_ID               WHERE A.ALERT_IDX IN (1,2,10) AND               A.ALERTDATETIME BETWEEN @reportStartDate AND @reportEndDate AND              A.MOTHER_IDX='' AND A.DELETED=0 AND               A.computer_idx in (select I.COMPUTER_ID from V_SEM_COMPUTER as I with (NOLOCK)  where  I.DELETED = 0) AND                 SA.DOMAIN_ID IN (                   SELECT ParamValues.ID.value('.', 'char(32)')         FROM @InputXml.nodes('/domainIds/domainId/text()') AS ParamValues(ID)                   )                GROUP BY G.NAME ORDER BY anzahl DESC, G.NAME ASC     END ELSE   BEGIN      EXEC SEM_GET_CLIENT_FILTER @computerNameXml, 'I.COMPUTER_NAME', @computerNameFilter OUTPUT;     EXEC SEM_GET_CLIENT_FILTER @ipAddressXml, 'I.IP_ADDR1_TEXT', @ipAddressFilter OUTPUT;      SET @sql = 'SELECT G.NAME as Clientgroup, SUM(A.NOOFVIRUSES) as anzahl               FROM ALERTS as A with (NOLOCK)               INNER JOIN  V_AGENT_INCL_GROUP_ID as SA with (NOLOCK) ON SA.COMPUTER_ID = A.COMPUTER_IDX               INNER JOIN  V_SEM_COMPUTER as I with (NOLOCK) ON I.COMPUTER_ID = A.COMPUTER_IDX              INNER JOIN V_DOMAINS S on S.ID=SA.DOMAIN_ID                INNER JOIN V_SERVERS P on P.ID=SA.LAST_SERVER_ID INNER JOIN V_GROUPS G with (NOLOCK) on G.ID=SA.GROUP_ID               WHERE A.ALERT_IDX IN (1,2,10) AND               A.ALERTDATETIME BETWEEN @reportStartDate AND @reportEndDate AND              A.MOTHER_IDX='''' AND A.DELETED=0 AND               A.computer_idx in (select I.COMPUTER_ID from V_SEM_COMPUTER as I with (NOLOCK)  where  I.DELETED = 0) AND                 SA.DOMAIN_ID IN (                   SELECT ParamValues.ID.value(''.'', ''char(32)'')         FROM @InputXml.nodes(''/domainIds/domainId/text()'') AS ParamValues(ID)                   )               and  SA.GROUP_ID IN (SELECT GROUP_ID FROM ADMIN_GROUPS WHERE USER_ID=@userId UNION ALL select ID from IDENTITY_MAP with (NOLOCK) where TYPE = ''LegacyGroup'') '              + @computerNameFilter + @ipAddressFilter + '              GROUP BY G.NAME ORDER BY anzahl DESC, G.NAME ASC ';       EXEC sp_executesql @sql, N'@userId char(32), @InputXml XML, @reportStartDate DATETIME, @reportEndDate DATETIME',                                  @userId, @InputXml, @reportStartDate, @reportEndDate;   END  END
2016-04-25 09:47:40.707 THREAD 19 INFO:   /* used for the Risk Distribution by Source chart on the av summary view */ DROP PROCEDURE SEM_AV_SUMMARY_SOURCE
2016-04-25 09:47:40.707 THREAD 19 INFO: CREATE PROCEDURE SEM_AV_SUMMARY_SOURCE     @userId char(32),     @InputXml XML,     @reportStartDate DATETIME,     @reportEndDate DATETIME,     @computerNameXml XML,     @ipAddressXml XML  AS BEGIN  DECLARE @sql NVARCHAR(MAX); DECLARE @computerNameFilter NVARCHAR(MAX); DECLARE @ipAddressFilter NVARCHAR(MAX);  SET CONCAT_NULL_YIELDS_NULL, ANSI_WARNINGS, ANSI_PADDING ON  SET NOCOUNT ON  IF NOT EXISTS (SELECT 1 FROM ADMIN_GROUPS WHERE USER_ID=@userId)    BEGIN        SELECT A.SOURCE as Source, SUM(A.NOOFVIRUSES) as anzahl               FROM ALERTS as A with (NOLOCK) INNER JOIN  V_AGENT_INCL_GROUP_ID as SA with (NOLOCK) ON SA.COMPUTER_ID = A.COMPUTER_IDX INNER JOIN V_GROUPS G on G.ID=SA.GROUP_ID               INNER JOIN V_DOMAINS S on S.ID=SA.DOMAIN_ID INNER JOIN V_SERVERS P on P.ID=SA.LAST_SERVER_ID               WHERE A.ALERT_IDX IN (1,2,10) AND               A.ALERTDATETIME BETWEEN @reportStartDate AND @reportEndDate AND              A.MOTHER_IDX='' AND A.DELETED=0 AND               A.computer_idx in (select I.COMPUTER_ID from V_SEM_COMPUTER as I with (NOLOCK)  where  I.DELETED = 0) AND                 SA.DOMAIN_ID IN (                    SELECT ParamValues.ID.value('.', 'char(32)')          FROM @InputXml.nodes('/domainIds/domainId/text()') AS ParamValues(ID)                    )                              GROUP BY A.SOURCE ORDER BY anzahl DESC, A.SOURCE ASC     END ELSE   BEGIN      EXEC SEM_GET_CLIENT_FILTER @computerNameXml, 'I.COMPUTER_NAME', @computerNameFilter OUTPUT;     EXEC SEM_GET_CLIENT_FILTER @ipAddressXml, 'I.IP_ADDR1_TEXT', @ipAddressFilter OUTPUT;      SET @sql = 'SELECT A.SOURCE as Source, SUM(A.NOOFVIRUSES) as anzahl               FROM ALERTS as A with (NOLOCK)               INNER JOIN  V_AGENT_INCL_GROUP_ID as SA with (NOLOCK) ON SA.COMPUTER_ID = A.COMPUTER_IDX               INNER JOIN  V_SEM_COMPUTER as I with (NOLOCK) ON I.COMPUTER_ID = A.COMPUTER_IDX               INNER JOIN V_GROUPS G on G.ID=SA.GROUP_ID              INNER JOIN V_DOMAINS S on S.ID=SA.DOMAIN_ID INNER JOIN V_SERVERS P on P.ID=SA.LAST_SERVER_ID               WHERE A.ALERT_IDX IN (1,2,10) AND               A.ALERTDATETIME BETWEEN @reportStartDate AND @reportEndDate AND              A.MOTHER_IDX='''' AND A.DELETED=0 AND               A.computer_idx in (select I.COMPUTER_ID from V_SEM_COMPUTER as I with (NOLOCK)  where  I.DELETED = 0) AND                 SA.DOMAIN_ID IN (                    SELECT ParamValues.ID.value(''.'', ''char(32)'')          FROM @InputXml.nodes(''/domainIds/domainId/text()'') AS ParamValues(ID)                    )               and  SA.GROUP_ID IN (SELECT GROUP_ID FROM ADMIN_GROUPS WHERE USER_ID=@userId UNION ALL select ID from IDENTITY_MAP with (NOLOCK) where TYPE = ''LegacyGroup'') '              + @computerNameFilter + @ipAddressFilter + '              GROUP BY A.SOURCE ORDER BY anzahl DESC, A.SOURCE ASC ';       EXEC sp_executesql @sql, N'@userId char(32), @InputXml XML, @reportStartDate DATETIME, @reportEndDate DATETIME',                                  @userId, @InputXml, @reportStartDate, @reportEndDate;   END  END
2016-04-25 09:47:40.707 THREAD 19 INFO:   /* used for the Risk Distribution chart on the av summary view */ DROP PROCEDURE SEM_AV_SUMMARY_RISK_DIST
2016-04-25 09:47:40.722 THREAD 19 INFO: CREATE PROCEDURE SEM_AV_SUMMARY_RISK_DIST     @userId char(32),     @InputXml XML,     @reportStartDate DATETIME,     @reportEndDate DATETIME,     @computerNameXml XML,     @ipAddressXml XML AS BEGIN  DECLARE @sql NVARCHAR(MAX); DECLARE @computerNameFilter NVARCHAR(MAX); DECLARE @ipAddressFilter NVARCHAR(MAX);  SET CONCAT_NULL_YIELDS_NULL, ANSI_WARNINGS, ANSI_PADDING ON  SET NOCOUNT ON  IF NOT EXISTS (SELECT 1 FROM ADMIN_GROUPS WHERE USER_ID=@userId)    BEGIN        SELECT (CASE WHEN V.VIRUSNAME!='' THEN V.VIRUSNAME ELSE HP.APP_NAME END) AS Virusname,Count(DISTINCT A.Computer_Idx) as NumUniqueInfectedMachines                FROM ALERTS as A with (NOLOCK) INNER JOIN  SEM_AGENT as SA with (NOLOCK) ON SA.Computer_ID = A.Computer_IDX INNER JOIN V_GROUPS G on G.ID=SA.GROUP_ID                INNER JOIN V_DOMAINS S on S.ID=SA.DOMAIN_ID INNER JOIN V_SERVERS P on P.ID=SA.LAST_SERVER_ID , v_virus as V with (NOLOCK), v_hpp_application_risk as HP with (NOLOCK)                WHERE A.virusname_idx = V.virusname_idx and A.ALERT_IDX IN (1,2,10) AND A.hpp_app_idx = HP.app_idx AND                 A.ALERTDATETIME BETWEEN @reportStartDate AND @reportEndDate AND               A.MOTHER_IDX='' AND A.DELETED=0 AND                A.computer_idx in (select I.COMPUTER_ID from V_SEM_COMPUTER as I with (NOLOCK)  where  I.DELETED = 0) AND                SA.DOMAIN_ID IN (                    SELECT ParamValues.ID.value('.', 'char(32)')          FROM @InputXml.nodes('/domainIds/domainId/text()') AS ParamValues(ID)                    )                GROUP BY (CASE WHEN V.VIRUSNAME!='' THEN V.VIRUSNAME ELSE HP.APP_NAME END) ORDER BY Count(DISTINCT A.Computer_Idx) desc, Virusname asc     END ELSE   BEGIN      EXEC SEM_GET_CLIENT_FILTER @computerNameXml, 'I.COMPUTER_NAME', @computerNameFilter OUTPUT;     EXEC SEM_GET_CLIENT_FILTER @ipAddressXml, 'I.IP_ADDR1_TEXT', @ipAddressFilter OUTPUT;      SET @sql = 'SELECT (CASE WHEN V.VIRUSNAME!='''' THEN V.VIRUSNAME ELSE HP.APP_NAME END) AS Virusname,Count(DISTINCT A.Computer_Idx) as NumUniqueInfectedMachines                FROM alerts as A with (NOLOCK)                INNER JOIN  SEM_AGENT as SA with (NOLOCK) ON SA.Computer_ID = A.Computer_IDX                INNER JOIN  V_SEM_COMPUTER as I with (NOLOCK) ON I.COMPUTER_ID = A.COMPUTER_IDX               INNER JOIN V_GROUPS G on G.ID=SA.GROUP_ID                 INNER JOIN V_DOMAINS S on S.ID=SA.DOMAIN_ID INNER JOIN V_SERVERS P on P.ID=SA.LAST_SERVER_ID , v_virus as V with (NOLOCK), v_hpp_application_risk as HP with (NOLOCK)                WHERE A.virusname_idx = V.virusname_idx and A.ALERT_IDX IN (1,2,10) AND A.hpp_app_idx = HP.app_idx AND                A.ALERTDATETIME BETWEEN @reportStartDate AND @reportEndDate AND                             A.MOTHER_IDX='''' AND A.DELETED=0 AND                A.computer_idx in (select I.COMPUTER_ID from V_SEM_COMPUTER as I with (NOLOCK)  where  I.DELETED = 0) AND                SA.DOMAIN_ID IN (                    SELECT ParamValues.ID.value(''.'', ''char(32)'')          FROM @InputXml.nodes(''/domainIds/domainId/text()'') AS ParamValues(ID)                    )               and  SA.GROUP_ID IN (SELECT GROUP_ID FROM ADMIN_GROUPS WHERE USER_ID=@userId UNION ALL select ID from IDENTITY_MAP with (NOLOCK) where TYPE = ''LegacyGroup'') '               + @computerNameFilter + @ipAddressFilter + '              GROUP BY (CASE WHEN V.VIRUSNAME!='''' THEN V.VIRUSNAME ELSE HP.APP_NAME END) ORDER BY Count(DISTINCT A.Computer_Idx) desc, Virusname asc ';       EXEC sp_executesql @sql, N'@userId char(32), @InputXml XML, @reportStartDate DATETIME, @reportEndDate DATETIME',                                  @userId, @InputXml, @reportStartDate, @reportEndDate;   END  END
2016-04-25 09:47:40.722 THREAD 19 INFO:   DROP PROCEDURE SEM_GET_PERMISSION_FILTER
2016-04-25 09:47:40.722 THREAD 19 INFO: CREATE PROCEDURE SEM_GET_PERMISSION_FILTER (  @adminType INT,  @adminId CHAR(32),  @domainId CHAR(32),         @legacyDomainNames NVARCHAR(4000),         @legacyGroupNames NVARCHAR(4000),  @permissionFilter NVARCHAR(MAX) OUTPUT ) AS BEGIN    IF (@adminType = 0)   SET @permissionFilter = '';  ELSE IF(@adminType = 1)   SET @permissionFilter = ' AND (SA.DOMAIN_ID = ''' + @domainId + ''')';  ELSE    SET @permissionFilter = ' AND (SA.DOMAIN_ID = ''' + @domainId + ''')' +   ' AND SA.GROUP_ID IN (SELECT GROUP_ID FROM ADMIN_GROUPS WHERE USER_ID=''' + @adminId + ''')';  END
2016-04-25 09:47:40.722 THREAD 19 INFO:  DROP PROCEDURE SEM_GET_REBOOT_CLIENTS_COUNT
2016-04-25 09:47:40.722 THREAD 19 INFO: CREATE PROCEDURE SEM_GET_REBOOT_CLIENTS_COUNT(  @adminType INT,  @adminId CHAR(32),  @domainId CHAR(32),  @legacyDomainNames NVARCHAR(4000),  @legacyGroupNames NVARCHAR(4000),  @computerNameXml XML,  @ipAddressXml XML  ) AS BEGIN       DECLARE @Command NVARCHAR(MAX);  DECLARE @permissionFilter NVARCHAR(MAX);  DECLARE @computerNameFilter NVARCHAR(MAX);  DECLARE @ipAddressFilter NVARCHAR(MAX);   SET CONCAT_NULL_YIELDS_NULL, ANSI_WARNINGS, ANSI_PADDING ON  SET NOCOUNT ON    EXEC SEM_GET_PERMISSION_FILTER @adminType, @adminId, @domainId, @legacyDomainNames, @legacyGroupNames, @permissionFilter OUTPUT;   EXEC SEM_GET_CLIENT_FILTER @computerNameXml, 'I.COMPUTER_NAME', @computerNameFilter OUTPUT;  EXEC SEM_GET_CLIENT_FILTER @ipAddressXml, 'I.IP_ADDR1_TEXT', @ipAddressFilter OUTPUT;    SET @Command = 'SELECT count(*) as count FROM SEM_AGENT SA WITH (NOLOCK)                          INNER JOIN  V_SEM_COMPUTER AS I with (NOLOCK) ON I.COMPUTER_ID = SA.COMPUTER_ID                         WHERE SA.DELETED=0 and SA.REBOOT_REQUIRED>0 ' + @permissionFilter + @computerNameFilter + @ipAddressFilter;   EXEC sp_executesql @Command END
2016-04-25 09:47:40.769 THREAD 19 INFO:  DROP PROCEDURE SEM_GET_OUTOFDATE_CLIENTS_EE_COUNT
2016-04-25 09:47:40.769 THREAD 19 INFO: CREATE PROCEDURE SEM_GET_OUTOFDATE_CLIENTS_EE_COUNT(  @adminType INT,  @adminId CHAR(32),  @domainId CHAR(32),  @legacyDomainNames NVARCHAR(4000),  @legacyGroupNames NVARCHAR(4000),     @oldestAllowedAVDef NVARCHAR(20),   @oldestAllowedIPSSignature NVARCHAR(20),   @oldestAllowedSonar NVARCHAR(20),   @oldestAllowedDownloadAdvisor NVARCHAR(20),   @avDefsEnabled BIT,   @ipsSignaturesEnabled BIT,   @sonarDefsEnabled BIT,   @downloadAdvisorContentEnabled BIT,  @computerNameXml XML,  @ipAddressXml XML  ) AS  BEGIN DECLARE @sql NVARCHAR(MAX); DECLARE @permissionFilter NVARCHAR(MAX); DECLARE @computerNameFilter NVARCHAR(MAX); DECLARE @ipAddressFilter NVARCHAR(MAX);  SET CONCAT_NULL_YIELDS_NULL, ANSI_WARNINGS, ANSI_PADDING ON SET NOCOUNT ON   EXEC SEM_GET_PERMISSION_FILTER @adminType, @adminId, @domainId, @legacyDomainNames, @legacyGroupNames, @permissionFilter OUTPUT; EXEC SEM_GET_CLIENT_FILTER @computerNameXml, 'I.COMPUTER_NAME', @computerNameFilter OUTPUT; EXEC SEM_GET_CLIENT_FILTER @ipAddressXml, 'I.IP_ADDR1_TEXT', @ipAddressFilter OUTPUT;  SET @sql =   'SELECT count(SA.AGENT_ID) AS COUNT  FROM V_AGENT_INCL_GROUP_ID AS SA WITH (NOLOCK)  INNER JOIN  V_SEM_COMPUTER AS I with (NOLOCK) ON I.COMPUTER_ID = SA.COMPUTER_ID  WHERE SA.DELETED=0   AND SA.STATUS=1   AND SA.R_OS_TYPE NOT IN (269091840, 269092096, 269092352, 269092608, 269092864, 269093120,269093376,269093632)   AND SA.R_OS_TYPE & 0xF0FF0000 NOT IN (0x20000000)       AND SA.AGENT_TYPE=105   AND (SA.AGENT_ID IN      (SELECT SA.AGENT_ID       FROM V_AGENT_INCL_GROUP_ID AS SA WITH (NOLOCK)       LEFT OUTER JOIN PATTERN PAT ON SA.PATTERN_IDX=PAT.PATTERN_IDX       WHERE SA.AP_ONOFF NOT IN (2, 127)        AND MAJOR_VERSION != 5        AND PAT.PATTERN_TYPE=''VIRUS_DEFS''       AND (PAT.VERSION IS NULL          OR PAT.VERSION <= ''' + @oldestAllowedAVDef + ''')        AND (' + CAST(@avDefsEnabled AS VARCHAR(1)) + ' = 1 ))     OR SA.AGENT_ID IN      (SELECT SA.AGENT_ID       FROM V_AGENT_INCL_GROUP_ID SA WITH (NOLOCK)       LEFT OUTER JOIN SEM_CONTENT SC WITH (NOLOCK) ON SC.AGENT_ID=SA.AGENT_ID       AND SC.DELETED=0       LEFT OUTER JOIN V_IPS ON SC.PATTERN_IDX=V_IPS.PATTERN_IDX       INNER JOIN V_SEM_COMPUTER I WITH (NOLOCK) ON I.COMPUTER_ID=SA.COMPUTER_ID       WHERE ((SA.MAJOR_VERSION = 11         AND SA.FIREWALL_ONOFF NOT IN (2, 127))        OR (SA.MAJOR_VERSION = 12         AND SA.MINOR_VERSION = 0         AND SA.FIREWALL_ONOFF NOT IN (2, 127))        OR (SA.MAJOR_VERSION = 12         AND SA.MINOR_VERSION > 0         AND SA.CIDS_DRV_ONOFF NOT IN (2, 127))        OR (SA.MAJOR_VERSION > 12         AND SA.CIDS_DRV_ONOFF NOT IN (2, 127)))        AND (V_IPS.DELETED=0          OR V_IPS.DELETED IS NULL)        AND SA.MAJOR_VERSION>10        AND ' + CAST(@ipsSignaturesEnabled AS VARCHAR(1)) + ' = 1       GROUP BY SA.AGENT_ID HAVING ((MAX(V_IPS.VERSION) IS NULL)               OR (MAX(V_IPS.VERSION) <= ''' + @oldestAllowedIPSSignature + ''')))     OR SA.AGENT_ID IN      (SELECT SA.AGENT_ID       FROM V_AGENT_INCL_GROUP_ID SA WITH (NOLOCK)       LEFT OUTER JOIN SEM_CONTENT SC WITH (NOLOCK) ON SC.AGENT_ID=SA.AGENT_ID       AND SC.DELETED=0       LEFT OUTER JOIN V_SONAR ON SC.PATTERN_IDX=V_SONAR.PATTERN_IDX       WHERE (V_SONAR.DELETED=0        OR V_SONAR.DELETED IS NULL)        AND SA.MAJOR_VERSION>10        AND SA.PTP_ONOFF NOT IN (2, 127)        AND ' + CAST(@sonarDefsEnabled AS VARCHAR(1)) + ' = 1       GROUP BY SA.AGENT_ID HAVING (MAX(V_SONAR.VERSION) IS NULL               OR MAX(V_SONAR.VERSION) <= ''' + @oldestAllowedSonar + '''))     OR SA.AGENT_ID IN      (SELECT SA.AGENT_ID       FROM V_AGENT_INCL_GROUP_ID SA WITH (NOLOCK)       LEFT OUTER JOIN SEM_CONTENT SC WITH (NOLOCK) ON SC.AGENT_ID=SA.AGENT_ID       AND SC.DELETED=0       LEFT OUTER JOIN V_MR_CLEAN ON SC.PATTERN_IDX=V_MR_CLEAN.PATTERN_IDX       WHERE SA.AGENT_TYPE=''105''       AND SA.DELETED=0        AND (V_MR_CLEAN.DELETED=0          OR V_MR_CLEAN.DELETED IS NULL)        AND SA.STATUS=1        AND SA.MAJOR_VERSION>10        AND SA.DA_ONOFF NOT IN (2, 127)        AND SA.CIDS_DRV_ONOFF NOT IN (2, 127)        AND ' + CAST(@downloadAdvisorContentEnabled AS VARCHAR(1)) + ' = 1       GROUP BY SA.AGENT_ID HAVING (MAX(V_MR_CLEAN.VERSION) IS NULL               OR MAX(V_MR_CLEAN.VERSION) <= ''' + @oldestAllowedDownloadAdvisor + '''))) ' + @permissionFilter   + @computerNameFilter + @ipAddressFilter;  EXEC sp_executesql @sql; END
2016-04-25 09:47:40.785 THREAD 19 INFO:  DROP PROCEDURE SEM_GET_OUTOFDATE_CLIENTS_MAC_EE_COUNT
2016-04-25 09:47:40.785 THREAD 19 INFO: CREATE PROCEDURE SEM_GET_OUTOFDATE_CLIENTS_MAC_EE_COUNT(  @adminType INT,  @adminId CHAR(32),  @domainId CHAR(32),  @legacyDomainNames NVARCHAR(4000),  @legacyGroupNames NVARCHAR(4000),     @oldestAllowedAVDef NVARCHAR(20),   @oldestAllowedIPSSignature NVARCHAR(20),  @outdatedAVDef NVARCHAR(20),  @outdatedIPSSig NVARCHAR(20),  @avDefsEnabled BIT,   @ipsSignaturesEnabled BIT,  @computerNameXml XML,  @ipAddressXml XML  ) AS  BEGIN DECLARE @sql NVARCHAR(MAX); DECLARE @permissionFilter NVARCHAR(MAX); DECLARE @computerNameFilter NVARCHAR(MAX); DECLARE @ipAddressFilter NVARCHAR(MAX);  SET CONCAT_NULL_YIELDS_NULL, ANSI_WARNINGS, ANSI_PADDING ON SET NOCOUNT ON   EXEC SEM_GET_PERMISSION_FILTER @adminType, @adminId, @domainId, @legacyDomainNames, @legacyGroupNames, @permissionFilter OUTPUT; EXEC SEM_GET_CLIENT_FILTER @computerNameXml, 'I.COMPUTER_NAME', @computerNameFilter OUTPUT; EXEC SEM_GET_CLIENT_FILTER @ipAddressXml, 'I.IP_ADDR1_TEXT', @ipAddressFilter OUTPUT;  SET @sql =   'SELECT count(*) AS COUNT  FROM V_AGENT_INCL_GROUP_ID AS SA WITH (NOLOCK)  INNER JOIN  V_SEM_COMPUTER AS I with (NOLOCK) ON I.COMPUTER_ID = SA.COMPUTER_ID  WHERE SA.DELETED=0         AND SA.STATUS=1     AND SA.DELETED=0     AND (SA.AGENT_ID IN              (SELECT SA.AGENT_ID               FROM SEM_AGENT AS SA WITH (NOLOCK)               LEFT OUTER JOIN PATTERN PAT ON SA.PATTERN_IDX=PAT.PATTERN_IDX               WHERE SA.AP_ONOFF NOT IN (2,127)                   AND SA.DELETED=0                   AND SA.STATUS=1                   AND MAJOR_VERSION != 5                   AND SA.AGENT_TYPE=105                   AND PAT.PATTERN_TYPE=''VIRUS_DEFS''      AND (' + CAST(@avDefsEnabled AS VARCHAR(1)) + ' = 1 )                   AND (PAT.VERSION IS NULL                        OR PAT.VERSION <= (CASE             WHEN SA.R_OS_TYPE NOT IN (269091840, 269092096, 269092352, 269092608, 269092864, 269093120,269093376,269093632)             AND SA.R_OS_TYPE & 0xF0FF0000 NOT IN (0x20000000) THEN ''' + @oldestAllowedAVDef + '''             WHEN (SA.R_OS_TYPE IN (269091840, 269092096, 269092352, 269092608, 269092864, 269093120,269093376,269093632)             OR SA.R_OS_TYPE & 0xF0FF0000 IN (0x20000000)) THEN ''' + @outdatedAVDef + ''' END ))                   )          OR SA.AGENT_ID IN              (SELECT SA.AGENT_ID               FROM SEM_AGENT SA WITH (NOLOCK)               LEFT OUTER JOIN SEM_CONTENT SC WITH (NOLOCK) ON SC.AGENT_ID=SA.AGENT_ID               AND SC.DELETED=0               LEFT OUTER JOIN V_IPS ON SC.PATTERN_IDX=V_IPS.PATTERN_IDX               INNER JOIN V_SEM_COMPUTER I WITH (NOLOCK) ON I.COMPUTER_ID=SA.COMPUTER_ID               WHERE ((MAJOR_VERSION = 11                       AND SA.FIREWALL_ONOFF NOT IN (2, 127))                      OR (MAJOR_VERSION = 12                          AND MINOR_VERSION = 0                          AND SA.FIREWALL_ONOFF NOT IN (2, 127))                      OR (MAJOR_VERSION = 12                          AND MINOR_VERSION > 0                          AND SA.CIDS_DRV_ONOFF NOT IN (2, 127))                      OR (MAJOR_VERSION > 12                          AND SA.CIDS_DRV_ONOFF NOT IN (2, 27)))                   AND SA.DELETED=0                   AND SA.STATUS=1                   AND (V_IPS.DELETED=0                        OR V_IPS.DELETED IS NULL)                                     AND SA.AGENT_TYPE=105                   AND SA.MAJOR_VERSION>10       AND ' + CAST(@ipsSignaturesEnabled AS VARCHAR(1)) + ' = 1                     GROUP BY SA.AGENT_ID,                        SA.R_OS_TYPE HAVING ((MAX(V_IPS.VERSION) IS NULL)                                             OR (MAX(V_IPS.VERSION) <=(CASE                    WHEN SA.R_OS_TYPE NOT IN (269091840, 269092096, 269092352, 269092608, 269092864, 269093120, 269093376, 269093632)                    AND SA.R_OS_TYPE & 0xF0FF0000 NOT IN (0x20000000) THEN ''' + @oldestAllowedIPSSignature + '''                    WHEN (SA.R_OS_TYPE IN (269091840, 269092096, 269092352, 269092608, 269092864, 269093120, 269093376, 269093632)                                                                             OR SA.R_OS_TYPE & 0xF0FF0000 IN (0x20000000)) THEN ''' + @outdatedIPSSig + ''' END )))))     AND SA.R_OS_TYPE IN (269091840, 269092096, 269092352, 269092608, 269092864, 269093120, 269093376, 269093632) ' + @permissionFilter + @computerNameFilter + @ipAddressFilter;  EXEC sp_executesql @sql; END
2016-04-25 09:47:40.800 THREAD 19 INFO:  DROP PROCEDURE SEM_GET_OUTOFDATE_CLIENTS_LINUX_EE_COUNT
2016-04-25 09:47:40.800 THREAD 19 INFO: CREATE PROCEDURE SEM_GET_OUTOFDATE_CLIENTS_LINUX_EE_COUNT(  @adminType INT,  @adminId CHAR(32),  @domainId CHAR(32),  @legacyDomainNames NVARCHAR(4000),  @legacyGroupNames NVARCHAR(4000),     @oldestAllowedAVDef NVARCHAR(20),    @outdatedAVDef NVARCHAR(20),   @avDefsEnabled BIT,         @computerNameXml XML,         @ipAddressXml XML  ) AS  BEGIN DECLARE @sql NVARCHAR(MAX); DECLARE @permissionFilter NVARCHAR(MAX); DECLARE @computerNameFilter NVARCHAR(MAX); DECLARE @ipAddressFilter NVARCHAR(MAX);  SET CONCAT_NULL_YIELDS_NULL, ANSI_WARNINGS, ANSI_PADDING ON SET NOCOUNT ON   EXEC SEM_GET_PERMISSION_FILTER @adminType, @adminId, @domainId, @legacyDomainNames, @legacyGroupNames, @permissionFilter OUTPUT; EXEC SEM_GET_CLIENT_FILTER @computerNameXml, 'I.COMPUTER_NAME', @computerNameFilter OUTPUT; EXEC SEM_GET_CLIENT_FILTER @ipAddressXml, 'I.IP_ADDR1_TEXT', @ipAddressFilter OUTPUT;  SET @sql =   'SELECT count(*) AS COUNT  FROM SEM_AGENT AS SA WITH (NOLOCK)  INNER JOIN  V_SEM_COMPUTER AS I with (NOLOCK) ON I.COMPUTER_ID = SA.COMPUTER_ID  WHERE SA.DELETED=0     AND SA.STATUS=1     AND SA.DELETED=0     AND SA.AGENT_ID IN         (SELECT SA.AGENT_ID          FROM SEM_AGENT AS SA WITH (NOLOCK)          LEFT OUTER JOIN PATTERN PAT ON SA.PATTERN_IDX=PAT.PATTERN_IDX          WHERE SA.AP_ONOFF NOT IN (2, 127)              AND SA.DELETED=0              AND SA.STATUS=1              AND MAJOR_VERSION != 5              AND SA.AGENT_TYPE=105              AND PAT.PATTERN_TYPE=''VIRUS_DEFS''    AND (' + CAST(@avDefsEnabled AS VARCHAR(1)) + ' = 1 )              AND (PAT.VERSION IS NULL                   OR PAT.VERSION <= (CASE            WHEN SA.R_OS_TYPE NOT IN (269091840, 269092096, 269092352, 269092608, 269092864, 269093120, 269093376, 269093632)            AND SA.R_OS_TYPE & 0xF0FF0000 NOT IN (0x20000000) THEN ''' + @oldestAllowedAVDef + '''            WHEN (SA.R_OS_TYPE IN (269091840, 269092096, 269092352, 269092608, 269092864, 269093120, 269093376, 269093632)                                             OR SA.R_OS_TYPE & 0xF0FF0000 IN (0x20000000)) THEN ''' + @outdatedAVDef + ''' END )) )     AND SA.R_OS_TYPE & 0xF0FF0000 IN (0x20000000) ' + @permissionFilter + @computerNameFilter + @ipAddressFilter;  EXEC sp_executesql @sql; END
2016-04-25 09:47:40.800 THREAD 19 INFO:  DROP PROCEDURE SEM_HOMEPAGE_UNMANAGED_MACHINEs
2016-04-25 09:47:40.800 THREAD 19 INFO: CREATE PROCEDURE SEM_HOMEPAGE_UNMANAGED_MACHINES     @userId char(32),     @InputXml XML,     @computerNameXml XML,     @ipAddressXml XML AS BEGIN  DECLARE @sql NVARCHAR(MAX); DECLARE @computerNameFilter NVARCHAR(MAX); DECLARE @ipAddressFilter NVARCHAR(MAX);  SET CONCAT_NULL_YIELDS_NULL, ANSI_WARNINGS, ANSI_PADDING ON  SET NOCOUNT ON  IF NOT EXISTS (SELECT 1 FROM ADMIN_GROUPS WHERE USER_ID=@userId)    BEGIN        SELECT COUNT(*)  as anzahl from                  (SELECT  DISTINCT L.MAC_ADDRESS, L.IP_ADDRESS, COM.COMPUTER_NAME                     FROM LAN_DEVICE_DETECTED L with (NOLOCK), SEM_COMPUTER COM with (NOLOCK), V_AGENT_INCL_GROUP_ID SA with (NOLOCK)                              WHERE L.COMPUTER_ID = COM.COMPUTER_ID AND L.DELETED = 0 AND COM.DELETED = 0         AND COM.COMPUTER_ID = SA.COMPUTER_ID AND SA.DELETED = 0                               AND L.MAC_ADDRESS NOT IN (SELECT MAC_ADDR1 FROM SEM_COMPUTER with (NOLOCK) WHERE MAC_ADDR1 IS NOT NULL)                              AND L.MAC_ADDRESS NOT IN (SELECT MAC_ADDR2 FROM SEM_COMPUTER with (NOLOCK) WHERE MAC_ADDR2 IS NOT NULL)                              AND L.MAC_ADDRESS NOT IN (SELECT MAC_ADDR3 FROM SEM_COMPUTER with (NOLOCK) WHERE MAC_ADDR3 IS NOT NULL)                              AND L.MAC_ADDRESS NOT IN (SELECT MAC_ADDR4 FROM SEM_COMPUTER with (NOLOCK) WHERE MAC_ADDR4 IS NOT NULL)                              AND NOT EXISTS (SELECT *                              FROM LAN_DEVICE_EXCLUDED E with (NOLOCK)                              WHERE L.HASH = E.HASH AND E.DELETED = 0                              AND ( (E.EXCLUDE_MODE = 0 AND E.MAC_ADDRESS = L.MAC_ADDRESS)                              OR (E.EXCLUDE_MODE = 1 AND E.IP_ADDRESS = L.IP_ADDRESS)                              OR (E.EXCLUDE_MODE = 2 AND L.IP_ADDRESS >= E.IP_RANGE_START AND L.IP_ADDRESS <= E.IP_RANGE_END)                              ))                         AND EXISTS (         SELECT * FROM SEM_AGENT SA with (NOLOCK)                              WHERE SA.AGENT_ID = L.AGENT_ID)                                  and SA.DOMAIN_ID IN (                                    SELECT ParamValues.ID.value('.', 'char(32)')                    FROM @InputXml.nodes('/domainIds/domainId/text()') AS ParamValues(ID)                                )                    )                   as UNMANAGED_MACHINES     END ELSE   BEGIN      EXEC SEM_GET_CLIENT_FILTER @computerNameXml, 'COM.COMPUTER_NAME', @computerNameFilter OUTPUT;     EXEC SEM_GET_CLIENT_FILTER @ipAddressXml, 'COM.IP_ADDR1_TEXT', @ipAddressFilter OUTPUT;      SET @sql = 'SELECT COUNT(*)  as anzahl from (SELECT  DISTINCT L.MAC_ADDRESS, L.IP_ADDRESS, COM.COMPUTER_NAME                       FROM LAN_DEVICE_DETECTED L with (NOLOCK), V_SEM_COMPUTER COM with (NOLOCK), V_AGENT_INCL_GROUP_ID SA with (NOLOCK)                              WHERE L.COMPUTER_ID = COM.COMPUTER_ID AND L.DELETED = 0 AND COM.DELETED = 0         AND COM.COMPUTER_ID = SA.COMPUTER_ID AND SA.DELETED = 0                               AND L.MAC_ADDRESS NOT IN (SELECT MAC_ADDR1 FROM SEM_COMPUTER with (NOLOCK) WHERE MAC_ADDR1 IS NOT NULL)                              AND L.MAC_ADDRESS NOT IN (SELECT MAC_ADDR2 FROM SEM_COMPUTER with (NOLOCK) WHERE MAC_ADDR2 IS NOT NULL)                              AND L.MAC_ADDRESS NOT IN (SELECT MAC_ADDR3 FROM SEM_COMPUTER with (NOLOCK) WHERE MAC_ADDR3 IS NOT NULL)                              AND L.MAC_ADDRESS NOT IN (SELECT MAC_ADDR4 FROM SEM_COMPUTER with (NOLOCK) WHERE MAC_ADDR4 IS NOT NULL)                              AND NOT EXISTS (SELECT *                              FROM LAN_DEVICE_EXCLUDED E with (NOLOCK)                              WHERE L.HASH = E.HASH AND E.DELETED = 0                              AND ( (E.EXCLUDE_MODE = 0 AND E.MAC_ADDRESS = L.MAC_ADDRESS)                              OR (E.EXCLUDE_MODE = 1 AND E.IP_ADDRESS = L.IP_ADDRESS)                              OR (E.EXCLUDE_MODE = 2 AND L.IP_ADDRESS >= E.IP_RANGE_START AND L.IP_ADDRESS <= E.IP_RANGE_END)                              )                  ) AND EXISTS (         SELECT * FROM SEM_AGENT SA with (NOLOCK)                              WHERE SA.AGENT_ID = L.AGENT_ID)                                 
2016-04-25 09:47:51.830 THREAD 19 INFO: SoftwarePackage is suspended. ID=1FFF4F99964DAE77DEA84E84170465E3
2016-04-25 09:47:51.830 THREAD 19 INFO: fixSoftwarePackageBrokenLinks>> Checking software package ID=E289F88B78EC6632E671B71C59B9205C
2016-04-25 09:47:51.830 THREAD 19 INFO: SoftwarePackage is suspended. ID=E289F88B78EC6632E671B71C59B9205C
2016-04-25 09:47:51.830 THREAD 19 INFO: fixSoftwarePackageBrokenLinks>> Checking software package ID=270FC2D89460177D5F2605D11CB93A51
2016-04-25 09:47:51.830 THREAD 19 INFO: SoftwarePackage is suspended. ID=270FC2D89460177D5F2605D11CB93A51
2016-04-25 09:47:51.830 THREAD 19 INFO: fixSoftwarePackageBrokenLinks>> Checking software package ID=3165FD56C5790BC3ED69F8C9E0099ADF
2016-04-25 09:47:51.830 THREAD 19 INFO: SoftwarePackage is suspended. ID=3165FD56C5790BC3ED69F8C9E0099ADF
2016-04-25 09:47:51.830 THREAD 19 INFO: fixSoftwarePackageBrokenLinks>> Checking software package ID=0404E0AC0E28C308610C28E0BAFE6367
2016-04-25 09:47:51.830 THREAD 19 INFO: fixSoftwarePackageBrokenLinks>> Checking software package ID=6FD723D39B5F3D8E62B86D5A5DC1E232
2016-04-25 09:47:51.830 THREAD 19 INFO: fixSoftwarePackageBrokenLinks>> Checking software package ID=53457F1FE2F251872E7E02F171C8ED02
2016-04-25 09:47:51.845 THREAD 19 INFO: fixSoftwarePackageBrokenLinks>> Checking software package ID=C224E84E11BD91392706712CE336A3AE
2016-04-25 09:47:51.845 THREAD 19 INFO: fixSoftwarePackageBrokenLinks>> Checking software package ID=4EB44BB54A6238562C52986B94E2C0CC
2016-04-25 09:47:51.845 THREAD 19 INFO: fixSoftwarePackageBrokenLinks>> Checking software package ID=F0CE257F5B642F83C446A3CCEDBAB5CD
2016-04-25 09:47:51.845 THREAD 19 INFO: fixSoftwarePackageBrokenLinks>> Checking software package ID=6330BE06E85FF9F2F5C19C24B060B83C
2016-04-25 09:47:51.845 THREAD 19 INFO: fixSoftwarePackageBrokenLinks>> Checking software package ID=730704A740E1F4B04124D430FE2781C0
2016-04-25 09:47:51.861 THREAD 19 INFO: fixSoftwarePackageBrokenLinks>> Checking software package ID=3F18CB63DC910BAD38D8264CF50685F7
2016-04-25 09:47:51.861 THREAD 19 INFO: fixSoftwarePackageBrokenLinks>> Checking software package ID=EE94B066A1C27AAEA0C39F52967EF1AA
2016-04-25 09:47:51.861 THREAD 19 INFO: fixSoftwarePackageBrokenLinks>> Checking software package ID=A37A825AE77951D3FEC089804C776D7D
2016-04-25 09:47:51.861 THREAD 19 INFO: fixSoftwarePackageBrokenLinks>> Checking software package ID=639F39F14C29871607F23C3BF2FB638C
2016-04-25 09:47:51.861 THREAD 19 INFO: fixSoftwarePackageBrokenLinks>> Checking software package ID=88232EB9083FB9F435A7E5E69C95396E
2016-04-25 09:47:51.861 THREAD 19 INFO: fixSoftwarePackageBrokenLinks>> Checking software package ID=D3D4765E8DCE9EBA1CBB67F12ECFDC8B
2016-04-25 09:47:51.877 THREAD 19 INFO: fixSoftwarePackageBrokenLinks>> Checking software package ID=DF7207197B28370E934700B3A04E8597
2016-04-25 09:47:51.877 THREAD 19 INFO: fixSoftwarePackageBrokenLinks>> Checking software package ID=4FD0381B96AC092F1638F8A2B2CA9EC4
2016-04-25 09:47:51.877 THREAD 19 INFO: fixSoftwarePackageBrokenLinks>> Checking software package ID=C17C90262AD7902249837F84C893A408
2016-04-25 09:47:51.877 THREAD 19 INFO: fixSoftwarePackageBrokenLinks>> Checking software package ID=B71AC45A4AAD3DD5E1B2CE762901C115
2016-04-25 09:47:51.877 THREAD 19 INFO: fixSoftwarePackageBrokenLinks>> Checking software package ID=A8C5792E8C22B7F6E684D61C3DCA07CF
2016-04-25 09:47:51.892 THREAD 19 INFO: fixSoftwarePackageBrokenLinks>> Checking software package ID=077E124FB0B52DFC8718EFE0C04026EF
2016-04-25 09:47:51.892 THREAD 19 INFO: fixSoftwarePackageBrokenLinks>> Checking software package ID=10AADE463CC25D08C37CD211EF445579
2016-04-25 09:47:51.892 THREAD 19 INFO: fixSoftwarePackageBrokenLinks>> Checking software package ID=3A0433DA13790F96533761F89988C0BD
2016-04-25 09:47:51.892 THREAD 19 INFO: fixSoftwarePackageBrokenLinks>> Checking software package ID=64741E7B57D2BEB24037F000CCB6126D
2016-04-25 09:47:51.892 THREAD 19 INFO: fixSoftwarePackageBrokenLinks>> Finished.
2016-04-25 09:47:51.955 THREAD 19 INFO: fixAppProtectPolicyForSEP11>> Started.
2016-04-25 09:47:51.970 THREAD 19 INFO: fixAppProtectPolicyForSEP11>> domainId:D479608A0A1A0584010C4D47467FC29A startIndex:1 policyBatchSize:50 morePolicies:true
2016-04-25 09:47:51.986 THREAD 19 INFO: fixAppProtectPolicyForSEP11>> domain:D479608A0A1A0584010C4D47467FC29A retrieved policy size:1 morePolicies:false
2016-04-25 09:47:51.986 THREAD 19 INFO: fixAppProtectPolicyForSEP11>> Finished. The result is: true
2016-04-25 09:47:51.986 THREAD 19 INFO: fixSystemLockdownForSep11>> Started.
2016-04-25 09:47:52.079 THREAD 19 INFO: fixSystemLockdownForSep11>> Finished. Add 0 match entities. The result is: true
2016-04-25 09:47:52.126 THREAD 19 INFO: upgradeADCPolicies>> Started.
2016-04-25 09:47:52.142 THREAD 19 INFO: upgradeADCPolicies>> domainId:D479608A0A1A0584010C4D47467FC29A startIndex:1 policyBatchSize:50 morePolicies:true
2016-04-25 09:47:52.157 THREAD 19 INFO: upgradeADCPolicies>> domain:D479608A0A1A0584010C4D47467FC29A retrieved policy size:1 morePolicies:false
2016-04-25 09:47:52.173 THREAD 19 INFO: addSEPMigrationExclusions>> Checking policy Application and Device Control policy id=65DF2AD40A1A058400CA107DA6F8E33D
2016-04-25 09:47:52.173 THREAD 19 INFO: addSEPMigrationExclusions>> Finished policy Application and Device Control policy id=65DF2AD40A1A058400CA107DA6F8E33D added=false
2016-04-25 09:47:52.173 THREAD 19 INFO: fixAllowClientProcessRule>> Started.
2016-04-25 09:47:52.173 THREAD 19 INFO: fixAllowClientProcessRule>> Finished. The result is: false
2016-04-25 09:47:52.173 THREAD 19 INFO: upgradeADCPolicies>> Finished. The result is: true
2016-04-25 09:47:52.235 THREAD 19 INFO: PatternTableHandler> correctPatternType>> Start.
2016-04-25 09:47:52.251 THREAD 19 INFO: PatternTableHandler> correctPatternType>>Total 14 monikers to update.
2016-04-25 09:47:52.313 THREAD 19 INFO: PatternTableHandler> correctPatternType>> {ABF634BB-CC48-4636-8CAA-923094754A94}<->ERASER_ENGINE
2016-04-25 09:47:52.313 THREAD 19 INFO: PatternTableHandler> correctPatternType>> {535CB6A4-441F-4E8A-A897-804CD859100E}<->VIRUS_DEFS
2016-04-25 09:47:52.313 THREAD 19 INFO: PatternTableHandler> correctPatternType>> {1AD331AC-DEF8-4F6F-A7B5-7B259423BBCF}<->HI_CONTENT
2016-04-25 09:47:52.313 THREAD 19 INFO: PatternTableHandler> correctPatternType>> {A78E095A-8FED-4937-9D5C-0B6C20EA696C}<->AP_PORTAL_LIST
2016-04-25 09:47:52.313 THREAD 19 INFO: PatternTableHandler> correctPatternType>> {ECCC5006-EF61-4C99-829A-417B6C6AD963}<->DECABI
2016-04-25 09:47:52.313 THREAD 19 INFO: PatternTableHandler> correctPatternType>> {EDBD3BD0-8395-4D4D-BAC9-19DD32EF4758}<->SYMANTEC_WHITELIST
2016-04-25 09:47:52.313 THREAD 19 INFO: PatternTableHandler> correctPatternType>> <->
2016-04-25 09:47:52.313 THREAD 19 INFO: PatternTableHandler> correctPatternType>> {55DE35DC-862A-44C9-8A2B-3EF451665D0A}<->DEUCE_SIG
2016-04-25 09:47:52.313 THREAD 19 INFO: PatternTableHandler> correctPatternType>> {50B092DE-40D5-4724-971B-D3D90E9EE987}<->AP_PORTAL_LIST
2016-04-25 09:47:52.313 THREAD 19 INFO: PatternTableHandler> correctPatternType>> {810D5A61-809F-49C2-BD75-177F0647D2BA}<->REVOCATION_CONTENT
2016-04-25 09:47:52.313 THREAD 19 INFO: PatternTableHandler> correctPatternType>> {5A7367E1-D1F6-43B5-BD94-4AFFA896D724}<->SMR_DEFS
2016-04-25 09:47:52.313 THREAD 19 INFO: PatternTableHandler> correctPatternType>> {E8827B4A-4F58-4DEA-8C93-07B32A63D1C5}<->EFAVT
2016-04-25 09:47:52.313 THREAD 19 INFO: PatternTableHandler> correctPatternType>> {D6AEBC07-D833-485F-9723-6C908D37F806}<->BASH_CONTENT
2016-04-25 09:47:52.313 THREAD 19 INFO: PatternTableHandler> correctPatternType>> {263395A0-D3D8-4BE4-80B5-202C94EF4AA0}<->CENTRALIZED_REPUTATION_SETTINGS
2016-04-25 09:47:52.345 THREAD 19 INFO: PatternTableHandler> correctPatternType>> {ABF634BB-CC48-4636-8CAA-923094754A94} : Updated 0 records.
2016-04-25 09:47:52.345 THREAD 19 INFO: PatternTableHandler> correctPatternType>> {535CB6A4-441F-4E8A-A897-804CD859100E} : Updated 0 records.
2016-04-25 09:47:52.345 THREAD 19 INFO: PatternTableHandler> correctPatternType>> {1AD331AC-DEF8-4F6F-A7B5-7B259423BBCF} : Updated 0 records.
2016-04-25 09:47:52.345 THREAD 19 INFO: PatternTableHandler> correctPatternType>> {A78E095A-8FED-4937-9D5C-0B6C20EA696C} : Updated 0 records.
2016-04-25 09:47:52.345 THREAD 19 INFO: PatternTableHandler> correctPatternType>> {ECCC5006-EF61-4C99-829A-417B6C6AD963} : Updated 0 records.
2016-04-25 09:47:52.345 THREAD 19 INFO: PatternTableHandler> correctPatternType>> {EDBD3BD0-8395-4D4D-BAC9-19DD32EF4758} : Updated 0 records.
2016-04-25 09:47:52.345 THREAD 19 INFO: PatternTableHandler> correctPatternType>>  : Updated 0 records.
2016-04-25 09:47:52.345 THREAD 19 INFO: PatternTableHandler> correctPatternType>> {55DE35DC-862A-44C9-8A2B-3EF451665D0A} : Updated 0 records.
2016-04-25 09:47:52.345 THREAD 19 INFO: PatternTableHandler> correctPatternType>> {50B092DE-40D5-4724-971B-D3D90E9EE987} : Updated 0 records.
2016-04-25 09:47:52.345 THREAD 19 INFO: PatternTableHandler> correctPatternType>> {810D5A61-809F-49C2-BD75-177F0647D2BA} : Updated 0 records.
2016-04-25 09:47:52.345 THREAD 19 INFO: PatternTableHandler> correctPatternType>> {5A7367E1-D1F6-43B5-BD94-4AFFA896D724} : Updated 0 records.
2016-04-25 09:47:52.345 THREAD 19 INFO: PatternTableHandler> correctPatternType>> {E8827B4A-4F58-4DEA-8C93-07B32A63D1C5} : Updated 0 records.
2016-04-25 09:47:52.345 THREAD 19 INFO: PatternTableHandler> correctPatternType>> {D6AEBC07-D833-485F-9723-6C908D37F806} : Updated 0 records.
2016-04-25 09:47:52.345 THREAD 19 INFO: PatternTableHandler> correctPatternType>> {263395A0-D3D8-4BE4-80B5-202C94EF4AA0} : Updated 0 records.
2016-04-25 09:47:52.345 THREAD 19 INFO: PatternTableHandler> correctPatternType>> End.
2016-04-25 09:47:52.345 THREAD 19 WARNING: Upgrade> doUpgrade>> Database schema has been upgraded to the latest version.
2016-04-25 09:47:52.469 THREAD 19 WARNING: Upgrade> doUpgrade>> Database schema related changes are done!
2016-04-25 09:47:52.469 THREAD 19 INFO: UpgradeStep >> checkUpgradeStatus.
2016-04-25 09:47:52.469 THREAD 19 INFO: UpgradeStep >> checkUpgradeStatus.
2016-04-25 09:47:52.469 THREAD 19 INFO: Server Pre-Upgrade Version is:12.1.6608.6300
2016-04-25 09:47:52.469 THREAD 19 INFO: ApacheServerConfig>> getListenPortFromApacheConfFile> confFile = C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\tomcat\..\apache\conf\httpd.conf, listeningPorts = [8014]
2016-04-25 09:47:52.485 THREAD 19 INFO: ApacheServerConfig> updateListenPortInApacheConfFile>> configFile = C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\tomcat\..\apache\conf\httpd.conf, httpPortsToBeMerged = [8014], isHttps = false
2016-04-25 09:47:52.485 THREAD 19 INFO: ApacheServerConfig> updateListenPortInApacheConfFile>> httpPortsToBeMerged = [8014]
2016-04-25 09:47:52.501 THREAD 19 INFO: Previous Apache server configuration does not set SSL for clients configuration. So keep the default setting.
2016-04-25 09:47:52.532 THREAD 19 INFO: isSQLDbWithWindowsAuthentication returns false
2016-04-25 09:47:52.532 THREAD 19 INFO: setFCGIDImpersonation:false
2016-04-25 09:47:52.532 THREAD 19 INFO: setHttpResponseHeaderFilterSettings:start
2016-04-25 09:47:52.532 THREAD 19 INFO: Mime sniffing setting update in <Directory>.
2016-04-25 09:47:52.532 THREAD 19 INFO: <ApacheServerConfig.updateConfig> Processing Apache config merge. Src file:C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\tomcat\..\apache\conf\ssl\ssl.conf.new, Dest file:C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\tomcat\..\apache\conf\ssl\ssl.conf
2016-04-25 09:47:52.547 THREAD 19 INFO: <ApacheServerConfig.getNewOverrides>
2016-04-25 09:47:52.547 THREAD 19 INFO: Identified update item: [SSLProtocol, all -SSLv2 -SSLv3]
2016-04-25 09:47:52.547 THREAD 19 INFO: Identified update item: [SSLCipherSuite, HIGH:!MEDIUM:!LOW:!aNULL:!eNULL:3DES:!RC4]
2016-04-25 09:47:52.547 THREAD 19 INFO: Identified update item: [SSLDHParametersFile, "conf/ssl/dh2048.pem"]
2016-04-25 09:47:52.547 THREAD 19 INFO: ApacheServerConfig doApacheDirectiveUpdates>> Processing file:C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\tomcat\..\apache\conf\ssl\ssl.conf
2016-04-25 09:47:52.547 THREAD 19 INFO: ApacheServerConfig doApacheDirectiveUpdates>> Directive:SSLCipherSuite=HIGH:!MEDIUM:!LOW:!aNULL:!eNULL:3DES:!RC4
2016-04-25 09:47:52.547 THREAD 19 INFO: <ApacheServerConfig.isDirectiveRemoving> Directive:SSLCipherSuite=HIGH:!MEDIUM:!LOW:!aNULL:!eNULL:3DES:!RC4
2016-04-25 09:47:52.547 THREAD 19 INFO: <ApacheServerConfig.IsDirectiveUpdateRequired> Directive:SSLCipherSuite=HIGH:!MEDIUM:!LOW:!aNULL:!eNULL:3DES:!RC4
2016-04-25 09:47:52.547 THREAD 19 INFO: <ApacheServerConfig.IsDirectiveUpdateRequired> : false
2016-04-25 09:47:52.547 THREAD 19 INFO: ApacheServerConfig doApacheDirectiveUpdates>> Already upto date:SSLCipherSuite=HIGH:!MEDIUM:!LOW:!aNULL:!eNULL:3DES:!RC4
2016-04-25 09:47:52.547 THREAD 19 INFO: ApacheServerConfig doApacheDirectiveUpdates>> Directive:SSLProtocol=all -SSLv2 -SSLv3
2016-04-25 09:47:52.547 THREAD 19 INFO: <ApacheServerConfig.isDirectiveRemoving> Directive:SSLProtocol=all -SSLv2 -SSLv3
2016-04-25 09:47:52.547 THREAD 19 INFO: <ApacheServerConfig.IsDirectiveUpdateRequired> Directive:SSLProtocol=all -SSLv2 -SSLv3
2016-04-25 09:47:52.547 THREAD 19 INFO: <ApacheServerConfig.IsDirectiveUpdateRequired> : false
2016-04-25 09:47:52.547 THREAD 19 INFO: ApacheServerConfig doApacheDirectiveUpdates>> Already upto date:SSLProtocol=all -SSLv2 -SSLv3
2016-04-25 09:47:52.547 THREAD 19 INFO: ApacheServerConfig doApacheDirectiveUpdates>> Directive:SSLDHParametersFile="conf/ssl/dh2048.pem"
2016-04-25 09:47:52.547 THREAD 19 INFO: <ApacheServerConfig.isDirectiveRemoving> Directive:SSLDHParametersFile="conf/ssl/dh2048.pem"
2016-04-25 09:47:52.547 THREAD 19 INFO: <ApacheServerConfig.IsDirectiveUpdateRequired> Directive:SSLDHParametersFile="conf/ssl/dh2048.pem"
2016-04-25 09:47:52.547 THREAD 19 INFO: <ApacheServerConfig.IsDirectiveUpdateRequired> : false
2016-04-25 09:47:52.547 THREAD 19 INFO: ApacheServerConfig doApacheDirectiveUpdates>> Already upto date:SSLDHParametersFile="conf/ssl/dh2048.pem"
2016-04-25 09:47:52.547 THREAD 19 INFO: ApacheServerConfig doApacheDirectiveUpdates>> No Apache directive merge required: C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\tomcat\..\apache\conf\ssl\ssl.conf
2016-04-25 09:47:52.547 THREAD 19 INFO: ApacheServerConfig doApacheDirectiveUpdates>> Processing file done!
2016-04-25 09:47:52.547 THREAD 19 INFO: <ApacheServerConfig.getDirectivesRemoving>
2016-04-25 09:47:52.547 THREAD 19 INFO: Identified directive need to be removed: [SSLMutex]
2016-04-25 09:47:52.547 THREAD 19 INFO: ApacheServerConfig doApacheDirectiveUpdates>> Processing file:C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\tomcat\..\apache\conf\ssl\ssl.conf
2016-04-25 09:47:52.547 THREAD 19 INFO: ApacheServerConfig doApacheDirectiveUpdates>> Directive:SSLMutex=####APACHE_DIRECTIVE_REMOVE
2016-04-25 09:47:52.547 THREAD 19 INFO: <ApacheServerConfig.isDirectiveRemoving> Directive:SSLMutex=####APACHE_DIRECTIVE_REMOVE
2016-04-25 09:47:52.547 THREAD 19 INFO: <ApacheServerConfig.isDirectiveRemoving> Directive:SSLMutex=####APACHE_DIRECTIVE_REMOVE has been removed
2016-04-25 09:47:52.547 THREAD 19 INFO: <ApacheServerConfig.IsDirectiveUpdateRequired> Directive:SSLMutex=####APACHE_DIRECTIVE_REMOVE
2016-04-25 09:47:52.547 THREAD 19 INFO: ApacheServerConfig doApacheDirectiveUpdates>> Already upto date:SSLMutex=####APACHE_DIRECTIVE_REMOVE
2016-04-25 09:47:52.547 THREAD 19 INFO: ApacheServerConfig doApacheDirectiveUpdates>> No Apache directive merge required: C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\tomcat\..\apache\conf\ssl\ssl.conf
2016-04-25 09:47:52.547 THREAD 19 INFO: ApacheServerConfig doApacheDirectiveUpdates>> Processing file done!
2016-04-25 09:47:52.547 THREAD 19 INFO: <ApacheServerConfig.updateConfig> Processing Apache config merge. Src file:C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\tomcat\..\apache\conf\ssl\sslForClients.conf.new, Dest file:C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\tomcat\..\apache\conf\ssl\sslForClients.conf
2016-04-25 09:47:52.547 THREAD 19 INFO: <ApacheServerConfig.getNewOverrides>
2016-04-25 09:47:52.547 THREAD 19 INFO: Identified update item: [SSLProtocol, all -SSLv2 -SSLv3]
2016-04-25 09:47:52.547 THREAD 19 INFO: Identified update item: [SSLCipherSuite, HIGH:!MEDIUM:!LOW:!aNULL:!eNULL:3DES:!RC4]
2016-04-25 09:47:52.547 THREAD 19 INFO: Identified update item: [SSLDHParametersFile, "conf/ssl/dh2048.pem"]
2016-04-25 09:47:52.547 THREAD 19 INFO: ApacheServerConfig doApacheDirectiveUpdates>> Processing file:C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\tomcat\..\apache\conf\ssl\sslForClients.conf
2016-04-25 09:47:52.547 THREAD 19 INFO: ApacheServerConfig doApacheDirectiveUpdates>> Directive:SSLCipherSuite=HIGH:!MEDIUM:!LOW:!aNULL:!eNULL:3DES:!RC4
2016-04-25 09:47:52.547 THREAD 19 INFO: <ApacheServerConfig.isDirectiveRemoving> Directive:SSLCipherSuite=HIGH:!MEDIUM:!LOW:!aNULL:!eNULL:3DES:!RC4
2016-04-25 09:47:52.547 THREAD 19 INFO: <ApacheServerConfig.IsDirectiveUpdateRequired> Directive:SSLCipherSuite=HIGH:!MEDIUM:!LOW:!aNULL:!eNULL:3DES:!RC4
2016-04-25 09:47:52.547 THREAD 19 INFO: <ApacheServerConfig.IsDirectiveUpdateRequired> : false
2016-04-25 09:47:52.547 THREAD 19 INFO: ApacheServerConfig doApacheDirectiveUpdates>> Already upto date:SSLCipherSuite=HIGH:!MEDIUM:!LOW:!aNULL:!eNULL:3DES:!RC4
2016-04-25 09:47:52.547 THREAD 19 INFO: ApacheServerConfig doApacheDirectiveUpdates>> Directive:SSLProtocol=all -SSLv2 -SSLv3
2016-04-25 09:47:52.547 THREAD 19 INFO: <ApacheServerConfig.isDirectiveRemoving> Directive:SSLProtocol=all -SSLv2 -SSLv3
2016-04-25 09:47:52.547 THREAD 19 INFO: <ApacheServerConfig.IsDirectiveUpdateRequired> Directive:SSLProtocol=all -SSLv2 -SSLv3
2016-04-25 09:47:52.547 THREAD 19 INFO: <ApacheServerConfig.IsDirectiveUpdateRequired> : false
2016-04-25 09:47:52.547 THREAD 19 INFO: ApacheServerConfig doApacheDirectiveUpdates>> Already upto date:SSLProtocol=all -SSLv2 -SSLv3
2016-04-25 09:47:52.547 THREAD 19 INFO: ApacheServerConfig doApacheDirectiveUpdates>> Directive:SSLDHParametersFile="conf/ssl/dh2048.pem"
2016-04-25 09:47:52.547 THREAD 19 INFO: <ApacheServerConfig.isDirectiveRemoving> Directive:SSLDHParametersFile="conf/ssl/dh2048.pem"
2016-04-25 09:47:52.547 THREAD 19 INFO: <ApacheServerConfig.IsDirectiveUpdateRequired> Directive:SSLDHParametersFile="conf/ssl/dh2048.pem"
2016-04-25 09:47:52.547 THREAD 19 INFO: <ApacheServerConfig.IsDirectiveUpdateRequired> : false
2016-04-25 09:47:52.547 THREAD 19 INFO: ApacheServerConfig doApacheDirectiveUpdates>> Already upto date:SSLDHParametersFile="conf/ssl/dh2048.pem"
2016-04-25 09:47:52.547 THREAD 19 INFO: ApacheServerConfig doApacheDirectiveUpdates>> No Apache directive merge required: C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\tomcat\..\apache\conf\ssl\sslForClients.conf
2016-04-25 09:47:52.547 THREAD 19 INFO: ApacheServerConfig doApacheDirectiveUpdates>> Processing file done!
2016-04-25 09:47:52.547 THREAD 19 INFO: <ApacheServerConfig.getDirectivesRemoving>
2016-04-25 09:47:52.547 THREAD 19 SEVERE: No directive need to be removed.
2016-04-25 09:47:52.547 THREAD 19 INFO: Apache SSL Configuration successful.
2016-04-25 09:47:52.563 THREAD 19 INFO: doSemLaunchServiceConfigurationChanges>> Successfully updated the semlaunchsrv.properties
2016-04-25 09:47:52.563 THREAD 19 INFO: isLicenseInstallationValid:  sep.slf =true  OD file=true
2016-04-25 09:47:52.579 THREAD 19 INFO: Server version before upgrade = 12.1.6608.6300
2016-04-25 09:47:52.594 THREAD 19 INFO: isLicenseInstallationValid:  sep.slf =true  OD file=true
2016-04-25 09:47:52.594 THREAD 19 INFO: Product Type:SEPE
2016-04-25 09:47:52.594 THREAD 19 WARNING: No reporting port specified! No need to update.
2016-04-25 09:47:52.594 THREAD 19 WARNING: No spc web services port specified! No need to update.
2016-04-25 09:47:52.594 THREAD 19 WARNING: No rmm web services port specified! No need to update.
2016-04-25 09:47:52.594 THREAD 19 WARNING: No launch service port specified! No need to update.
2016-04-25 09:47:52.594 THREAD 19 INFO: Use 8444 as the reporting communication port.
2016-04-25 09:47:52.610 THREAD 19 INFO: info : LicenseUtils.getProductType typeFromOD=SEPE onlyFromODLicense=true
2016-04-25 09:47:52.610 THREAD 19 INFO: info : LicenseUtils.getProductType typeFromOD=SEPE onlyFromODLicense=true
2016-04-25 09:47:52.610 THREAD 19 INFO: Upgrading To SEPE
2016-04-25 09:47:52.610 THREAD 19 INFO: Use 8444 as the reporting communication port.
2016-04-25 09:47:52.610 THREAD 19 INFO: Web services for Symantec Protection Center have been enabled. For this setting to take effect, you must restart the Symantec Endpoint Protection Manager service.
2016-04-25 09:47:52.610 THREAD 19 SEVERE: ServerXml> addWebServiceConnector>> Checking for secured connectors...
2016-04-25 09:47:52.610 THREAD 19 SEVERE: ServerXml> addWebServiceConnector>> Checking for secured connectors...
2016-04-25 09:47:52.610 THREAD 19 INFO: Web services for Symantec Protection Center have been disabled. For this setting to take effect, you must restart the Symantec Endpoint Protection Manager service.
2016-04-25 09:47:52.610 THREAD 19 INFO: Activating Upgrade License
2016-04-25 09:47:52.625 THREAD 19 INFO: updateElementInPropFile: keyscm.license.producttype ,value: SEPE
2016-04-25 09:47:52.625 THREAD 19 INFO: saveConfProp: done
2016-04-25 09:47:52.625 THREAD 19 INFO: Done with Activation of Upgrade license
2016-04-25 09:47:52.641 THREAD 19 INFO: info : LicenseUtils.getProductType typeFromOD=SEPE onlyFromODLicense=true
2016-04-25 09:47:52.641 THREAD 19 INFO: saveConfProp: done
2016-04-25 09:47:52.641 THREAD 19 INFO: Removing property key name: scm.server.version.pre-upgrade from C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\tomcat\etc\conf.properties succeeded.
2016-04-25 09:47:52.657 THREAD 19 INFO: isLicenseInstallationValid:  sep.slf =true  OD file=true
2016-04-25 09:47:52.672 THREAD 19 INFO: saveConfProp: done
2016-04-25 09:47:52.672 THREAD 19 INFO: Removing property key name: scm.install.has.SNAC.license from C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\tomcat\etc\conf.properties succeeded.
2016-04-25 09:47:52.672 THREAD 19 INFO: Update server.xml with thread pool...
2016-04-25 09:47:52.672 THREAD 19 INFO: ServerXml> addThreadPool>> Connector has applied the executor name =SEPMThreadPool
2016-04-25 09:47:52.672 THREAD 19 INFO: ServerXml> addThreadPool>> Existed configured minSpareThreads = 5
2016-04-25 09:47:52.672 THREAD 19 INFO: Update ROOT.xml for DBCP connection pool to remove abandoned connection automatically...
2016-04-25 09:47:52.672 THREAD 19 INFO: Update ROOT.xml successfully.
2016-04-25 09:47:52.766 THREAD 19 WARNING: Upgrade> doUpgrade>> Successfully modified SEPM server configuration settings.
2016-04-25 09:47:52.766 THREAD 19 WARNING: Upgrade> doUpgrade>> Importing client packages...
2016-04-25 09:47:52.766 THREAD 19 INFO: UpgradeStep >> checkUpgradeStatus.
2016-04-25 09:47:52.766 THREAD 19 INFO: UpgradeStep >> checkUpgradeStatus.
2016-04-25 09:47:52.766 THREAD 19 INFO: Upgrade> addAgentPackage>> packageNames length 5
2016-04-25 09:47:52.766 THREAD 19 INFO: Upgrade> addAgentPackage>> adding package  C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\tomcat\Packages\SAV32.info
2016-04-25 09:47:52.781 THREAD 19 INFO: UpgradeStep >> checkUpgradeStatus.
2016-04-25 09:47:52.781 THREAD 19 INFO: addNewPackage packageZipFile:C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\tomcat\Packages\SAV32.dat packageInfoFile:C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\tomcat\Packages\SAV32.info
2016-04-25 09:47:52.781 THREAD 19 INFO: PackageUtil->setPackageSizeToPackageInfo: C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\tomcat\Packages\SAV32.dat
2016-04-25 09:47:52.781 THREAD 19 INFO: PackageUtil.setPackageSizeToPackageInfo: Content file: BASHDefs.zip  Compressed size: 4721409  Uncompressed size: 4727577
2016-04-25 09:47:52.781 THREAD 19 INFO: PackageUtil.setPackageSizeToPackageInfo: Content file: IDSDefs.zip  Compressed size: 4706142  Uncompressed size: 4717997
2016-04-25 09:47:52.781 THREAD 19 INFO: PackageUtil.setPackageSizeToPackageInfo: Content file: SMRDefs.zip  Compressed size: 1379072  Uncompressed size: 1378992
2016-04-25 09:47:52.797 THREAD 19 INFO: Package new (zip/unzip) size: 68335139  136202550
2016-04-25 09:47:52.953 THREAD 19 INFO: Checking binary file integrity...file=C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\tomcat\Packages\SAV32.dat
2016-04-25 09:47:52.953 THREAD 19 INFO: Checking binary file integrity...Done
2016-04-25 09:47:52.953 THREAD 19 WARNING: BinaryFileCollection> addFile>> Downloading client package... Current time: 1461566872953ms
2016-04-25 09:47:55.511 THREAD 19 WARNING: BinaryFileCollection> addFile>> Client package downloaded. Time taken: 2558ms
2016-04-25 09:47:55.527 THREAD 19 WARNING: ClientPackageUtil> verifyWindowsClientPackage>> Extracting & verifying client package content started... Current Time: 1461566875527ms
2016-04-25 09:47:55.543 THREAD 19 INFO: ZipUtil >> unzipFile > zipFile=C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\data\outbox\ImportPackage\9AC4C5A419887C63D9F93733B66889F6 destinationFolder=C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\tomcat\temp\1461566875543
2016-04-25 09:48:13.998 THREAD 19 INFO: ClientPackageUtil> verifyWindowsClientPackage>> Client package contents extracted. Time taken: 18455ms
2016-04-25 09:48:19.099 THREAD 22 INFO: RunCommandHandler>> processWatchDog> Done.
2016-04-25 09:48:19.099 THREAD 19 INFO: ClientPackageUtil> verifyWindowsClientPackage>> client package contents verified. Process return code: 0, Time taken: 5101
2016-04-25 09:48:19.099 THREAD 19 INFO: ClientPackageUtil> verifyWindowsClientPackage>> signatureVerificationCode: 0
2016-04-25 09:48:24.154 THREAD 19 WARNING: ClientPackageUtil> verifyWindowsClientPackage>> Extracting & verifying client package content completed. Time taken: 28627ms
2016-04-25 09:48:30.908 THREAD 19 WARNING: BinaryFileCollection> addFile>> Client package processing is completed. Time taken: 37955
2016-04-25 09:48:31.891 THREAD 19 INFO: UpgradeStep >> checkUpgradeStatus.
2016-04-25 09:48:31.891 THREAD 19 INFO: Upgrade> addAgentPackage>> adding package  C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\tomcat\Packages\SAV64.info
2016-04-25 09:48:31.907 THREAD 19 INFO: UpgradeStep >> checkUpgradeStatus.
2016-04-25 09:48:31.907 THREAD 19 INFO: addNewPackage packageZipFile:C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\tomcat\Packages\SAV64.dat packageInfoFile:C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\tomcat\Packages\SAV64.info
2016-04-25 09:48:31.907 THREAD 19 INFO: PackageUtil->setPackageSizeToPackageInfo: C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\tomcat\Packages\SAV64.dat
2016-04-25 09:48:31.907 THREAD 19 INFO: PackageUtil.setPackageSizeToPackageInfo: Content file: BASHDefs.zip  Compressed size: 4721409  Uncompressed size: 4727577
2016-04-25 09:48:31.907 THREAD 19 INFO: PackageUtil.setPackageSizeToPackageInfo: Content file: IDSDefs.zip  Compressed size: 4706142  Uncompressed size: 4717997
2016-04-25 09:48:31.923 THREAD 19 INFO: PackageUtil.setPackageSizeToPackageInfo: Content file: SMRDefs.zip  Compressed size: 1379072  Uncompressed size: 1378992
2016-04-25 09:48:31.923 THREAD 19 INFO: Package new (zip/unzip) size: 86447514  177346301
2016-04-25 09:48:32.141 THREAD 19 INFO: Checking binary file integrity...file=C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\tomcat\Packages\SAV64.dat
2016-04-25 09:48:32.141 THREAD 19 INFO: Checking binary file integrity...Done
2016-04-25 09:48:32.141 THREAD 19 WARNING: BinaryFileCollection> addFile>> Downloading client package... Current time: 1461566912141ms
2016-04-25 09:48:37.804 THREAD 19 WARNING: BinaryFileCollection> addFile>> Client package downloaded. Time taken: 5663ms
2016-04-25 09:48:37.835 THREAD 19 WARNING: ClientPackageUtil> verifyWindowsClientPackage>> Extracting & verifying client package content started... Current Time: 1461566917835ms
2016-04-25 09:48:37.835 THREAD 19 INFO: ZipUtil >> unzipFile > zipFile=C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\data\outbox\ImportPackage\FDED5F46EF52FAAEB3028EDE6B54A7EA destinationFolder=C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\tomcat\temp\1461566917835
2016-04-25 09:48:51.111 THREAD 19 INFO: ClientPackageUtil> verifyWindowsClientPackage>> Client package contents extracted. Time taken: 13276ms
2016-04-25 09:48:57.616 THREAD 25 INFO: RunCommandHandler>> processWatchDog> Done.
2016-04-25 09:48:57.632 THREAD 19 INFO: ClientPackageUtil> verifyWindowsClientPackage>> client package contents verified. Process return code: 0, Time taken: 6521
2016-04-25 09:48:57.632 THREAD 19 INFO: ClientPackageUtil> verifyWindowsClientPackage>> signatureVerificationCode: 0
2016-04-25 09:49:00.643 THREAD 19 WARNING: ClientPackageUtil> verifyWindowsClientPackage>> Extracting & verifying client package content completed. Time taken: 22808ms
2016-04-25 09:49:08.427 THREAD 19 WARNING: BinaryFileCollection> addFile>> Client package processing is completed. Time taken: 36286
2016-04-25 09:49:08.880 THREAD 19 INFO: UpgradeStep >> checkUpgradeStatus.
2016-04-25 09:49:08.880 THREAD 19 INFO: Upgrade> addAgentPackage>> adding package  C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\tomcat\Packages\SEP_Linux_deb.info
2016-04-25 09:49:08.880 THREAD 19 INFO: UpgradeStep >> checkUpgradeStatus.
2016-04-25 09:49:08.880 THREAD 19 INFO: addNewPackage packageZipFile:C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\tomcat\Packages\SEP_Linux_deb.dat packageInfoFile:C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\tomcat\Packages\SEP_Linux_deb.info
2016-04-25 09:49:08.880 THREAD 19 INFO: PackageUtil->setPackageSizeToPackageInfo: C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\tomcat\Packages\SEP_Linux_deb.dat
2016-04-25 09:49:08.880 THREAD 19 INFO: Package new (zip/unzip) size: 30107909  30279127
2016-04-25 09:49:09.004 THREAD 19 INFO: Checking binary file integrity...file=C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\tomcat\Packages\SEP_Linux_deb.dat
2016-04-25 09:49:09.004 THREAD 19 INFO: Checking binary file integrity...Done
2016-04-25 09:49:09.004 THREAD 19 WARNING: BinaryFileCollection> addFile>> Downloading client package... Current time: 1461566949004ms
2016-04-25 09:49:09.348 THREAD 19 WARNING: BinaryFileCollection> addFile>> Client package downloaded. Time taken: 344ms
2016-04-25 09:49:09.348 THREAD 19 INFO: ClientPackageUtil> verifyClientPackage>> Non-Windows(LINUXDPKG) client package, skipping signature verification.
2016-04-25 09:49:11.875 THREAD 19 WARNING: BinaryFileCollection> addFile>> Client package processing is completed. Time taken: 2871
2016-04-25 09:49:12.592 THREAD 19 INFO: UpgradeStep >> checkUpgradeStatus.
2016-04-25 09:49:12.592 THREAD 19 INFO: Upgrade> addAgentPackage>> adding package  C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\tomcat\Packages\SEP_Linux_rpm.info
2016-04-25 09:49:12.592 THREAD 19 INFO: UpgradeStep >> checkUpgradeStatus.
2016-04-25 09:49:12.592 THREAD 19 INFO: addNewPackage packageZipFile:C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\tomcat\Packages\SEP_Linux_rpm.dat packageInfoFile:C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\tomcat\Packages\SEP_Linux_rpm.info
2016-04-25 09:49:12.608 THREAD 19 INFO: PackageUtil->setPackageSizeToPackageInfo: C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\tomcat\Packages\SEP_Linux_rpm.dat
2016-04-25 09:49:12.608 THREAD 19 INFO: Package new (zip/unzip) size: 40185148  40623059
2016-04-25 09:49:12.780 THREAD 19 INFO: Checking binary file integrity...file=C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\tomcat\Packages\SEP_Linux_rpm.dat
2016-04-25 09:49:12.795 THREAD 19 INFO: Checking binary file integrity...Done
2016-04-25 09:49:12.795 THREAD 19 WARNING: BinaryFileCollection> addFile>> Downloading client package... Current time: 1461566952795ms
2016-04-25 09:49:16.040 THREAD 19 WARNING: BinaryFileCollection> addFile>> Client package downloaded. Time taken: 3245ms
2016-04-25 09:49:16.056 THREAD 19 INFO: ClientPackageUtil> verifyClientPackage>> Non-Windows(LINUXRPM) client package, skipping signature verification.
2016-04-25 09:49:20.502 THREAD 19 WARNING: BinaryFileCollection> addFile>> Client package processing is completed. Time taken: 7707
2016-04-25 09:49:21.469 THREAD 19 INFO: UpgradeStep >> checkUpgradeStatus.
2016-04-25 09:49:21.469 THREAD 19 INFO: Upgrade> addAgentPackage>> adding package  C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\tomcat\Packages\SEP_Mac.info
2016-04-25 09:49:21.469 THREAD 19 INFO: UpgradeStep >> checkUpgradeStatus.
2016-04-25 09:49:21.469 THREAD 19 INFO: addNewPackage packageZipFile:C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\tomcat\Packages\SEP_Mac.dat packageInfoFile:C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\tomcat\Packages\SEP_Mac.info
2016-04-25 09:49:21.485 THREAD 19 INFO: PackageUtil->setPackageSizeToPackageInfo: C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\tomcat\Packages\SEP_Mac.dat
2016-04-25 09:49:21.485 THREAD 19 INFO: Package new (zip/unzip) size: 23354703  31677022
2016-04-25 09:49:21.625 THREAD 19 INFO: Checking binary file integrity...file=C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\tomcat\Packages\SEP_Mac.dat
2016-04-25 09:49:21.641 THREAD 19 INFO: Checking binary file integrity...Done
2016-04-25 09:49:21.641 THREAD 19 WARNING: BinaryFileCollection> addFile>> Downloading client package... Current time: 1461566961641ms
2016-04-25 09:49:21.828 THREAD 19 WARNING: BinaryFileCollection> addFile>> Client package downloaded. Time taken: 187ms
2016-04-25 09:49:21.828 THREAD 19 INFO: ClientPackageUtil> verifyClientPackage>> Non-Windows(Mac) client package, skipping signature verification.
2016-04-25 09:49:25.978 THREAD 19 WARNING: BinaryFileCollection> addFile>> Client package processing is completed. Time taken: 4337
2016-04-25 09:49:26.867 THREAD 19 INFO: UpgradeStep >> checkUpgradeStatus.
2016-04-25 09:49:28.474 THREAD 19 WARNING: Upgrade> doUpgrade>> Importing client packages done!
2016-04-25 09:49:28.474 THREAD 19 WARNING: Upgrade> doUpgrade>> Upgrading templates...
2016-04-25 09:49:28.474 THREAD 19 INFO: UpgradeStep >> checkUpgradeStatus.
2016-04-25 09:49:28.474 THREAD 19 INFO: UpgradeStep >> checkUpgradeStatus.
2016-04-25 09:49:28.614 THREAD 19 WARNING: Upgrade> doUpgrade>> Upgrading templates done!
2016-04-25 09:49:28.614 THREAD 19 WARNING: Upgrade> doUpgrade>> Sync LiveUpdate catalog started... DB Version Before Upgrade = 12.1.6.4
2016-04-25 09:49:28.614 THREAD 19 INFO: UpgradeStep >> checkUpgradeStatus.
2016-04-25 09:49:28.614 THREAD 19 INFO: UpgradeStep >> checkUpgradeStatus.
2016-04-25 09:49:28.614 THREAD 19 INFO: UpgradeUtil>>addCategoryToLuConfig(EFAVT):Begin...
2016-04-25 09:49:28.630 THREAD 19 INFO: UpgradeUtil>>addCategoryToLuConfig: EFAVT is already enabled.
2016-04-25 09:49:28.630 THREAD 19 INFO: UpgradeUtil>>addCategoryToLuConfig(EFAVT):End.
2016-04-25 09:49:28.630 THREAD 19 INFO: UpgradeUtil>>addCategoryToLuConfig(IRON):Begin...
2016-04-25 09:49:28.630 THREAD 19 INFO: UpgradeUtil>>addCategoryToLuConfig: IRON is already enabled.
2016-04-25 09:49:28.630 THREAD 19 INFO: UpgradeUtil>>addCategoryToLuConfig(IRON):End.
2016-04-25 09:49:28.630 THREAD 19 WARNING: Upgrade> doUpgrade>> Sync LiveUpdate catalog started done!
2016-04-25 09:49:28.630 THREAD 19 INFO: LuUtil getLuinsdllVersion begins
2016-04-25 09:49:28.630 THREAD 19 INFO: LuUtil getLuinsdllVersion begins
2016-04-25 09:49:28.910 THREAD 28 INFO: RunCommandHandler>> processWatchDog> Done.
2016-04-25 09:49:28.910 THREAD 19 INFO: LuUtil getLuinsdllVersion normal out:version:844437821587471

2016-04-25 09:49:28.910 THREAD 19 INFO: LuUtil getLuinsdllVersion normal out:version:844437821587471

2016-04-25 09:49:28.910 THREAD 19 INFO: LuUtil getLuinsdllVersion:luinsdll version = 844437821587471
2016-04-25 09:49:28.910 THREAD 19 INFO: LuUtil getLuinsdllVersion:luinsdll version = 844437821587471
2016-04-25 09:49:28.910 THREAD 19 INFO: LuUtil getLuinsdllVersion ends
2016-04-25 09:49:28.910 THREAD 19 INFO: LuUtil getLuinsdllVersion ends
2016-04-25 09:49:28.910 THREAD 19 INFO: LuserverUtility.updateConfWLUVersion():begin update luinsdll version in conf file,luinsdll version=844437821587471
2016-04-25 09:49:28.910 THREAD 19 INFO: LuserverUtility.updateConfWLUVersion():begin update luinsdll version in conf file,luinsdll version=844437821587471
2016-04-25 09:49:28.926 THREAD 19 INFO: LuserverUtility.updateConfWLUVersion():success to update luinsdll version in conf file
2016-04-25 09:49:28.926 THREAD 19 INFO: LuserverUtility.updateConfWLUVersion():success to update luinsdll version in conf file
2016-04-25 09:49:28.957 THREAD 19 WARNING: Upgrade> doUpgrade>> Updating sesm.bat file... dbCompanySize = 0
2016-04-25 09:49:28.973 THREAD 19 WARNING: Upgrade> doUpgrade>> Updating sesm.bat file done!
2016-04-25 09:49:28.973 THREAD 19 WARNING: Upgrade> doUpgrade>> Updating setEnv.bat file...
2016-04-25 09:49:29.082 THREAD 19 WARNING: Upgrade> doUpgrade>> Updating setEnv.bat file done!
2016-04-25 09:49:29.098 THREAD 19 WARNING: Upgrade> doUpgrade>> Deleting webUI cache files...
2016-04-25 09:49:29.113 THREAD 19 WARNING: Upgrade> doUpgrade>> Deleting webUI cache files...Done
2016-04-25 09:49:29.113 THREAD 19 INFO: info : LicenseUtils.getProductType typeFromOD=SEPE onlyFromODLicense=true
2016-04-25 09:49:29.581 THREAD 19 INFO: publishUpgradedPackages start...
2016-04-25 09:49:29.800 THREAD 19 INFO: Global package number = 36
2016-04-25 09:49:29.831 THREAD 19 INFO: All package GUID number = 36
2016-04-25 09:49:29.831 THREAD 19 INFO: SoftwarePackage is suspended. ID=ADA4112638FB00BD203DD0F463C9DF92
2016-04-25 09:49:29.831 THREAD 19 INFO: SoftwarePackage is suspended. ID=A8256C7687548673CE17CB0EE8D0DDAB
2016-04-25 09:49:29.831 THREAD 19 INFO: SoftwarePackage is suspended. ID=A16EA0F994DC469ECDA125BE6DDC1EC1
2016-04-25 09:49:29.831 THREAD 19 INFO: SoftwarePackage is suspended. ID=443C8442B5A3A84EA456F55EA11D4667
2016-04-25 09:49:29.846 THREAD 19 INFO: SoftwarePackage is suspended. ID=1FFF4F99964DAE77DEA84E84170465E3
2016-04-25 09:49:29.846 THREAD 19 INFO: SoftwarePackage is suspended. ID=E289F88B78EC6632E671B71C59B9205C
2016-04-25 09:49:29.846 THREAD 19 INFO: SoftwarePackage is suspended. ID=270FC2D89460177D5F2605D11CB93A51
2016-04-25 09:49:29.846 THREAD 19 INFO: SoftwarePackage is suspended. ID=3165FD56C5790BC3ED69F8C9E0099ADF
2016-04-25 09:49:31.843 THREAD 19 INFO: Publishing physical file, checksum=f0033f5968fe96b46a120ecde16ed5b2,physicalFileID=9AC4C5A419887C63D9F93733B66889F6
2016-04-25 09:49:55.478 THREAD 19 INFO: Signed physical zip file, checksum=f0033f5968fe96b46a120ecde16ed5b2,physicalFileID=9AC4C5A419887C63D9F93733B66889F6
2016-04-25 09:50:13.652 THREAD 19 INFO: Publishing physical file, checksum=8b565d74e7afaec98ebf7eb027fd2044,physicalFileID=36FEE7E8DE29580D52C00DEAC13B336B
2016-04-25 09:50:36.116 THREAD 19 INFO: Signed physical zip file, checksum=8b565d74e7afaec98ebf7eb027fd2044,physicalFileID=36FEE7E8DE29580D52C00DEAC13B336B
2016-04-25 09:52:22.229 THREAD 19 INFO: Publishing physical file, checksum=34a2ca86d4940bbdda61e906ad972fa7,physicalFileID=EAE331B796B078C4011BCEFE0A213D12
2016-04-25 09:52:34.163 THREAD 19 INFO: Signed physical zip file, checksum=34a2ca86d4940bbdda61e906ad972fa7,physicalFileID=EAE331B796B078C4011BCEFE0A213D12
2016-04-25 09:52:39.920 THREAD 19 INFO: Publishing physical file, checksum=3fac941c27553e0731de291da5edf128,physicalFileID=CA510F62CF7EAF051B359ED8C336DEE7
2016-04-25 09:52:56.503 THREAD 19 INFO: Signed physical zip file, checksum=3fac941c27553e0731de291da5edf128,physicalFileID=CA510F62CF7EAF051B359ED8C336DEE7
2016-04-25 09:57:29.941 THREAD 19 INFO: Publishing physical file, checksum=3eb2b4901683549f4697670c34fab450,physicalFileID=FDED5F46EF52FAAEB3028EDE6B54A7EA
2016-04-25 09:57:57.741 THREAD 19 INFO: Signed physical zip file, checksum=3eb2b4901683549f4697670c34fab450,physicalFileID=FDED5F46EF52FAAEB3028EDE6B54A7EA
2016-04-25 09:59:36.116 THREAD 19 INFO: Published package number is =5
2016-04-25 09:59:36.131 THREAD 19 INFO: Saving disaster recovery data to: C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\tomcat\..\Server Private Key Backup\recovery_2016-04-25-09-59-36.zip
2016-04-25 09:59:39.392 THREAD 19 INFO: Upgrade> saveSEPMConfigurationInfoIntoTextFile>> Configuration summary file exists. We need to create only if any changes happened to upgrade configuration
2016-04-25 09:59:39.392 THREAD 19 INFO: Upgrade> isUpgradeConfigurationUpdated>> Checking to see if upgrade configuration has been updated...
2016-04-25 09:59:39.392 THREAD 19 INFO: Upgrade> isUpgradeConfigurationUpdated>> No changes to upgrade configuration.
2016-04-25 09:59:40.172 THREAD 19 INFO: Table INVENTORYCURRENTRISK1 -> Rebuilding indexes...
2016-04-25 09:59:40.203 THREAD 19 INFO: Table INVENTORYCURRENTRISK1 -> Rebuilding indexes done.
2016-04-25 09:59:40.203 THREAD 19 INFO: Rebuild index task has been done for table INVENTORYCURRENTRISK1
2016-04-25 09:59:40.312 THREAD 19 INFO: Table SCANREPORT -> Rebuilding indexes...
2016-04-25 09:59:40.312 THREAD 19 INFO: Table SCANREPORT -> Rebuilding indexes done.
2016-04-25 09:59:40.312 THREAD 19 INFO: Rebuild index task has been done for table SCANREPORT
2016-04-25 09:59:40.422 THREAD 19 INFO: Table IDENTITY_MAP -> Rebuilding indexes...
2016-04-25 09:59:40.656 THREAD 19 INFO: Table IDENTITY_MAP -> Rebuilding indexes done.
2016-04-25 09:59:40.656 THREAD 19 INFO: Rebuild index task has been done for table IDENTITY_MAP
2016-04-25 09:59:40.765 THREAD 19 INFO: Table AUDIT_LOG -> Rebuilding indexes...
2016-04-25 09:59:40.890 THREAD 19 INFO: Table AUDIT_LOG -> Rebuilding indexes done.
2016-04-25 09:59:40.890 THREAD 19 INFO: Rebuild index task has been done for table AUDIT_LOG
2016-04-25 09:59:40.999 THREAD 19 INFO: Table LEGACY_AGENT -> Rebuilding indexes...
2016-04-25 09:59:41.014 THREAD 19 INFO: Table LEGACY_AGENT -> Rebuilding indexes done.
2016-04-25 09:59:41.014 THREAD 19 INFO: Rebuild index task has been done for table LEGACY_AGENT
2016-04-25 09:59:41.124 THREAD 19 INFO: Table OAUTH_CLIENT_DETAILS -> Rebuilding indexes...
2016-04-25 09:59:41.124 THREAD 19 INFO: Table OAUTH_CLIENT_DETAILS -> Rebuilding indexes done.
2016-04-25 09:59:41.124 THREAD 19 INFO: Rebuild index task has been done for table OAUTH_CLIENT_DETAILS
2016-04-25 09:59:41.233 THREAD 19 INFO: Table SERVER_ADMIN_LOG_1 -> Rebuilding indexes...
2016-04-25 09:59:41.280 THREAD 19 INFO: Table SERVER_ADMIN_LOG_1 -> Rebuilding indexes done.
2016-04-25 09:59:41.280 THREAD 19 INFO: Rebuild index task has been done for table SERVER_ADMIN_LOG_1
2016-04-25 09:59:41.389 THREAD 19 INFO: Table SERVER_ADMIN_LOG_2 -> Rebuilding indexes...
2016-04-25 09:59:41.436 THREAD 19 INFO: Table SERVER_ADMIN_LOG_2 -> Rebuilding indexes done.
2016-04-25 09:59:41.436 THREAD 19 INFO: Rebuild index task has been done for table SERVER_ADMIN_LOG_2
2016-04-25 09:59:41.545 THREAD 19 INFO: Table COMMAND -> Rebuilding indexes...
2016-04-25 09:59:41.701 THREAD 19 INFO: Table COMMAND -> Rebuilding indexes done.
2016-04-25 09:59:41.701 THREAD 19 INFO: Rebuild index task has been done for table COMMAND
2016-04-25 09:59:41.810 THREAD 19 INFO: Table HISTORYCONFIG -> Rebuilding indexes...
2016-04-25 09:59:41.826 THREAD 19 INFO: Table HISTORYCONFIG -> Rebuilding indexes done.
2016-04-25 09:59:41.826 THREAD 19 INFO: Rebuild index task has been done for table HISTORYCONFIG
2016-04-25 09:59:41.935 THREAD 19 INFO: Table HISTORY -> Rebuilding indexes...
2016-04-25 09:59:41.950 THREAD 19 INFO: Table HISTORY -> Rebuilding indexes done.
2016-04-25 09:59:41.950 THREAD 19 INFO: Rebuild index task has been done for table HISTORY
2016-04-25 09:59:42.060 THREAD 19 INFO: Table PATTERN -> Rebuilding indexes...
2016-04-25 09:59:42.294 THREAD 19 INFO: Table PATTERN -> Rebuilding indexes done.
2016-04-25 09:59:42.294 THREAD 19 INFO: Rebuild index task has been done for table PATTERN
2016-04-25 09:59:42.403 THREAD 19 INFO: Table CLIENT_GROUPS_CACHE_INFO -> Rebuilding indexes...
2016-04-25 09:59:42.403 THREAD 19 INFO: Table CLIENT_GROUPS_CACHE_INFO -> Rebuilding indexes done.
2016-04-25 09:59:42.403 THREAD 19 INFO: Rebuild index task has been done for table CLIENT_GROUPS_CACHE_INFO
2016-04-25 09:59:42.512 THREAD 19 INFO: Table AGENTCONFIG -> Rebuilding indexes...
2016-04-25 09:59:42.512 THREAD 19 INFO: Table AGENTCONFIG -> Rebuilding indexes done.
2016-04-25 09:59:42.512 THREAD 19 INFO: Rebuild index task has been done for table AGENTCONFIG
2016-04-25 09:59:42.621 THREAD 19 INFO: Table ADMIN_GROUP_REFRESH_INFO -> Rebuilding indexes...
2016-04-25 09:59:42.621 THREAD 19 INFO: Table ADMIN_GROUP_REFRESH_INFO -> Rebuilding indexes done.
2016-04-25 09:59:42.621 THREAD 19 INFO: Rebuild index task has been done for table ADMIN_GROUP_REFRESH_INFO
2016-04-25 09:59:42.730 THREAD 19 INFO: Table SCANS -> Rebuilding indexes...
2016-04-25 09:59:47.551 THREAD 19 INFO: Table SCANS -> Rebuilding indexes done.
2016-04-25 09:59:47.551 THREAD 19 INFO: Rebuild index task has been done for table SCANS
2016-04-25 09:59:47.660 THREAD 19 INFO: Table GUIPARMS -> Rebuilding indexes...
2016-04-25 09:59:47.660 THREAD 19 INFO: Table GUIPARMS -> Rebuilding indexes done.
2016-04-25 09:59:47.660 THREAD 19 INFO: Rebuild index task has been done for table GUIPARMS
2016-04-25 09:59:47.769 THREAD 19 INFO: Table AGENT_PACKET_LOG_2 -> Rebuilding indexes...
2016-04-25 09:59:47.785 THREAD 19 INFO: Table AGENT_PACKET_LOG_2 -> Rebuilding indexes done.
2016-04-25 09:59:47.785 THREAD 19 INFO: Rebuild index task has been done for table AGENT_PACKET_LOG_2
2016-04-25 09:59:47.894 THREAD 19 INFO: Table NOTIFICATIONHISTORY -> Rebuilding indexes...
2016-04-25 09:59:47.894 THREAD 19 INFO: Table NOTIFICATIONHISTORY -> Rebuilding indexes done.
2016-04-25 09:59:47.894 THREAD 19 INFO: Rebuild index task has been done for table NOTIFICATIONHISTORY
2016-04-25 09:59:48.003 THREAD 19 INFO: Table BASIC_METADATA -> Rebuilding indexes...
2016-04-25 09:59:48.081 THREAD 19 INFO: Table BASIC_METADATA -> Rebuilding indexes done.
2016-04-25 09:59:48.081 THREAD 19 INFO: Rebuild index task has been done for table BASIC_METADATA
2016-04-25 09:59:48.191 THREAD 19 INFO: Table AGENT_PACKET_LOG_1 -> Rebuilding indexes...
2016-04-25 09:59:48.206 THREAD 19 INFO: Table AGENT_PACKET_LOG_1 -> Rebuilding indexes done.
2016-04-25 09:59:48.206 THREAD 19 INFO: Rebuild index task has been done for table AGENT_PACKET_LOG_1
2016-04-25 09:59:48.315 THREAD 19 INFO: Table THREATREPORT -> Rebuilding indexes...
2016-04-25 09:59:48.315 THREAD 19 INFO: Table THREATREPORT -> Rebuilding indexes done.
2016-04-25 09:59:48.315 THREAD 19 INFO: Rebuild index task has been done for table THREATREPORT
2016-04-25 09:59:48.425 THREAD 19 INFO: Table REPORTS -> Rebuilding indexes...
2016-04-25 09:59:48.425 THREAD 19 INFO: Table REPORTS -> Rebuilding indexes done.
2016-04-25 09:59:48.425 THREAD 19 INFO: Rebuild index task has been done for table REPORTS
2016-04-25 09:59:48.534 THREAD 19 INFO: Table SEM_JOB -> Rebuilding indexes...
2016-04-25 09:59:48.534 THREAD 19 INFO: Table SEM_JOB -> Rebuilding indexes done.
2016-04-25 09:59:48.549 THREAD 19 INFO: Rebuild index task has been done for table SEM_JOB
2016-04-25 09:59:48.659 THREAD 19 INFO: Table COMMAND_REPORT -> Rebuilding indexes...
2016-04-25 09:59:48.659 THREAD 19 INFO: Table COMMAND_REPORT -> Rebuilding indexes done.
2016-04-25 09:59:48.659 THREAD 19 INFO: Rebuild index task has been done for table COMMAND_REPORT
2016-04-25 09:59:48.768 THREAD 19 INFO: Table ANOMALYREMEDIATIONS -> Rebuilding indexes...
2016-04-25 09:59:48.846 THREAD 19 INFO: Table ANOMALYREMEDIATIONS -> Rebuilding indexes done.
2016-04-25 09:59:48.846 THREAD 19 INFO: Rebuild index task has been done for table ANOMALYREMEDIATIONS
2016-04-25 09:59:48.955 THREAD 19 INFO: Table SCFINVENTORY -> Rebuilding indexes...
2016-04-25 09:59:48.955 THREAD 19 INFO: Table SCFINVENTORY -> Rebuilding indexes done.
2016-04-25 09:59:48.955 THREAD 19 INFO: Rebuild index task has been done for table SCFINVENTORY
2016-04-25 09:59:49.064 THREAD 19 INFO: Table ANOMALYDETECTIONS -> Rebuilding indexes...
2016-04-25 09:59:49.111 THREAD 19 INFO: Table ANOMALYDETECTIONS -> Rebuilding indexes done.
2016-04-25 09:59:49.111 THREAD 19 INFO: Rebuild index task has been done for table ANOMALYDETECTIONS
2016-04-25 09:59:49.220 THREAD 19 INFO: Table ANOMALYREMEDIATION -> Rebuilding indexes...
2016-04-25 09:59:49.251 THREAD 19 INFO: Table ANOMALYREMEDIATION -> Rebuilding indexes done.
2016-04-25 09:59:49.251 THREAD 19 INFO: Rebuild index task has been done for table ANOMALYREMEDIATION
2016-04-25 09:59:49.361 THREAD 19 INFO: Table SERIAL_NUMBERS -> Rebuilding indexes...
2016-04-25 09:59:49.361 THREAD 19 INFO: Table SERIAL_NUMBERS -> Rebuilding indexes done.
2016-04-25 09:59:49.361 THREAD 19 INFO: Rebuild index task has been done for table SERIAL_NUMBERS
2016-04-25 09:59:49.470 THREAD 19 INFO: Table SEM_COMPLIANCE_CRITERIA_2 -> Rebuilding indexes...
2016-04-25 09:59:49.470 THREAD 19 INFO: Table SEM_COMPLIANCE_CRITERIA_2 -> Rebuilding indexes done.
2016-04-25 09:59:49.470 THREAD 19 INFO: Rebuild index task has been done for table SEM_COMPLIANCE_CRITERIA_2
2016-04-25 09:59:49.579 THREAD 19 INFO: Table AGENT_SYSTEM_LOG_1 -> Rebuilding indexes...
2016-04-25 09:59:49.688 THREAD 19 INFO: Table AGENT_SYSTEM_LOG_1 -> Rebuilding indexes done.
2016-04-25 09:59:49.688 THREAD 19 INFO: Rebuild index task has been done for table AGENT_SYSTEM_LOG_1
2016-04-25 09:59:49.797 THREAD 19 INFO: Table AGENT_SYSTEM_LOG_2 -> Rebuilding indexes...
2016-04-25 09:59:50.078 THREAD 19 INFO: Table AGENT_SYSTEM_LOG_2 -> Rebuilding indexes done.
2016-04-25 09:59:50.078 THREAD 19 INFO: Rebuild index task has been done for table AGENT_SYSTEM_LOG_2
2016-04-25 09:59:50.187 THREAD 19 INFO: Table ALERTS -> Rebuilding indexes...
2016-04-25 09:59:50.343 THREAD 19 INFO: Table ALERTS -> Rebuilding indexes done.
2016-04-25 09:59:50.343 THREAD 19 INFO: Rebuild index task has been done for table ALERTS
2016-04-25 09:59:50.453 THREAD 19 INFO: Table OAUTH_REFRESH_TOKEN -> Rebuilding indexes...
2016-04-25 09:59:50.453 THREAD 19 INFO: Table OAUTH_REFRESH_TOKEN -> Rebuilding indexes done.
2016-04-25 09:59:50.453 THREAD 19 INFO: Rebuild index task has been done for table OAUTH_REFRESH_TOKEN
2016-04-25 09:59:50.562 THREAD 19 INFO: Table OAUTH_ACCESS_TOKEN -> Rebuilding indexes...
2016-04-25 09:59:50.577 THREAD 19 INFO: Table OAUTH_ACCESS_TOKEN -> Rebuilding indexes done.
2016-04-25 09:59:50.577 THREAD 19 INFO: Rebuild index task has been done for table OAUTH_ACCESS_TOKEN
2016-04-25 09:59:50.687 THREAD 19 INFO: Table SYSTEM_REPORT -> Rebuilding indexes...
2016-04-25 09:59:50.687 THREAD 19 INFO: Table SYSTEM_REPORT -> Rebuilding indexes done.
2016-04-25 09:59:50.687 THREAD 19 INFO: Rebuild index task has been done for table SYSTEM_REPORT
2016-04-25 09:59:50.796 THREAD 19 INFO: Table HYPERVISOR_VENDOR -> Rebuilding indexes...
2016-04-25 09:59:50.796 THREAD 19 INFO: Table HYPERVISOR_VENDOR -> Rebuilding indexes done.
2016-04-25 09:59:50.796 THREAD 19 INFO: Rebuild index task has been done for table HYPERVISOR_VENDOR
2016-04-25 09:59:50.905 THREAD 19 INFO: Table ENFORCER_TRAFFIC_LOG_2 -> Rebuilding indexes...
2016-04-25 09:59:50.921 THREAD 19 INFO: Table ENFORCER_TRAFFIC_LOG_2 -> Rebuilding indexes done.
2016-04-25 09:59:50.921 THREAD 19 INFO: Rebuild index task has been done for table ENFORCER_TRAFFIC_LOG_2
2016-04-25 09:59:51.030 THREAD 19 INFO: Table SEM_SVA -> Rebuilding indexes...
2016-04-25 09:59:51.030 THREAD 19 INFO: Table SEM_SVA -> Rebuilding indexes done.
2016-04-25 09:59:51.030 THREAD 19 INFO: Rebuild index task has been done for table SEM_SVA
2016-04-25 09:59:51.139 THREAD 19 INFO: Table ANOMALYDETECTIONOPERATION -> Rebuilding indexes...
2016-04-25 09:59:51.170 THREAD 19 INFO: Table ANOMALYDETECTIONOPERATION -> Rebuilding indexes done.
2016-04-25 09:59:51.170 THREAD 19 INFO: Rebuild index task has been done for table ANOMALYDETECTIONOPERATION
2016-04-25 09:59:51.279 THREAD 19 INFO: Table SYSTEM_STATE -> Rebuilding indexes...
2016-04-25 09:59:51.311 THREAD 19 INFO: Table SYSTEM_STATE -> Rebuilding indexes done.
2016-04-25 09:59:51.311 THREAD 19 INFO: Rebuild index task has been done for table SYSTEM_STATE
2016-04-25 09:59:51.420 THREAD 19 INFO: Table ENFORCER_TRAFFIC_LOG_1 -> Rebuilding indexes...
2016-04-25 09:59:51.420 THREAD 19 INFO: Table ENFORCER_TRAFFIC_LOG_1 -> Rebuilding indexes done.
2016-04-25 09:59:51.420 THREAD 19 INFO: Rebuild index task has been done for table ENFORCER_TRAFFIC_LOG_1
2016-04-25 09:59:51.545 THREAD 19 INFO: Table COMPLIANCE_REPORT -> Rebuilding indexes...
2016-04-25 09:59:51.545 THREAD 19 INFO: Table COMPLIANCE_REPORT -> Rebuilding indexes done.
2016-04-25 09:59:51.545 THREAD 19 INFO: Rebuild index task has been done for table COMPLIANCE_REPORT
2016-04-25 09:59:51.654 THREAD 19 INFO: Table AGENT_TRAFFIC_LOG_2 -> Rebuilding indexes...
2016-04-25 09:59:52.106 THREAD 19 INFO: Table AGENT_TRAFFIC_LOG_2 -> Rebuilding indexes done.
2016-04-25 09:59:52.106 THREAD 19 INFO: Rebuild index task has been done for table AGENT_TRAFFIC_LOG_2
2016-04-25 09:59:52.215 THREAD 19 INFO: Table AGENT_TRAFFIC_LOG_1 -> Rebuilding indexes...
2016-04-25 09:59:52.465 THREAD 19 INFO: Table AGENT_TRAFFIC_LOG_1 -> Rebuilding indexes done.
2016-04-25 09:59:52.481 THREAD 19 INFO: Rebuild index task has been done for table AGENT_TRAFFIC_LOG_1
2016-04-25 09:59:52.590 THREAD 19 INFO: Table ANOMALYREMEDIATIONTYPE -> Rebuilding indexes...
2016-04-25 09:59:52.590 THREAD 19 INFO: Table ANOMALYREMEDIATIONTYPE -> Rebuilding indexes done.
2016-04-25 09:59:52.590 THREAD 19 INFO: Rebuild index task has been done for table ANOMALYREMEDIATIONTYPE
2016-04-25 09:59:52.699 THREAD 19 INFO: Table OAUTH_TRUSTED_PARTNER -> Rebuilding indexes...
2016-04-25 09:59:52.715 THREAD 19 INFO: Table OAUTH_TRUSTED_PARTNER -> Rebuilding indexes done.
2016-04-25 09:59:52.715 THREAD 19 INFO: Rebuild index task has been done for table OAUTH_TRUSTED_PARTNER
2016-04-25 09:59:52.824 THREAD 19 INFO: Table AUDIT_REPORT -> Rebuilding indexes...
2016-04-25 09:59:52.824 THREAD 19 INFO: Table AUDIT_REPORT -> Rebuilding indexes done.
2016-04-25 09:59:52.824 THREAD 19 INFO: Rebuild index task has been done for table AUDIT_REPORT
2016-04-25 09:59:52.933 THREAD 19 INFO: Table SEM_APPLICATION -> Rebuilding indexes...
2016-04-25 09:59:57.379 THREAD 19 INFO: Table SEM_APPLICATION -> Rebuilding indexes done.
2016-04-25 09:59:57.379 THREAD 19 INFO: Rebuild index task has been done for table SEM_APPLICATION
2016-04-25 09:59:57.488 THREAD 19 INFO: Table LICENSE -> Rebuilding indexes...
2016-04-25 09:59:57.504 THREAD 19 INFO: Table LICENSE -> Rebuilding indexes done.
2016-04-25 09:59:57.504 THREAD 19 INFO: Rebuild index task has been done for table LICENSE
2016-04-25 09:59:57.613 THREAD 19 INFO: Table VERSION -> Rebuilding indexes...
2016-04-25 09:59:57.613 THREAD 19 INFO: Table VERSION -> Rebuilding indexes done.
2016-04-25 09:59:57.613 THREAD 19 INFO: Rebuild index task has been done for table VERSION
2016-04-25 09:59:57.722 THREAD 19 INFO: Table ALERTFILTER -> Rebuilding indexes...
2016-04-25 09:59:57.722 THREAD 19 INFO: Table ALERTFILTER -> Rebuilding indexes done.
2016-04-25 09:59:57.722 THREAD 19 INFO: Rebuild index task has been done for table ALERTFILTER
2016-04-25 09:59:57.832 THREAD 19 INFO: Table ALERTMSG -> Rebuilding indexes...
2016-04-25 09:59:57.832 THREAD 19 INFO: Table ALERTMSG -> Rebuilding indexes done.
2016-04-25 09:59:57.832 THREAD 19 INFO: Rebuild index task has been done for table ALERTMSG
2016-04-25 09:59:57.941 THREAD 19 INFO: Table PROCESSING_MARKER -> Rebuilding indexes...
2016-04-25 09:59:57.941 THREAD 19 INFO: Table PROCESSING_MARKER -> Rebuilding indexes done.
2016-04-25 09:59:57.941 THREAD 19 INFO: Rebuild index task has been done for table PROCESSING_MARKER
2016-04-25 09:59:58.050 THREAD 19 INFO: Table AGENT_BEHAVIOR_LOG_1 -> Rebuilding indexes...
2016-04-25 09:59:58.456 THREAD 19 INFO: Table AGENT_BEHAVIOR_LOG_1 -> Rebuilding indexes done.
2016-04-25 09:59:58.456 THREAD 19 INFO: Rebuild index task has been done for table AGENT_BEHAVIOR_LOG_1
2016-04-25 09:59:58.565 THREAD 19 INFO: Table AGENT_SECURITY_LOG_2 -> Rebuilding indexes...
2016-04-25 09:59:58.939 THREAD 19 INFO: Table AGENT_SECURITY_LOG_2 -> Rebuilding indexes done.
2016-04-25 09:59:58.939 THREAD 19 INFO: Rebuild index task has been done for table AGENT_SECURITY_LOG_2
2016-04-25 09:59:59.048 THREAD 19 INFO: Table AGENT_BEHAVIOR_LOG_2 -> Rebuilding indexes...
2016-04-25 09:59:59.204 THREAD 19 INFO: Table AGENT_BEHAVIOR_LOG_2 -> Rebuilding indexes done.
2016-04-25 09:59:59.204 THREAD 19 INFO: Rebuild index task has been done for table AGENT_BEHAVIOR_LOG_2
2016-04-25 09:59:59.314 THREAD 19 INFO: Table AGENT_SECURITY_LOG_1 -> Rebuilding indexes...
2016-04-25 09:59:59.672 THREAD 19 INFO: Table AGENT_SECURITY_LOG_1 -> Rebuilding indexes done.
2016-04-25 09:59:59.672 THREAD 19 INFO: Rebuild index task has been done for table AGENT_SECURITY_LOG_1
2016-04-25 09:59:59.782 THREAD 19 INFO: Table ANOMALYDETECTIONTYPE -> Rebuilding indexes...
2016-04-25 09:59:59.782 THREAD 19 INFO: Table ANOMALYDETECTIONTYPE -> Rebuilding indexes done.
2016-04-25 09:59:59.782 THREAD 19 INFO: Rebuild index task has been done for table ANOMALYDETECTIONTYPE
2016-04-25 09:59:59.891 THREAD 19 INFO: Table LOG_CONFIG -> Rebuilding indexes...
2016-04-25 09:59:59.891 THREAD 19 INFO: Table LOG_CONFIG -> Rebuilding indexes done.
2016-04-25 09:59:59.891 THREAD 19 INFO: Rebuild index task has been done for table LOG_CONFIG
2016-04-25 10:00:00.000 THREAD 19 INFO: Table AGENTSTATUS -> Rebuilding indexes...
2016-04-25 10:00:00.000 THREAD 19 INFO: Table AGENTSTATUS -> Rebuilding indexes done.
2016-04-25 10:00:00.000 THREAD 19 INFO: Rebuild index task has been done for table AGENTSTATUS
2016-04-25 10:00:00.109 THREAD 19 INFO: Table HPP_ALERTS -> Rebuilding indexes...
2016-04-25 10:00:00.452 THREAD 19 INFO: Table HPP_ALERTS -> Rebuilding indexes done.
2016-04-25 10:00:00.452 THREAD 19 INFO: Rebuild index task has been done for table HPP_ALERTS
2016-04-25 10:00:00.562 THREAD 19 INFO: Table SEM_COMPUTER -> Rebuilding indexes...
2016-04-25 10:00:01.139 THREAD 19 INFO: Table SEM_COMPUTER -> Rebuilding indexes done.
2016-04-25 10:00:01.139 THREAD 19 INFO: Rebuild index task has been done for table SEM_COMPUTER
2016-04-25 10:00:01.248 THREAD 19 INFO: Table INVENTORYREPORT -> Rebuilding indexes...
2016-04-25 10:00:01.264 THREAD 19 INFO: Table INVENTORYREPORT -> Rebuilding indexes done.
2016-04-25 10:00:01.264 THREAD 19 INFO: Rebuild index task has been done for table INVENTORYREPORT
2016-04-25 10:00:01.373 THREAD 19 INFO: Table NOTIFICATIONALERTS -> Rebuilding indexes...
2016-04-25 10:00:02.278 THREAD 19 INFO: Table NOTIFICATIONALERTS -> Rebuilding indexes done.
2016-04-25 10:00:02.278 THREAD 19 INFO: Rebuild index task has been done for table NOTIFICATIONALERTS
2016-04-25 10:00:02.387 THREAD 19 INFO: Table ANOMALYDETECTION -> Rebuilding indexes...
2016-04-25 10:00:02.387 THREAD 19 INFO: Table ANOMALYDETECTION -> Rebuilding indexes done.
2016-04-25 10:00:02.387 THREAD 19 INFO: Rebuild index task has been done for table ANOMALYDETECTION
2016-04-25 10:00:02.496 THREAD 19 INFO: Table SEM_COMPLIANCE_CRITERIA -> Rebuilding indexes...
2016-04-25 10:00:02.496 THREAD 19 INFO: Table SEM_COMPLIANCE_CRITERIA -> Rebuilding indexes done.
2016-04-25 10:00:02.496 THREAD 19 INFO: Rebuild index task has been done for table SEM_COMPLIANCE_CRITERIA
2016-04-25 10:00:02.605 THREAD 19 INFO: Table ACTUALACTION -> Rebuilding indexes...
2016-04-25 10:00:02.605 THREAD 19 INFO: Table ACTUALACTION -> Rebuilding indexes done.
2016-04-25 10:00:02.605 THREAD 19 INFO: Rebuild index task has been done for table ACTUALACTION
2016-04-25 10:00:02.714 THREAD 19 INFO: Table FIREWALL_REPORT -> Rebuilding indexes...
2016-04-25 10:00:02.714 THREAD 19 INFO: Table FIREWALL_REPORT -> Rebuilding indexes done.
2016-04-25 10:00:02.714 THREAD 19 INFO: Rebuild index task has been done for table FIREWALL_REPORT
2016-04-25 10:00:02.824 THREAD 19 INFO: Table VIRUS -> Rebuilding indexes...
2016-04-25 10:00:12.527 THREAD 19 INFO: Table VIRUS -> Rebuilding indexes done.
2016-04-25 10:00:12.527 THREAD 19 INFO: Rebuild index task has been done for table VIRUS
2016-04-25 10:00:12.636 THREAD 19 INFO: Table SERVER_ENFORCER_LOG_1 -> Rebuilding indexes...
2016-04-25 10:00:12.652 THREAD 19 INFO: Table SERVER_ENFORCER_LOG_1 -> Rebuilding indexes done.
2016-04-25 10:00:12.652 THREAD 19 INFO: Rebuild index task has been done for table SERVER_ENFORCER_LOG_1
2016-04-25 10:00:12.761 THREAD 19 INFO: Table GUP_LIST -> Rebuilding indexes...
2016-04-25 10:00:12.777 THREAD 19 INFO: Table GUP_LIST -> Rebuilding indexes done.
2016-04-25 10:00:12.777 THREAD 19 INFO: Rebuild index task has been done for table GUP_LIST
2016-04-25 10:00:12.886 THREAD 19 INFO: Table SERVER_ENFORCER_LOG_2 -> Rebuilding indexes...
2016-04-25 10:00:12.902 THREAD 19 INFO: Table SERVER_ENFORCER_LOG_2 -> Rebuilding indexes done.
2016-04-25 10:00:12.902 THREAD 19 INFO: Rebuild index task has been done for table SERVER_ENFORCER_LOG_2
2016-04-25 10:00:13.011 THREAD 19 INFO: Table SERVER_POLICY_LOG_2 -> Rebuilding indexes...
2016-04-25 10:00:13.026 THREAD 19 INFO: Table SERVER_POLICY_LOG_2 -> Rebuilding indexes done.
2016-04-25 10:00:13.026 THREAD 19 INFO: Rebuild index task has been done for table SERVER_POLICY_LOG_2
2016-04-25 10:00:13.136 THREAD 19 INFO: Table COMPUTER_APPLICATION -> Rebuilding indexes...
2016-04-25 10:00:13.448 THREAD 19 INFO: Table COMPUTER_APPLICATION -> Rebuilding indexes done.
2016-04-25 10:00:13.448 THREAD 19 INFO: Rebuild index task has been done for table COMPUTER_APPLICATION
2016-04-25 10:00:13.557 THREAD 19 INFO: Table BEHAVIOR_REPORT -> Rebuilding indexes...
2016-04-25 10:00:13.557 THREAD 19 INFO: Table BEHAVIOR_REPORT -> Rebuilding indexes done.
2016-04-25 10:00:13.557 THREAD 19 INFO: Rebuild index task has been done for table BEHAVIOR_REPORT
2016-04-25 10:00:13.666 THREAD 19 INFO: Table VIRUSCATEGORY -> Rebuilding indexes...
2016-04-25 10:00:13.666 THREAD 19 INFO: Table VIRUSCATEGORY -> Rebuilding indexes done.
2016-04-25 10:00:13.666 THREAD 19 INFO: Rebuild index task has been done for table VIRUSCATEGORY
2016-04-25 10:00:13.775 THREAD 19 INFO: Table SERVER_POLICY_LOG_1 -> Rebuilding indexes...
2016-04-25 10:00:13.791 THREAD 19 INFO: Table SERVER_POLICY_LOG_1 -> Rebuilding indexes done.
2016-04-25 10:00:13.791 THREAD 19 INFO: Rebuild index task has been done for table SERVER_POLICY_LOG_1
2016-04-25 10:00:13.900 THREAD 19 INFO: Table HOMEPAGECONFIG -> Rebuilding indexes...
2016-04-25 10:00:13.916 THREAD 19 INFO: Table HOMEPAGECONFIG -> Rebuilding indexes done.
2016-04-25 10:00:13.916 THREAD 19 INFO: Rebuild index task has been done for table HOMEPAGECONFIG
2016-04-25 10:00:14.025 THREAD 19 INFO: Table ENFORCER_SYSTEM_LOG_1 -> Rebuilding indexes...
2016-04-25 10:00:14.040 THREAD 19 INFO: Table ENFORCER_SYSTEM_LOG_1 -> Rebuilding indexes done.
2016-04-25 10:00:14.040 THREAD 19 INFO: Rebuild index task has been done for table ENFORCER_SYSTEM_LOG_1
2016-04-25 10:00:14.150 THREAD 19 INFO: Table ENFORCER_SYSTEM_LOG_2 -> Rebuilding indexes...
2016-04-25 10:00:14.150 THREAD 19 INFO: Table ENFORCER_SYSTEM_LOG_2 -> Rebuilding indexes done.
2016-04-25 10:00:14.150 THREAD 19 INFO: Rebuild index task has been done for table ENFORCER_SYSTEM_LOG_2
2016-04-25 10:00:14.259 THREAD 19 INFO: Table NOTIFICATION -> Rebuilding indexes...
2016-04-25 10:00:14.259 THREAD 19 INFO: Table NOTIFICATION -> Rebuilding indexes done.
2016-04-25 10:00:14.259 THREAD 19 INFO: Rebuild index task has been done for table NOTIFICATION
2016-04-25 10:00:14.368 THREAD 19 INFO: Table ENFORCER_CLIENT_LOG_2 -> Rebuilding indexes...
2016-04-25 10:00:14.384 THREAD 19 INFO: Table ENFORCER_CLIENT_LOG_2 -> Rebuilding indexes done.
2016-04-25 10:00:14.384 THREAD 19 INFO: Rebuild index task has been done for table ENFORCER_CLIENT_LOG_2
2016-04-25 10:00:14.493 THREAD 19 INFO: Table BINARY_FILE -> Rebuilding indexes...
2016-04-25 10:00:14.524 THREAD 19 INFO: Table BINARY_FILE -> Rebuilding indexes done.
2016-04-25 10:00:14.524 THREAD 19 INFO: Rebuild index task has been done for table BINARY_FILE
2016-04-25 10:00:14.633 THREAD 19 INFO: Table ENFORCER_CLIENT_LOG_1 -> Rebuilding indexes...
2016-04-25 10:00:14.649 THREAD 19 INFO: Table ENFORCER_CLIENT_LOG_1 -> Rebuilding indexes done.
2016-04-25 10:00:14.649 THREAD 19 INFO: Rebuild index task has been done for table ENFORCER_CLIENT_LOG_1
2016-04-25 10:00:14.758 THREAD 19 INFO: Table DATA_HANDLER -> Rebuilding indexes...
2016-04-25 10:00:14.758 THREAD 19 INFO: Table DATA_HANDLER -> Rebuilding indexes done.
2016-04-25 10:00:14.758 THREAD 19 INFO: Rebuild index task has been done for table DATA_HANDLER
2016-04-25 10:00:14.867 THREAD 19 INFO: Table ADMIN_GROUPS -> Rebuilding indexes...
2016-04-25 10:00:14.867 THREAD 19 INFO: Table ADMIN_GROUPS -> Rebuilding indexes done.
2016-04-25 10:00:14.867 THREAD 19 INFO: Rebuild index task has been done for table ADMIN_GROUPS
2016-04-25 10:00:14.976 THREAD 19 INFO: Table LICENSE_CHAIN -> Rebuilding indexes...
2016-04-25 10:00:14.976 THREAD 19 INFO: Table LICENSE_CHAIN -> Rebuilding indexes done.
2016-04-25 10:00:14.976 THREAD 19 INFO: Rebuild index task has been done for table LICENSE_CHAIN
2016-04-25 10:00:15.086 THREAD 19 INFO: Table SEM_CLIENT -> Rebuilding indexes...
2016-04-25 10:00:15.335 THREAD 19 INFO: Table SEM_CLIENT -> Rebuilding indexes done.
2016-04-25 10:00:15.335 THREAD 19 INFO: Rebuild index task has been done for table SEM_CLIENT
2016-04-25 10:00:15.444 THREAD 19 INFO: Table SERVER_SYSTEM_LOG_2 -> Rebuilding indexes...
2016-04-25 10:00:15.585 THREAD 19 INFO: Table SERVER_SYSTEM_LOG_2 -> Rebuilding indexes done.
2016-04-25 10:00:15.585 THREAD 19 INFO: Rebuild index task has been done for table SERVER_SYSTEM_LOG_2
2016-04-25 10:00:15.694 THREAD 19 INFO: Table SERVER_SYSTEM_LOG_1 -> Rebuilding indexes...
2016-04-25 10:00:15.803 THREAD 19 INFO: Table SERVER_SYSTEM_LOG_1 -> Rebuilding indexes done.
2016-04-25 10:00:15.803 THREAD 19 INFO: Rebuild index task has been done for table SERVER_SYSTEM_LOG_1
2016-04-25 10:00:15.912 THREAD 19 INFO: Table CLIENT_GROUPS_CACHE -> Rebuilding indexes...
2016-04-25 10:00:15.912 THREAD 19 INFO: Table CLIENT_GROUPS_CACHE -> Rebuilding indexes done.
2016-04-25 10:00:15.912 THREAD 19 INFO: Rebuild index task has been done for table CLIENT_GROUPS_CACHE
2016-04-25 10:00:16.022 THREAD 19 INFO: Table ANOMALYREMEDIATIONOPERATION -> Rebuilding indexes...
2016-04-25 10:00:16.022 THREAD 19 INFO: Table ANOMALYREMEDIATIONOPERATION -> Rebuilding indexes done.
2016-04-25 10:00:16.022 THREAD 19 INFO: Rebuild index task has been done for table ANOMALYREMEDIATIONOPERATION
2016-04-25 10:00:16.131 THREAD 19 INFO: Table ADMINUSER -> Rebuilding indexes...
2016-04-25 10:00:16.131 THREAD 19 INFO: Table ADMINUSER -> Rebuilding indexes done.
2016-04-25 10:00:16.131 THREAD 19 INFO: Rebuild index task has been done for table ADMINUSER
2016-04-25 10:00:16.240 THREAD 19 INFO: Table CLIENT_GROUPS_CACHE_STAGING -> Rebuilding indexes...
2016-04-25 10:00:16.256 THREAD 19 INFO: Table CLIENT_GROUPS_CACHE_STAGING -> Rebuilding indexes done.
2016-04-25 10:00:16.256 THREAD 19 INFO: Rebuild index task has been done for table CLIENT_GROUPS_CACHE_STAGING
2016-04-25 10:00:16.365 THREAD 19 INFO: Table SEM_AGENT -> Rebuilding indexes...
2016-04-25 10:00:16.677 THREAD 19 INFO: Table SEM_AGENT -> Rebuilding indexes done.
2016-04-25 10:00:16.677 THREAD 19 INFO: Rebuild index task has been done for table SEM_AGENT
2016-04-25 10:00:16.786 THREAD 19 INFO: Table SEM_CONTENT -> Rebuilding indexes...
2016-04-25 10:00:17.301 THREAD 19 INFO: Table SEM_CONTENT -> Rebuilding indexes done.
2016-04-25 10:00:17.301 THREAD 19 INFO: Rebuild index task has been done for table SEM_CONTENT
2016-04-25 10:00:17.410 THREAD 19 INFO: Table GROUP_HI_STATUS -> Rebuilding indexes...
2016-04-25 10:00:17.410 THREAD 19 INFO: Table GROUP_HI_STATUS -> Rebuilding indexes done.
2016-04-25 10:00:17.410 THREAD 19 INFO: Rebuild index task has been done for table GROUP_HI_STATUS
2016-04-25 10:00:17.519 THREAD 19 INFO: Table HPP_APPLICATION -> Rebuilding indexes...
2016-04-25 10:00:17.660 THREAD 19 INFO: Table HPP_APPLICATION -> Rebuilding indexes done.
2016-04-25 10:00:17.660 THREAD 19 INFO: Rebuild index task has been done for table HPP_APPLICATION
2016-04-25 10:00:17.769 THREAD 19 INFO: Table SEM_SVA_COMPUTER -> Rebuilding indexes...
2016-04-25 10:00:17.769 THREAD 19 INFO: Table SEM_SVA_COMPUTER -> Rebuilding indexes done.
2016-04-25 10:00:17.769 THREAD 19 INFO: Rebuild index task has been done for table SEM_SVA_COMPUTER
2016-04-25 10:00:17.878 THREAD 19 INFO: Table CONTENT_EVENTS -> Rebuilding indexes...
2016-04-25 10:00:19.610 THREAD 19 INFO: Table CONTENT_EVENTS -> Rebuilding indexes done.
2016-04-25 10:00:19.610 THREAD 19 INFO: Rebuild index task has been done for table CONTENT_EVENTS
2016-04-25 10:00:19.719 THREAD 19 INFO: Table SEM_OS_INFO -> Rebuilding indexes...
2016-04-25 10:00:19.735 THREAD 19 INFO: Table SEM_OS_INFO -> Rebuilding indexes done.
2016-04-25 10:00:19.735 THREAD 19 INFO: Rebuild index task has been done for table SEM_OS_INFO
2016-04-25 10:00:19.844 THREAD 19 INFO: Table SERVER_CLIENT_LOG_2 -> Rebuilding indexes...
2016-04-25 10:00:19.875 THREAD 19 INFO: Table SERVER_CLIENT_LOG_2 -> Rebuilding indexes done.
2016-04-25 10:00:19.875 THREAD 19 INFO: Rebuild index task has been done for table SERVER_CLIENT_LOG_2
2016-04-25 10:00:19.984 THREAD 19 INFO: Table LAN_DEVICE_EXCLUDED -> Rebuilding indexes...
2016-04-25 10:00:19.984 THREAD 19 INFO: Table LAN_DEVICE_EXCLUDED -> Rebuilding indexes done.
2016-04-25 10:00:19.984 THREAD 19 INFO: Rebuild index task has been done for table LAN_DEVICE_EXCLUDED
2016-04-25 10:00:20.093 THREAD 19 INFO: Table SERVER_CLIENT_LOG_1 -> Rebuilding indexes...
2016-04-25 10:00:20.203 THREAD 19 INFO: Table SERVER_CLIENT_LOG_1 -> Rebuilding indexes done.
2016-04-25 10:00:20.203 THREAD 19 INFO: Rebuild index task has been done for table SERVER_CLIENT_LOG_1
2016-04-25 10:00:20.312 THREAD 19 INFO: Table SEM_SVA_CLIENT -> Rebuilding indexes...
2016-04-25 10:00:20.312 THREAD 19 INFO: Table SEM_SVA_CLIENT -> Rebuilding indexes done.
2016-04-25 10:00:20.312 THREAD 19 INFO: Rebuild index task has been done for table SEM_SVA_CLIENT
2016-04-25 10:00:20.421 THREAD 19 INFO: Table LAN_DEVICE_DETECTED -> Rebuilding indexes...
2016-04-25 10:00:20.452 THREAD 19 INFO: Table LAN_DEVICE_DETECTED -> Rebuilding indexes done.
2016-04-25 10:00:20.452 THREAD 19 INFO: Rebuild index task has been done for table LAN_DEVICE_DETECTED
2016-04-25 10:00:24.149 THREAD 19 INFO: UpgradeStep >> checkUpgradeStatus.
2016-04-25 10:00:24.149 THREAD 19 INFO: UpgradeStep >> checkUpgradeStatus.
2016-04-25 10:00:24.149 THREAD 19 INFO: LuUtil getLuinsdllVersion begins
2016-04-25 10:00:24.149 THREAD 19 INFO: LuUtil getLuinsdllVersion begins
2016-04-25 10:00:24.243 THREAD 31 INFO: RunCommandHandler>> processWatchDog> Done.
2016-04-25 10:00:24.243 THREAD 19 INFO: LuUtil getLuinsdllVersion normal out:version:844437821587471

2016-04-25 10:00:24.243 THREAD 19 INFO: LuUtil getLuinsdllVersion normal out:version:844437821587471

2016-04-25 10:00:24.243 THREAD 19 INFO: LuUtil getLuinsdllVersion:luinsdll version = 844437821587471
2016-04-25 10:00:24.243 THREAD 19 INFO: LuUtil getLuinsdllVersion:luinsdll version = 844437821587471
2016-04-25 10:00:24.243 THREAD 19 INFO: LuUtil getLuinsdllVersion ends
2016-04-25 10:00:24.243 THREAD 19 INFO: LuUtil getLuinsdllVersion ends
2016-04-25 10:00:24.243 THREAD 19 INFO: LuserverUtility.updateConfWLUVersion():begin update luinsdll version in conf file,luinsdll version=844437821587471
2016-04-25 10:00:24.243 THREAD 19 INFO: LuserverUtility.updateConfWLUVersion():begin update luinsdll version in conf file,luinsdll version=844437821587471
2016-04-25 10:00:24.305 THREAD 19 INFO: LuserverUtility.updateConfWLUVersion():success to update luinsdll version in conf file
2016-04-25 10:00:24.305 THREAD 19 INFO: LuserverUtility.updateConfWLUVersion():success to update luinsdll version in conf file
2016-04-25 10:00:24.352 THREAD 19 INFO: Web services for Symantec Protection Center have been enabled. For this setting to take effect, you must restart the Symantec Endpoint Protection Manager service.
2016-04-25 10:00:24.368 THREAD 19 WARNING: Upgrade> updateWebConsolePort>> Changing Web Console port in server.xml, conf.properties...
2016-04-25 10:00:24.368 THREAD 19 WARNING: Upgrade> updateWebConsolePort>> Changing Web Console port in server.xml, conf.properties done!
2016-04-25 10:00:24.368 THREAD 19 WARNING: Upgrade> updateWebServicesPort>> Updating SPC Webservice port...
2016-04-25 10:00:24.415 THREAD 19 WARNING: Upgrade> updateWebServicesPort>> Updating SPC Webservice port done!
2016-04-25 10:00:24.415 THREAD 19 WARNING: Upgrade> updateWebServicesPort>> Updating RMM Webservice port...
2016-04-25 10:00:24.415 THREAD 19 WARNING: Upgrade> updateWebServicesPort>> Updating RMM Webservice port done!
2016-04-25 10:00:24.415 THREAD 19 INFO: Web services for Symantec Protection Center have been disabled. For this setting to take effect, you must restart the Symantec Endpoint Protection Manager service.
2016-04-25 10:00:24.446 THREAD 19 WARNING: Upgrade> doUpgrade>> Disabling SPC webservices done!
2016-04-25 10:00:24.446 THREAD 19 INFO: Upgrade> doUpgrade>> Updating server.xml for APR done.
2016-04-25 10:00:24.446 THREAD 19 INFO: updateElementInPropFile: keyscm.include.legacy.netscanpassword ,value: true
2016-04-25 10:00:24.477 THREAD 19 INFO: saveConfProp: done
2016-04-25 10:00:24.477 THREAD 19 INFO: updateElementInPropFile: keyscm.audit.log.retention.in.days ,value: 365
2016-04-25 10:00:24.493 THREAD 19 INFO: saveConfProp: done
2016-04-25 10:00:24.493 THREAD 19 INFO: updateElementInPropFile: keyscm.audit.log.enabled ,value: true
2016-04-25 10:00:24.524 THREAD 19 INFO: saveConfProp: done
2016-04-25 10:00:24.524 THREAD 19 INFO: updateElementInPropFile: keyscm.web.service.throttle ,value: 100
2016-04-25 10:00:24.539 THREAD 19 INFO: saveConfProp: done
2016-04-25 10:00:24.539 THREAD 19 INFO: updateElementInPropFile: keyscm.web.service.throttle.enabled ,value: true
2016-04-25 10:00:24.555 THREAD 19 INFO: saveConfProp: done
2016-04-25 10:00:24.555 THREAD 19 INFO: updateElementInPropFile: keyscm.web.service.rest.throttle.enabled ,value: true
2016-04-25 10:00:24.571 THREAD 19 INFO: saveConfProp: done
2016-04-25 10:00:24.571 THREAD 19 INFO: updateElementInPropFile: keyscm.web.service.rest.throttle.threshold ,value: 50
2016-04-25 10:00:24.571 THREAD 19 INFO: saveConfProp: done
2016-04-25 10:00:24.571 THREAD 19 INFO: updateElementInPropFile: keyscm.web.service.rest.throttle.window.mins ,value: 1
2016-04-25 10:00:24.586 THREAD 19 INFO: saveConfProp: done
2016-04-25 10:00:24.586 THREAD 19 WARNING: Upgrade> doUpgrade>> IncludeLegacyNetscanPassword setting ? true
2016-04-25 10:00:24.602 THREAD 19 INFO: Number of Engine tag element : 2
2016-04-25 10:00:24.602 THREAD 19 INFO: ServerUtil->getJVMSettings: try to get existing JVM settings... ...
2016-04-25 10:00:25.709 THREAD 19 INFO: ServerUtil> readAllExistingJVMSettings>> Command output: [
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\semsrv\Parameters
    JVM Option Count    REG_DWORD    0x11

]
2016-04-25 10:00:25.709 THREAD 19 INFO: ServerUtil> readAllExistingJVMSettings>> JVM Option Count: 18
2016-04-25 10:00:26.817 THREAD 19 INFO: ServerUtil> readAllExistingJVMSettings>> Command output: [
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\semsrv\Parameters
    JVM Option Number 0    REG_SZ    -Xms1024m

]
2016-04-25 10:00:27.909 THREAD 19 INFO: ServerUtil> readAllExistingJVMSettings>> Command output: [
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\semsrv\Parameters
    JVM Option Number 1    REG_SZ    -Xmx1024m

]
2016-04-25 10:00:29.048 THREAD 19 INFO: ServerUtil> readAllExistingJVMSettings>> Command output: [
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\semsrv\Parameters
    JVM Option Number 2    REG_SZ    -XX:MinHeapFreeRatio=40

]
2016-04-25 10:00:30.156 THREAD 19 INFO: ServerUtil> readAllExistingJVMSettings>> Command output: [
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\semsrv\Parameters
    JVM Option Number 3    REG_SZ    -XX:MaxHeapFreeRatio=70

]
2016-04-25 10:00:31.357 THREAD 19 INFO: ServerUtil> readAllExistingJVMSettings>> Command output: [
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\semsrv\Parameters
    JVM Option Number 4    REG_SZ    -Djava.endorsed.dirs=C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\tomcat\lib\endorsed

]
2016-04-25 10:00:32.464 THREAD 19 INFO: ServerUtil> readAllExistingJVMSettings>> Command output: [
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\semsrv\Parameters
    JVM Option Number 5    REG_SZ    -XX:MaxPermSize=256m

]
2016-04-25 10:00:33.572 THREAD 19 INFO: ServerUtil> readAllExistingJVMSettings>> Command output: [
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\semsrv\Parameters
    JVM Option Number 6    REG_SZ    -XX:-UseSplitVerifier

]
2016-04-25 10:00:34.664 THREAD 19 INFO: ServerUtil> readAllExistingJVMSettings>> Command output: [
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\semsrv\Parameters
    JVM Option Number 7    REG_SZ    -Djava.endorsed.dirs=C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\tomcat\lib\endorsed

]
2016-04-25 10:00:35.772 THREAD 19 INFO: ServerUtil> readAllExistingJVMSettings>> Command output: [
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\semsrv\Parameters
    JVM Option Number 8    REG_SZ    -Djava.class.path=C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\jre\lib\rt.jar;C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\tomcat\bin\bootstrap.jar;C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\tomcat\bin\tomcat-juli.jar;

]
2016-04-25 10:00:36.864 THREAD 19 INFO: ServerUtil> readAllExistingJVMSettings>> Command output: [
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\semsrv\Parameters
    JVM Option Number 9    REG_SZ    -Dcatalina.base=C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\tomcat

]
2016-04-25 10:00:37.971 THREAD 19 INFO: ServerUtil> readAllExistingJVMSettings>> Command output: [
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\semsrv\Parameters
    JVM Option Number 10    REG_SZ    -Dcatalina.home=C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\tomcat

]
2016-04-25 10:00:39.079 THREAD 19 INFO: ServerUtil> readAllExistingJVMSettings>> Command output: [
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\semsrv\Parameters
    JVM Option Number 11    REG_SZ    -Djava.library.path=%PATH%;C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\tomcat\bin\;C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\tomcat\..\ASA\win32

]
2016-04-25 10:00:40.187 THREAD 19 INFO: ServerUtil> readAllExistingJVMSettings>> Command output: [
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\semsrv\Parameters
    JVM Option Number 12    REG_SZ    -Djava.io.tmpdir=C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\tomcat\temp

]
2016-04-25 10:00:41.294 THREAD 19 INFO: ServerUtil> readAllExistingJVMSettings>> Command output: [
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\semsrv\Parameters
    JVM Option Number 13    REG_SZ    -Dajaxswing.home=C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\tomcat\webapps\ajaxswing\WEB-INF\ajaxswing

]
2016-04-25 10:00:42.402 THREAD 19 INFO: ServerUtil> readAllExistingJVMSettings>> Command output: [
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\semsrv\Parameters
    JVM Option Number 14    REG_SZ    -Dcom.sun.xml.ws.fault.SOAPFaultBuilder.disableCaptureStackTrace=false

]
2016-04-25 10:00:43.510 THREAD 19 INFO: ServerUtil> readAllExistingJVMSettings>> Command output: [
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\semsrv\Parameters
    JVM Option Number 15    REG_SZ    -Xbootclasspath/p:C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\tomcat\bin\asboot.jar

]
2016-04-25 10:00:44.617 THREAD 19 INFO: ServerUtil> readAllExistingJVMSettings>> Command output: [
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\semsrv\Parameters
    JVM Option Number 16    REG_SZ    -Djava.util.logging.manager=org.apache.juli.ClassLoaderLogManager

]
2016-04-25 10:00:45.725 THREAD 19 INFO: ServerUtil> readAllExistingJVMSettings>> Command output: [

]
2016-04-25 10:00:45.725 THREAD 19 INFO: Unable to find existing JVM setting for registry data: -XX:NewRatio
2016-04-25 10:00:45.725 THREAD 19 INFO: getExistingJVMSettings   jvm option 0:  -Xms1024m
2016-04-25 10:00:45.725 THREAD 19 INFO: getExistingJVMSettings   jvm option 1:  -Xmx1024m
2016-04-25 10:00:45.725 THREAD 19 INFO: getExistingJVMSettings   jvm option 2:  -XX:MinHeapFreeRatio=40
2016-04-25 10:00:45.725 THREAD 19 INFO: getExistingJVMSettings   jvm option 3:  -XX:MaxHeapFreeRatio=70
2016-04-25 10:00:45.725 THREAD 19 INFO: getExistingJVMSettings   jvm option 4:  -XX:NewRatio=15
2016-04-25 10:00:45.725 THREAD 19 INFO: getExistingJVMSettings   jvm option 5:  -XX:MaxPermSize=256m
2016-04-25 10:00:45.725 THREAD 19 INFO: getExistingJVMSettings   jvm option 6:  -XX:-UseSplitVerifier
2016-04-25 10:00:45.725 THREAD 19 WARNING: Upgrade> unInstallAndInstallApacheService>> UnInstalling / Installing Apache service...
2016-04-25 10:00:45.725 THREAD 19 WARNING: SemServiceManager> unInstallApacheService>> Uninstalling apache service...
2016-04-25 10:00:45.896 THREAD 19 INFO: The Symantec Endpoint Protection Manager service is not started.More help is available by typing NET HELPMSG 3521.
2016-04-25 10:00:45.896 THREAD 19 INFO: SemServiceManager> serviceControl>> Executed command - stop semsrv, process return value = 2
2016-04-25 10:00:45.896 THREAD 19 INFO: SemServiceManager> waitForServiceTermination>> Waiting for service termination: semsrv
2016-04-25 10:00:45.896 THREAD 19 INFO: SemServiceManager> getServiceStatus>> Retrieve status for service semsrv
2016-04-25 10:00:46.037 THREAD 19 INFO: SemServiceManager> getServiceStatus>> The status for semsrv' service is 1
2016-04-25 10:00:46.052 THREAD 19 INFO: SemServiceManager> waitForServiceTermination>> Service is stopped.
2016-04-25 10:00:46.224 THREAD 19 INFO: The Symantec Endpoint Protection Manager Webserver service is not started.More help is available by typing NET HELPMSG 3521.
2016-04-25 10:00:46.224 THREAD 19 INFO: SemServiceManager> serviceControl>> Executed command - stop semwebsrv, process return value = 2
2016-04-25 10:00:47.222 THREAD 19 INFO: Removing the Symantec Endpoint Protection Manager Webserver serviceThe Symantec Endpoint Protection Manager Webserver service has been removed successfully.
2016-04-25 10:00:47.425 THREAD 19 INFO: getUserRightsForSemWebSrv isSQLDB = true isWindowsAuth = false
2016-04-25 10:00:47.425 THREAD 19 INFO: User rights for semwebsrv = [SeServiceLogonRight]
2016-04-25 10:00:47.597 THREAD 19 INFO: Apache service account is deleted from SeServiceLogonRight option ? true
2016-04-25 10:00:47.597 THREAD 19 WARNING: SemServiceManager> unInstallApacheService>> Uninstalling apache service done! Process return code = 0. Apache service account is deleted from SeServiceLogonRight option ? true
2016-04-25 10:00:47.628 THREAD 19 INFO: CertUtil.ExportPublicCertificateAsBinary>>The input alias name is empty, use default:tomcat
2016-04-25 10:00:47.800 THREAD 19 WARNING: SemServiceManager> installApacheService>> Installing Apache service, serverHome: C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\tomcat, serviceName: semwebsrv
2016-04-25 10:00:47.800 THREAD 19 WARNING: SemServiceManager> installApacheServiceOnce>> Installing Apache service... Current time = Mon Apr 25 10:00:47 AST 2016
2016-04-25 10:00:47.878 THREAD 19 INFO: SemServiceManager> installApacheServiceOnce>> inputParameters = [C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\apache\bin\httpd.exe, -k, install, -n, "semwebsrv", -f, "C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\apache\conf\httpd.conf", -d, "C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\apache\.", -D, WIN64OS]
2016-04-25 10:00:49.812 THREAD 19 INFO: Installing the semwebsrv serviceThe semwebsrv service is successfully installed.Testing httpd.conf....Errors reported here must be corrected before the service can be started.
2016-04-25 10:00:49.859 THREAD 19 INFO: SemServiceManager> installApacheServiceOnce>> returnCode = 0
2016-04-25 10:00:49.859 THREAD 19 WARNING: SemServiceManager> installApacheServiceOnce>> Apache service installed.
2016-04-25 10:00:49.859 THREAD 19 WARNING: SemServiceManager> installApacheServiceOnce>> Operating system does support virtual account. Apache service will be installed under account = NT SERVICE\semwebsrv
2016-04-25 10:00:49.859 THREAD 19 WARNING: SemServiceManager> modifyApacheServiceAccount>> Modifying Apache service account... account to: NT SERVICE\semwebsrv
2016-04-25 10:00:49.968 THREAD 19 WARNING: SemServiceManager> modifyApacheServiceAccount>> Modifying Apache service account done! Process return code = 0
2016-04-25 10:00:50.296 THREAD 19 INFO: getUserRightsForSemWebSrv isSQLDB = true isWindowsAuth = false
2016-04-25 10:00:50.296 THREAD 19 INFO: User rights for semwebsrv = [SeServiceLogonRight]
2016-04-25 10:00:50.545 THREAD 19 INFO: SemServiceManager> installApacheServiceOnce>> Adding 'NT SERVICE\semwebsrv account to SeServiceLogonRight option. Succeeded ? true
2016-04-25 10:00:50.545 THREAD 19 INFO: SemServiceManager> installApacheServiceOnce>> Overall status of local policy edit for services = true
2016-04-25 10:00:50.545 THREAD 19 WARNING: SemServiceManager> installApacheServiceOnce>> Installing Apache service done! Process return code = 0, Current time = Mon Apr 25 10:00:50 AST 2016
2016-04-25 10:00:50.545 THREAD 19 WARNING: SemServiceManager> installApacheService>> Apache service instllaltion succeeded.
2016-04-25 10:00:50.545 THREAD 19 INFO: C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\tomcat\..\bin\ServiceUtil.exe
2016-04-25 10:00:50.545 THREAD 19 INFO: -service
2016-04-25 10:00:50.545 THREAD 19 INFO: semwebsrv
2016-04-25 10:00:50.545 THREAD 19 INFO: -setservicerecovery
2016-04-25 10:00:50.545 THREAD 19 INFO:
2016-04-25 10:00:50.701 THREAD 19 INFO: Service Recovery options for semwebsrv have been successfully configured.
2016-04-25 10:00:50.701 THREAD 19 INFO: C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\tomcat\..\bin\ServiceUtil.exe
2016-04-25 10:00:50.701 THREAD 19 INFO: -service
2016-04-25 10:00:50.701 THREAD 19 INFO: semwebsrv
2016-04-25 10:00:50.701 THREAD 19 INFO: -displayname
2016-04-25 10:00:50.701 THREAD 19 INFO: Symantec Endpoint Protection Manager Webserver
2016-04-25 10:00:50.701 THREAD 19 INFO: -description
2016-04-25 10:00:50.701 THREAD 19 INFO: Web server which communicates with Symantec Endpoint Protection Manager, Symantec Endpoint Protection clients, and a database.
2016-04-25 10:00:50.701 THREAD 19 INFO:
2016-04-25 10:00:51.435 THREAD 19 INFO: Service display name for semwebsrv has been successfully configured.Service description for semwebsrv has been successfully configured.
2016-04-25 10:00:51.435 THREAD 19 WARNING: Upgrade> unInstallAndInstallApacheService>> setServiceDisplay process return code: 0
2016-04-25 10:00:51.435 THREAD 19 WARNING: Upgrade> unInstallAndReInstallTomcatService>> UnInstalling / Installing Tomcat service...
2016-04-25 10:00:51.778 THREAD 19 INFO: The Symantec Endpoint Protection Manager service is not started.More help is available by typing NET HELPMSG 3521.
2016-04-25 10:00:51.778 THREAD 19 INFO: SemServiceManager> serviceControl>> Executed command - stop semsrv, process return value = 2
2016-04-25 10:00:51.778 THREAD 19 INFO: SemServiceManager> waitForServiceTermination>> Waiting for service termination: semsrv
2016-04-25 10:00:51.778 THREAD 19 INFO: SemServiceManager> getServiceStatus>> Retrieve status for service semsrv
2016-04-25 10:00:52.027 THREAD 19 INFO: SemServiceManager> getServiceStatus>> The status for semsrv' service is 1
2016-04-25 10:00:52.043 THREAD 19 INFO: SemServiceManager> waitForServiceTermination>> Service is stopped.
2016-04-25 10:00:52.043 THREAD 19 WARNING: SemServiceManager> unInstallSemService>> Trying to uninstall semsrv service, #: 1
2016-04-25 10:00:52.246 THREAD 19 INFO: SemServiceManager> unInstallSemService>> Uninstall service semsrv, return code = 0
2016-04-25 10:00:53.400 THREAD 19 SEVERE: Error code from sc query: 1060
2016-04-25 10:00:53.400 THREAD 19 WARNING: SemServiceManager> unInstallSemService>> Uninstalling semsrv service done! Return code = 0, isServiceInstalled = false
2016-04-25 10:00:53.400 THREAD 19 INFO: User rights for semsrv = [SeServiceLogonRight]
2016-04-25 10:00:53.572 THREAD 19 INFO: SemServiceManager> unInstallTomcatService>> Tomcat service account is deleted from SeServiceLogonRight option ? true
2016-04-25 10:00:53.572 THREAD 19 WARNING: SemServiceManager> installTomcatService>> Installing Tomcat service... Current time = Mon Apr 25 10:00:53 AST 2016, serverHome = C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\tomcat, jreHome = C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\jre, jvmSettings = [-Xms1024m, -Xmx1024m, -XX:MinHeapFreeRatio=40, -XX:MaxHeapFreeRatio=70, -XX:NewRatio=15, -XX:MaxPermSize=256m, -XX:-UseSplitVerifier]
2016-04-25 10:00:53.572 THREAD 19 WARNING: SemServiceManager> installTomcatService>> Operating system does support virtual account. Tomcat service will be installed under account = NT SERVICE\semsrv
2016-04-25 10:00:54.133 THREAD 19 INFO: CustomSD not found for Application Event Log, so no need to add ACL for service logon account.
2016-04-25 10:00:54.430 THREAD 19 INFO: User rights for semsrv = [SeServiceLogonRight]
2016-04-25 10:00:54.617 THREAD 19 INFO: SemServiceManager> installTomcatService>> Adding 'NT SERVICE\semsrv' account to SeServiceLogonRight option. Succeeded ? true
2016-04-25 10:00:54.617 THREAD 19 INFO: SemServiceManager> installTomcatService>> Overall status of local policy edit for services = true
2016-04-25 10:00:54.617 THREAD 19 WARNING: SemServiceManager> installTomcatService>> Installing Tomcat service done! Process return code = 0, Current time = Mon Apr 25 10:00:54 AST 2016
2016-04-25 10:00:54.617 THREAD 19 INFO: C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\tomcat\..\bin\ServiceUtil.exe
2016-04-25 10:00:54.617 THREAD 19 INFO: -service
2016-04-25 10:00:54.617 THREAD 19 INFO: semsrv
2016-04-25 10:00:54.617 THREAD 19 INFO: -setservicerecovery
2016-04-25 10:00:54.617 THREAD 19 INFO:
2016-04-25 10:00:54.757 THREAD 19 INFO: Service Recovery options for semsrv have been successfully configured.
2016-04-25 10:00:54.757 THREAD 19 WARNING: Upgrade> unInstallAndReInstallTomcatService>> UnInstalling / Installing Tomcat service done! Set service recovery for Tomcat service done! Process return code: 0
2016-04-25 10:00:54.757 THREAD 19 WARNING: Upgrade> unInstallAndReInstallLaunchService>> UnInstalling / Installing launch service...
2016-04-25 10:00:54.913 THREAD 19 INFO: The Symantec Endpoint Protection Launcher service is not started.More help is available by typing NET HELPMSG 3521.
2016-04-25 10:00:54.913 THREAD 19 INFO: SemServiceManager> serviceControl>> Executed command - stop semlaunchsrv, process return value = 2
2016-04-25 10:00:54.913 THREAD 19 INFO: SemServiceManager> waitForServiceTermination>> Waiting for service termination: semlaunchsrv
2016-04-25 10:00:54.913 THREAD 19 INFO: SemServiceManager> getServiceStatus>> Retrieve status for service semlaunchsrv
2016-04-25 10:00:55.038 THREAD 19 INFO: SemServiceManager> getServiceStatus>> The status for semlaunchsrv' service is 1
2016-04-25 10:00:55.054 THREAD 19 INFO: SemServiceManager> waitForServiceTermination>> Service is stopped.
2016-04-25 10:00:55.054 THREAD 19 WARNING: SemServiceManager> unInstallSemLaunchService>> Uninstalling sem launch service...
2016-04-25 10:00:55.054 THREAD 19 WARNING: SemServiceManager> unInstallSemService>> Trying to uninstall semlaunchsrv service, #: 1
2016-04-25 10:00:55.319 THREAD 19 INFO: SemServiceManager> unInstallSemService>> Uninstall service semlaunchsrv, return code = 0
2016-04-25 10:00:56.473 THREAD 19 SEVERE: Error code from sc query: 1060
2016-04-25 10:00:56.473 THREAD 19 WARNING: SemServiceManager> unInstallSemService>> Uninstalling semlaunchsrv service done! Return code = 0, isServiceInstalled = false
2016-04-25 10:00:56.473 THREAD 19 WARNING: SemServiceManager> installSemLaunchService>> Launch service will be installed under account = LocalSystem
2016-04-25 10:00:56.832 THREAD 19 INFO: SemLaunchService> generateLaunchServiceSecretKey>> Secret key is changed.
2016-04-25 10:00:56.832 THREAD 19 INFO: C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\tomcat\..\bin\ServiceUtil.exe
2016-04-25 10:00:56.832 THREAD 19 INFO: -service
2016-04-25 10:00:56.832 THREAD 19 INFO: semlaunchsrv
2016-04-25 10:00:56.832 THREAD 19 INFO: -setservicerecovery
2016-04-25 10:00:56.832 THREAD 19 INFO:
2016-04-25 10:00:56.973 THREAD 19 INFO: Service Recovery options for semlaunchsrv have been successfully configured.
2016-04-25 10:00:56.973 THREAD 19 INFO: C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\tomcat\..\bin\ServiceUtil.exe
2016-04-25 10:00:56.973 THREAD 19 INFO: -service
2016-04-25 10:00:56.973 THREAD 19 INFO: semlaunchsrv
2016-04-25 10:00:56.973 THREAD 19 INFO: -displayname
2016-04-25 10:00:56.973 THREAD 19 INFO: Symantec Endpoint Protection Launcher
2016-04-25 10:00:56.973 THREAD 19 INFO: -description
2016-04-25 10:00:56.973 THREAD 19 INFO: Launch service which can invoke special processes for Symantec Endpoint Protection Manager.
2016-04-25 10:00:56.973 THREAD 19 INFO:
2016-04-25 10:00:57.207 THREAD 19 INFO: Service display name for semlaunchsrv has been successfully configured.Service description for semlaunchsrv has been successfully configured.
2016-04-25 10:00:57.207 THREAD 19 WARNING: Upgrade> unInstallAndReInstallLaunchService>> UnInstalling / Installing launch service done!
2016-04-25 10:00:57.207 THREAD 19 WARNING: SEPMACLManager>>Reading definitions from xml...
2016-04-25 10:00:57.300 THREAD 19 INFO: ServiceUtil> execCmd >> Started. Command = [C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\tomcat\..\bin\ServiceUtil.exe, -queryIISAnonymousUserName],Start time: Mon Apr 25 10:00:57 AST 2016
2016-04-25 10:00:57.378 THREAD 19 INFO: ServiceUtil> execCmd>> Finished. Return code = 12,Finish time: Mon Apr 25 10:00:57 AST 2016
2016-04-25 10:00:57.378 THREAD 19 WARNING: ServiceUtil> execCmd>> Process output:
-1 Unable to obtain pointer to IUnknown interface. Error Code = 0x800401e4

2016-04-25 10:00:57.378 THREAD 19 INFO: ServiceUtil> getIISAnonymousAccountName>> Returning IIS anonymouse account name : null
2016-04-25 10:00:57.706 THREAD 19 INFO: SEPMACLManager>>setPlaceHolderReplacement: %SYSTEMP% = C:\Users\arp939\AppData\Local\Temp\2
2016-04-25 10:00:57.706 THREAD 19 WARNING: SEPMACLManager>>applyAllACLs: Begin...serverHome=C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\tomcat,dataRoot=C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\data,luClientPath=C:\Program Files (x86)\Symantec\LiveUpdate
2016-04-25 10:00:57.706 THREAD 19 INFO: SEPMACLManager>>setPlaceHolderReplacement: %SEPMROOT% = C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\tomcat\..
2016-04-25 10:00:57.706 THREAD 19 INFO: SEPMACLManager>>setPlaceHolderReplacement: %DATAROOT% = C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\data
2016-04-25 10:00:57.706 THREAD 19 INFO: SEPMACLManager>>setPlaceHolderReplacement: %LUCLIENTPATH% = C:\Program Files (x86)\Symantec\LiveUpdate
2016-04-25 10:00:57.784 THREAD 19 INFO: SEPMACLManager>>setPlaceHolderReplacement: %SYMCDATA_PARENT_PATH% = C:\ProgramData\Symantec
2016-04-25 10:00:57.877 THREAD 19 INFO: SEPMACLManager>>Initializing target OSObjects... total top OSObjects = 16
2016-04-25 10:00:57.955 THREAD 19 INFO: UserAccount > getSid >> BUILTIN\ADMINISTRATORS : S-1-5-32-544
2016-04-25 10:00:57.955 THREAD 19 INFO: UserAccount > getSid >> NT AUTHORITY\SYSTEM : S-1-5-18
2016-04-25 10:00:57.955 THREAD 19 INFO: UserAccount > getSid >> NT SERVICE\semsrv : S-1-5-80-3958276243-2739099675-334681800-2039304502-2384811254
2016-04-25 10:00:57.955 THREAD 19 INFO: ACLUtil> setACLs>> Setting permission(s) for Object = HKLM\System\CurrentControlSet\services\semsrv, permission to be given for list of trusteeSIDs and their permissions = {S-1-5-32-544=full, S-1-5-18=full, S-1-5-80-3958276243-2739099675-334681800-2039304502-2384811254=read}, is add permission? = false, keep other existing ACEs? ('false' means, we need to clear the existing one(s)) = false, inherit from parent? = p_nc, reset children files/folders? = false,Propogate Flag? =,Start time: Mon Apr 25 10:00:57 AST 2016
2016-04-25 10:00:57.955 THREAD 19 INFO: ACLUtil> executeSetACLExe >> Started. Command = [C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\bin\SetACL.exe, -on, HKLM\System\CurrentControlSet\services\semsrv, -ot, reg, -actn, clear, -clr, dacl,sacl, -actn, setprot, -op, dacl:p_nc;sacl:p_nc, -actn, ace, -ace, n:S-1-5-32-544;p:full;s:y;m:set, -ace, n:S-1-5-18;p:full;s:y;m:set, -ace, n:S-1-5-80-3958276243-2739099675-334681800-2039304502-2384811254;p:read;s:y;m:set],Start time: Mon Apr 25 10:00:57 AST 2016
2016-04-25 10:00:58.439 THREAD 19 INFO: ACLUtil> executeSetACLExe>> Finished. Return code = 0,Finish time: Mon Apr 25 10:00:58 AST 2016
2016-04-25 10:00:58.439 THREAD 19 INFO: ACLUtil> setACLs>> Succeed to set permission(s) for Object = HKLM\System\CurrentControlSet\services\semsrv,Finish time: Mon Apr 25 10:00:58 AST 2016
2016-04-25 10:00:58.439 THREAD 19 INFO: UserAccount > getSid >> NT SERVICE\semwebsrv : S-1-5-80-948765316-811284391-187558744-2005173589-387111393
2016-04-25 10:00:58.439 THREAD 19 INFO: ACLUtil> setACLs>> Setting permission(s) for Object = HKLM\System\CurrentControlSet\services\semwebsrv, permission to be given for list of trusteeSIDs and their permissions = {S-1-5-32-544=full, S-1-5-18=full, S-1-5-80-948765316-811284391-187558744-2005173589-387111393=read}, is add permission? = false, keep other existing ACEs? ('false' means, we need to clear the existing one(s)) = false, inherit from parent? = p_nc, reset children files/folders? = false,Propogate Flag? =,Start time: Mon Apr 25 10:00:58 AST 2016
2016-04-25 10:00:58.439 THREAD 19 INFO: ACLUtil> executeSetACLExe >> Started. Command = [C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\bin\SetACL.exe, -on, HKLM\System\CurrentControlSet\services\semwebsrv, -ot, reg, -actn, clear, -clr, dacl,sacl, -actn, setprot, -op, dacl:p_nc;sacl:p_nc, -actn, ace, -ace, n:S-1-5-32-544;p:full;s:y;m:set, -ace, n:S-1-5-18;p:full;s:y;m:set, -ace, n:S-1-5-80-948765316-811284391-187558744-2005173589-387111393;p:read;s:y;m:set],Start time: Mon Apr 25 10:00:58 AST 2016
2016-04-25 10:00:58.548 THREAD 19 INFO: ACLUtil> executeSetACLExe>> Finished. Return code = 0,Finish time: Mon Apr 25 10:00:58 AST 2016
2016-04-25 10:00:58.548 THREAD 19 INFO: ACLUtil> setACLs>> Succeed to set permission(s) for Object = HKLM\System\CurrentControlSet\services\semwebsrv,Finish time: Mon Apr 25 10:00:58 AST 2016
2016-04-25 10:00:58.642 THREAD 19 INFO: UserAccount > getSid >> NT SERVICE\SQLANYs_sem5 :
2016-04-25 10:00:58.642 THREAD 19 INFO: Ignore setting ACL for user account : NT SERVICE\SQLANYs_sem5
2016-04-25 10:00:58.642 THREAD 19 INFO: ACLUtil> setACLs>> Setting permission(s) for Object = HKLM\System\CurrentControlSet\services\SQLANYs_sem5, permission to be given for list of trusteeSIDs and their permissions = {S-1-5-32-544=full, S-1-5-18=full}, is add permission? = false, keep other existing ACEs? ('false' means, we need to clear the existing one(s)) = false, inherit from parent? = p_nc, reset children files/folders? = false,Propogate Flag? =,Start time: Mon Apr 25 10:00:58 AST 2016
2016-04-25 10:00:58.642 THREAD 19 WARNING: Given object doesn't exist, skipping setting permission process. objName = HKLM\System\CurrentControlSet\services\SQLANYs_sem5
2016-04-25 10:00:58.642 THREAD 19 INFO: Ignore setting ACL on object (HKLM\System\CurrentControlSet\services\SQLANYs_sem5) because it is not found.
2016-04-25 10:00:58.642 THREAD 19 INFO: ACLUtil> setACLs>> Setting permission(s) for Object = HKLM\System\CurrentControlSet\services\semlaunchsrv, permission to be given for list of trusteeSIDs and their permissions = {S-1-5-32-544=full, S-1-5-18=full}, is add permission? = false, keep other existing ACEs? ('false' means, we need to clear the existing one(s)) = false, inherit from parent? = p_nc, reset children files/folders? = false,Propogate Flag? =,Start time: Mon Apr 25 10:00:58 AST 2016
2016-04-25 10:00:58.642 THREAD 19 INFO: ACLUtil> executeSetACLExe >> Started. Command = [C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\bin\SetACL.exe, -on, HKLM\System\CurrentControlSet\services\semlaunchsrv, -ot, reg, -actn, clear, -clr, dacl,sacl, -actn, setprot, -op, dacl:p_nc;sacl:p_nc, -actn, ace, -ace, n:S-1-5-32-544;p:full;s:y;m:set, -ace, n:S-1-5-18;p:full;s:y;m:set],Start time: Mon Apr 25 10:00:58 AST 2016
2016-04-25 10:00:58.751 THREAD 19 INFO: ACLUtil> executeSetACLExe>> Finished. Return code = 0,Finish time: Mon Apr 25 10:00:58 AST 2016
2016-04-25 10:00:58.751 THREAD 19 INFO: ACLUtil> setACLs>> Succeed to set permission(s) for Object = HKLM\System\CurrentControlSet\services\semlaunchsrv,Finish time: Mon Apr 25 10:00:58 AST 2016
2016-04-25 10:00:58.751 THREAD 19 INFO: ACLUtil> setACLs>> Setting permission(s) for Object = HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Perflib, permission to be given for list of trusteeSIDs and their permissions = {S-1-5-80-948765316-811284391-187558744-2005173589-387111393=read}, is add permission? = false, keep other existing ACEs? ('false' means, we need to clear the existing one(s)) = true, inherit from parent? = nc, reset children files/folders? = false,Propogate Flag? =,Start time: Mon Apr 25 10:00:58 AST 2016
2016-04-25 10:00:58.751 THREAD 19 INFO: ACLUtil> executeSetACLExe >> Started. Command = [C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\bin\SetACL.exe, -on, HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Perflib, -ot, reg, -actn, setprot, -op, dacl:nc;sacl:nc, -actn, ace, -ace, n:S-1-5-80-948765316-811284391-187558744-2005173589-387111393;p:read;s:y;m:set],Start time: Mon Apr 25 10:00:58 AST 2016
2016-04-25 10:00:58.876 THREAD 19 INFO: ACLUtil> executeSetACLExe>> Finished. Return code = 0,Finish time: Mon Apr 25 10:00:58 AST 2016
2016-04-25 10:00:58.876 THREAD 19 INFO: ACLUtil> setACLs>> Succeed to set permission(s) for Object = HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Perflib,Finish time: Mon Apr 25 10:00:58 AST 2016
2016-04-25 10:00:58.876 THREAD 19 INFO: ACLUtil> setACLs>> Setting permission(s) for Object = HKCR\SAEnum, permission to be given for list of trusteeSIDs and their permissions = {S-1-5-32-544=full, S-1-5-18=full, S-1-5-80-948765316-811284391-187558744-2005173589-387111393=read}, is add permission? = false, keep other existing ACEs? ('false' means, we need to clear the existing one(s)) = false, inherit from parent? = p_nc, reset children files/folders? = true,Propogate Flag? =,Start time: Mon Apr 25 10:00:58 AST 2016
2016-04-25 10:00:58.876 THREAD 19 INFO: ACLUtil> executeSetACLExe >> Started. Command = [C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\bin\SetACL.exe, -on, HKCR\SAEnum, -ot, reg, -actn, clear, -clr, dacl,sacl, -actn, setprot, -op, dacl:p_nc;sacl:p_nc, -actn, ace, -ace, n:S-1-5-32-544;p:full;s:y;m:set, -ace, n:S-1-5-18;p:full;s:y;m:set, -ace, n:S-1-5-80-948765316-811284391-187558744-2005173589-387111393;p:read;s:y;m:set, -actn, rstchldrn, -rst, dacl,sacl],Start time: Mon Apr 25 10:00:58 AST 2016
2016-04-25 10:00:59.001 THREAD 19 INFO: ACLUtil> executeSetACLExe>> Finished. Return code = 0,Finish time: Mon Apr 25 10:00:59 AST 2016
2016-04-25 10:00:59.001 THREAD 19 INFO: ACLUtil> setACLs>> Succeed to set permission(s) for Object = HKCR\SAEnum,Finish time: Mon Apr 25 10:00:59 AST 2016
2016-04-25 10:00:59.001 THREAD 19 INFO: ACLUtil> setACLs>> Setting permission(s) for Object = HKCR\SAErrorLookup, permission to be given for list of trusteeSIDs and their permissions = {S-1-5-32-544=full, S-1-5-18=full, S-1-5-80-948765316-811284391-187558744-2005173589-387111393=read}, is add permission? = false, keep other existing ACEs? ('false' means, we need to clear the existing one(s)) = false, inherit from parent? = p_nc, reset children files/folders? = true,Propogate Flag? =,Start time: Mon Apr 25 10:00:59 AST 2016
2016-04-25 10:00:59.001 THREAD 19 INFO: ACLUtil> executeSetACLExe >> Started. Command = [C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\bin\SetACL.exe, -on, HKCR\SAErrorLookup, -ot, reg, -actn, clear, -clr, dacl,sacl, -actn, setprot, -op, dacl:p_nc;sacl:p_nc, -actn, ace, -ace, n:S-1-5-32-544;p:full;s:y;m:set, -ace, n:S-1-5-18;p:full;s:y;m:set, -ace, n:S-1-5-80-948765316-811284391-187558744-2005173589-387111393;p:read;s:y;m:set, -actn, rstchldrn, -rst, dacl,sacl],Start time: Mon Apr 25 10:00:59 AST 2016
2016-04-25 10:00:59.172 THREAD 19 INFO: ACLUtil> executeSetACLExe>> Finished. Return code = 0,Finish time: Mon Apr 25 10:00:59 AST 2016
2016-04-25 10:00:59.172 THREAD 19 INFO: ACLUtil> setACLs>> Succeed to set permission(s) for Object = HKCR\SAErrorLookup,Finish time: Mon Apr 25 10:00:59 AST 2016
2016-04-25 10:00:59.172 THREAD 19 INFO: ACLUtil> setACLs>> Setting permission(s) for Object = HKCR\SAOLEDB, permission to be given for list of trusteeSIDs and their permissions = {S-1-5-32-544=full, S-1-5-18=full, S-1-5-80-948765316-811284391-187558744-2005173589-387111393=read}, is add permission? = false, keep other existing ACEs? ('false' means, we need to clear the existing one(s)) = false, inherit from parent? = p_nc, reset children files/folders? = true,Propogate Flag? =,Start time: Mon Apr 25 10:00:59 AST 2016
2016-04-25 10:00:59.172 THREAD 19 INFO: ACLUtil> executeSetACLExe >> Started. Command = [C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\bin\SetACL.exe, -on, HKCR\SAOLEDB, -ot, reg, -actn, clear, -clr, dacl,sacl, -actn, setprot, -op, dacl:p_nc;sacl:p_nc, -actn, ace, -ace, n:S-1-5-32-544;p:full;s:y;m:set, -ace, n:S-1-5-18;p:full;s:y;m:set, -ace, n:S-1-5-80-948765316-811284391-187558744-2005173589-387111393;p:read;s:y;m:set, -actn, rstchldrn, -rst, dacl,sacl],Start time: Mon Apr 25 10:00:59 AST 2016
2016-04-25 10:00:59.375 THREAD 19 INFO: ACLUtil> executeSetACLExe>> Finished. Return code = 0,Finish time: Mon Apr 25 10:00:59 AST 2016
2016-04-25 10:00:59.375 THREAD 19 INFO: ACLUtil> setACLs>> Succeed to set permission(s) for Object = HKCR\SAOLEDB,Finish time: Mon Apr 25 10:00:59 AST 2016
2016-04-25 10:00:59.375 THREAD 19 INFO: ACLUtil> setACLs>> Setting permission(s) for Object = HKCR\SAEnum.16, permission to be given for list of trusteeSIDs and their permissions = {S-1-5-32-544=full, S-1-5-18=full, S-1-5-80-948765316-811284391-187558744-2005173589-387111393=read}, is add permission? = false, keep other existing ACEs? ('false' means, we need to clear the existing one(s)) = false, inherit from parent? = p_nc, reset children files/folders? = true,Propogate Flag? =,Start time: Mon Apr 25 10:00:59 AST 2016
2016-04-25 10:00:59.375 THREAD 19 INFO: ACLUtil> executeSetACLExe >> Started. Command = [C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\bin\SetACL.exe, -on, HKCR\SAEnum.16, -ot, reg, -actn, clear, -clr, dacl,sacl, -actn, setprot, -op, dacl:p_nc;sacl:p_nc, -actn, ace, -ace, n:S-1-5-32-544;p:full;s:y;m:set, -ace, n:S-1-5-18;p:full;s:y;m:set, -ace, n:S-1-5-80-948765316-811284391-187558744-2005173589-387111393;p:read;s:y;m:set, -actn, rstchldrn, -rst, dacl,sacl],Start time: Mon Apr 25 10:00:59 AST 2016
2016-04-25 10:00:59.516 THREAD 19 INFO: ACLUtil> executeSetACLExe>> Finished. Return code = 0,Finish time: Mon Apr 25 10:00:59 AST 2016
2016-04-25 10:00:59.516 THREAD 19 INFO: ACLUtil> setACLs>> Succeed to set permission(s) for Object = HKCR\SAEnum.16,Finish time: Mon Apr 25 10:00:59 AST 2016
2016-04-25 10:00:59.516 THREAD 19 INFO: ACLUtil> setACLs>> Setting permission(s) for Object = HKCR\SAErrorLookup.16, permission to be given for list of trusteeSIDs and their permissions = {S-1-5-32-544=full, S-1-5-18=full, S-1-5-80-948765316-811284391-187558744-2005173589-387111393=read}, is add permission? = false, keep other existing ACEs? ('false' means, we need to clear the existing one(s)) = false, inherit from parent? = p_nc, reset children files/folders? = true,Propogate Flag? =,Start time: Mon Apr 25 10:00:59 AST 2016
2016-04-25 10:00:59.516 THREAD 19 INFO: ACLUtil> executeSetACLExe >> Started. Command = [C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\bin\SetACL.exe, -on, HKCR\SAErrorLookup.16, -ot, reg, -actn, clear, -clr, dacl,sacl, -actn, setprot, -op, dacl:p_nc;sacl:p_nc, -actn, ace, -ace, n:S-1-5-32-544;p:full;s:y;m:set, -ace, n:S-1-5-18;p:full;s:y;m:set, -ace, n:S-1-5-80-948765316-811284391-187558744-2005173589-387111393;p:read;s:y;m:set, -actn, rstchldrn, -rst, dacl,sacl],Start time: Mon Apr 25 10:00:59 AST 2016
2016-04-25 10:00:59.640 THREAD 19 INFO: ACLUtil> executeSetACLExe>> Finished. Return code = 0,Finish time: Mon Apr 25 10:00:59 AST 2016
2016-04-25 10:00:59.640 THREAD 19 INFO: ACLUtil> setACLs>> Succeed to set permission(s) for Object = HKCR\SAErrorLookup.16,Finish time: Mon Apr 25 10:00:59 AST 2016
2016-04-25 10:00:59.640 THREAD 19 INFO: ACLUtil> setACLs>> Setting permission(s) for Object = HKCR\SAOLEDB.16, permission to be given for list of trusteeSIDs and their permissions = {S-1-5-32-544=full, S-1-5-18=full, S-1-5-80-948765316-811284391-187558744-2005173589-387111393=read}, is add permission? = false, keep other existing ACEs? ('false' means, we need to clear the existing one(s)) = false, inherit from parent? = p_nc, reset children files/folders? = true,Propogate Flag? =,Start time: Mon Apr 25 10:00:59 AST 2016
2016-04-25 10:00:59.640 THREAD 19 INFO: ACLUtil> executeSetACLExe >> Started. Command = [C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\bin\SetACL.exe, -on, HKCR\SAOLEDB.16, -ot, reg, -actn, clear, -clr, dacl,sacl, -actn, setprot, -op, dacl:p_nc;sacl:p_nc, -actn, ace, -ace, n:S-1-5-32-544;p:full;s:y;m:set, -ace, n:S-1-5-18;p:full;s:y;m:set, -ace, n:S-1-5-80-948765316-811284391-187558744-2005173589-387111393;p:read;s:y;m:set, -actn, rstchldrn, -rst, dacl,sacl],Start time: Mon Apr 25 10:00:59 AST 2016
2016-04-25 10:00:59.750 THREAD 19 INFO: ACLUtil> executeSetACLExe>> Finished. Return code = 0,Finish time: Mon Apr 25 10:00:59 AST 2016
2016-04-25 10:00:59.765 THREAD 19 INFO: ACLUtil> setACLs>> Succeed to set permission(s) for Object = HKCR\SAOLEDB.16,Finish time: Mon Apr 25 10:00:59 AST 2016
2016-04-25 10:00:59.765 THREAD 19 INFO: Ignore setting ACL for user account : NT SERVICE\SQLANYs_sem5
2016-04-25 10:00:59.765 THREAD 19 INFO: ACLUtil> setACLs>> Setting permission(s) for Object = C:\Users\arp939\AppData\Local\Temp\2, permission to be given for list of trusteeSIDs and their permissions = {S-1-5-80-3958276243-2739099675-334681800-2039304502-2384811254=full, S-1-5-80-948765316-811284391-187558744-2005173589-387111393=full}, is add permission? = false, keep other existing ACEs? ('false' means, we need to clear the existing one(s)) = true, inherit from parent? = nc, reset children files/folders? = false,Propogate Flag? =,Start time: Mon Apr 25 10:00:59 AST 2016
2016-04-25 10:00:59.765 THREAD 19 INFO: ACLUtil> executeSetACLExe >> Started. Command = [C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\bin\SetACL.exe, -on, C:\Users\arp939\AppData\Local\Temp\2, -ot, file, -actn, setprot, -op, dacl:nc;sacl:nc, -actn, ace, -ace, n:S-1-5-80-3958276243-2739099675-334681800-2039304502-2384811254;p:full;s:y;m:set, -ace, n:S-1-5-80-948765316-811284391-187558744-2005173589-387111393;p:full;s:y;m:set],Start time: Mon Apr 25 10:00:59 AST 2016
2016-04-25 10:01:00.155 THREAD 19 INFO: ACLUtil> executeSetACLExe>> Finished. Return code = 0,Finish time: Mon Apr 25 10:01:00 AST 2016
2016-04-25 10:01:00.155 THREAD 19 INFO: ACLUtil> setACLs>> Succeed to set permission(s) for Object = C:\Users\arp939\AppData\Local\Temp\2,Finish time: Mon Apr 25 10:01:00 AST 2016
2016-04-25 10:01:00.155 THREAD 19 INFO: ACLUtil> setACLs>> Setting permission(s) for Object = C:\ProgramData\Symantec, permission to be given for list of trusteeSIDs and their permissions = {S-1-5-80-3958276243-2739099675-334681800-2039304502-2384811254=full, S-1-5-80-948765316-811284391-187558744-2005173589-387111393=full}, is add permission? = false, keep other existing ACEs? ('false' means, we need to clear the existing one(s)) = true, inherit from parent? = np, reset children files/folders? = false,Propogate Flag? =,Start time: Mon Apr 25 10:01:00 AST 2016
2016-04-25 10:01:00.155 THREAD 19 INFO: ACLUtil> executeSetACLExe >> Started. Command = [C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\bin\SetACL.exe, -on, C:\ProgramData\Symantec, -ot, file, -actn, setprot, -op, dacl:np;sacl:np, -actn, ace, -ace, n:S-1-5-80-3958276243-2739099675-334681800-2039304502-2384811254;p:full;s:y;m:set, -ace, n:S-1-5-80-948765316-811284391-187558744-2005173589-387111393;p:full;s:y;m:set],Start time: Mon Apr 25 10:01:00 AST 2016
2016-04-25 10:01:34.133 THREAD 19 INFO: ACLUtil> executeSetACLExe>> Finished. Return code = 0,Finish time: Mon Apr 25 10:01:34 AST 2016
2016-04-25 10:01:34.133 THREAD 19 INFO: ACLUtil> setACLs>> Succeed to set permission(s) for Object = C:\ProgramData\Symantec,Finish time: Mon Apr 25 10:01:34 AST 2016
2016-04-25 10:01:34.133 THREAD 19 INFO: ACLUtil> setACLs>> Setting permission(s) for Object = C:\Program Files (x86)\Symantec\LiveUpdate, permission to be given for list of trusteeSIDs and their permissions = {S-1-5-80-3958276243-2739099675-334681800-2039304502-2384811254=full}, is add permission? = false, keep other existing ACEs? ('false' means, we need to clear the existing one(s)) = true, inherit from parent? = np, reset children files/folders? = false,Propogate Flag? =,Start time: Mon Apr 25 10:01:34 AST 2016
2016-04-25 10:01:34.133 THREAD 19 INFO: ACLUtil> executeSetACLExe >> Started. Command = [C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\bin\SetACL.exe, -on, C:\Program Files (x86)\Symantec\LiveUpdate, -ot, file, -actn, setprot, -op, dacl:np;sacl:np, -actn, ace, -ace, n:S-1-5-80-3958276243-2739099675-334681800-2039304502-2384811254;p:full;s:y;m:set],Start time: Mon Apr 25 10:01:34 AST 2016
2016-04-25 10:01:34.991 THREAD 19 INFO: ACLUtil> executeSetACLExe>> Finished. Return code = 0,Finish time: Mon Apr 25 10:01:34 AST 2016
2016-04-25 10:01:34.991 THREAD 19 INFO: ACLUtil> setACLs>> Succeed to set permission(s) for Object = C:\Program Files (x86)\Symantec\LiveUpdate,Finish time: Mon Apr 25 10:01:34 AST 2016
2016-04-25 10:01:34.991 THREAD 19 INFO: UserAccount > getSid >> BUILTIN\USERS : S-1-5-32-545
2016-04-25 10:01:34.991 THREAD 19 INFO: ServiceUtil> execCmd >> Started. Command = [C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\tomcat\..\bin\ServiceUtil.exe, -queryAccountBySID, S-1-5-32-547],Start time: Mon Apr 25 10:01:34 AST 2016
2016-04-25 10:01:35.084 THREAD 19 INFO: ServiceUtil> execCmd>> Finished. Return code = 0,Finish time: Mon Apr 25 10:01:35 AST 2016
2016-04-25 10:01:35.084 THREAD 19 INFO: UserAccount > getSid >> BUILTIN\POWER USERS : S-1-5-32-547
2016-04-25 10:01:35.084 THREAD 19 INFO: UserAccount > getSid >> TERMINAL SERVER USER : S-1-5-13
2016-04-25 10:01:35.084 THREAD 19 INFO: Ignore setting ACL for user account : NT SERVICE\SQLANYs_sem5
2016-04-25 10:01:35.084 THREAD 19 INFO: ACLUtil> setACLs>> Setting permission(s) for Object = C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\data, permission to be given for list of trusteeSIDs and their permissions = {S-1-5-32-545=read, S-1-5-32-544=full, S-1-5-18=full, S-1-5-32-547=change, S-1-5-13=read_ex, S-1-5-80-3958276243-2739099675-334681800-2039304502-2384811254=full, S-1-5-80-948765316-811284391-187558744-2005173589-387111393=full}, is add permission? = false, keep other existing ACEs? ('false' means, we need to clear the existing one(s)) = false, inherit from parent? = p_nc, reset children files/folders? = true,Propogate Flag? =,Start time: Mon Apr 25 10:01:35 AST 2016
2016-04-25 10:01:35.084 THREAD 19 INFO: ACLUtil> executeSetACLExe >> Started. Command = [C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\bin\SetACL.exe, -on, C:\Program Files (x86)\Symantec\Symantec Endpoint Protection Manager\data, -ot, file, -actn, clear, -clr, dacl,sacl, -actn, setprot, -op, dacl:p_nc;sacl:p_nc, -actn, ace, -ace, n:S-1-5-32-545;p:read;s:y;m:set, -ace, n:S-1-5-32-544;p:full;s:y;m:set, -ace, n:S-1-5-18;p:full;s:y;m:set, -ace, n:S-1-5-32-547;p:change;s:y;m:set, -ace, n:S-1-5-13;p:read_ex;s:y;m:set, -ace, n:S-1-5-80-3958276243-2739099675-334681800-2039304502-2384811254;p:full;s:y;m:set, -ace, n:S-1-5-80-948765316-811284391-187558744-2005173589-387111393;p:full;s:y;m:set, -actn, rstchldrn, -rst, dacl,sacl],Start time: Mon Apr 25 10:01:35 AST 2016

0

Windows 7 embedded, SEP 12.1.6800.6400 problem

$
0
0
I need a solution

Hello,

We have a lot of Thin Clients and im testing to upgrade SEP on these clients to 12.1.6800.6400.

On some of these clients the upgrade is failing, network connection is lost and people can not work anymore. (firewall driver failed to load) (SEP multiple problems)(etc etc)
We need to deinstall SEP and reinstall SEP again to make the thinclients work again.

The ThinClients are all the same, some have this problem and some don't. Normal PC's / Laptops or Servers do not have this issue.
Anyone here that knows why this problem occurs? Can it be that if a Thinclient is shutdown during install the installation becomes corrupt?

Update is done by placing a new installation package in SEPM for the test group that needs to be updated.
Do we need to install updates on ThinClients manually by running a setup local on a ThinClient?

LEVD 
 

0

How to disable SEP from Client console

$
0
0
I need a solution

Hi,

I have 200+ users and i need to disable SEP client from client console. I already set the DISABLE SYMANTEC ENDPOINT PROTECTION grey-out. 

But when i open the SEP client console to disable temporarily the symantec features, the disable option is also grey-out. We need to disable the SEP from the console with password protection, not from the threshold icon disabling option so users who only have the SEP client passsword can disable the SEP client from the console.

0

CleanWipe not removing Symantec

$
0
0
I need a solution

I uninstalled Symantec Endpoint Protection on my Windows Server 2008 and yet have gigs of data still floating around my server labeled Symantec.  I followed instructions after opening a ticket (which was closed prematurely) and after following the given instructions I have not been successful with any of these steps.

I was asked to run SymDiag.exe and then run CleanWipe.  After CleanWipe started it stopped almost immediately. The only thing I have as a resource are my log files, attached.

Can anyone give me an idea of what I'm doing wrong?

0
Viewing all 10484 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>