Quantcast
Channel: Symantec Connect - Endpoint Protection - Discussions
Viewing all 10484 articles
Browse latest View live

How to block usb access in VMware when SEP is installed only on the Host Machine

$
0
0
I need a solution

I have an environment where the End Users have Access to Create unlimited VMware Machines on their Base Host machines. We have SEP installed on all the Host Machines with USB blocking enabled.However when the VMwares are created in these Host Machines the users are Able to Access the USB drives from within the VMwares.This is an Information Security (Data Loss) Nightmare. Is there a way to block the USB Access through the VMware using the SEP installed in the Host Machine. Please suggest if any. Else are there alternate (3rd Party) ways to achieve this ?

Please Note: We cannot install SEP on all the VMwares that are getting created everyday.


Can I be emailed when an upgrade is done?

$
0
0
I need a solution

I am trying to upgrade a few computers from 11 to 12.1. I made an install package and setup the deployment to run from 00:01 to 12:59 for 7 days. So far I've only got about a 50% success rate for the upgrades. Is there a place where I can set things up to email me when a client is upgraded? I am also trying to find information on if an upgrade was attempted and if it wasn't successful why it wasn't.

Thank you for any help.

Details about adding exclusions in Unmanaged Detector - Name of the file

$
0
0
I need a solution

We know that the MAC Address Exclusions can only be added one at a time and we cannot import a file containing the list of MAC Addresses. What is the name of the file in which details of the Exclusions are saved. If the name of this file and the location identified then we can edit the same and directly add the Exclusion instead of going through the SEPM Interface. Please help in finding this file cause this will surely help many people till Symantec create an option to import file containing exclusion of MAC Address.

Need a refresher about imaging and to know if anything is new or changed

$
0
0
I need a solution

The last time we had an image, we installed SEP, and like 75 PC's had the SAME Hardware ID, so only ONE showed up as a managed client in SEP. Going back was a pain in the neck, I hade to make a few modifications in order to get it to work.

We are doing this once again, and what I want to know, is how can we install SEP on these images WITHOUT it picking up the SAME ID. I want the PC's to be added, managed and have their own UNIQUE ID's.

I would also DESPERATELY love to NOT put SEP 12.1.2015.2015 on these and put the NEWEST one on, when is the scheduled release for the next version?

These will ALL be Windows 7 64 BIT PC's

SEP12.1RU2MP1 Client Migration Paths

$
0
0
I do not need a solution (just sharing information)

Currently, the documention for the migration paths suggests SEP12.1RU2MP1 can only seamlessly be installed over SEP12.1RU2 as per:

http://www.symantec.com/docs/TECH204449
Note: The article does not differentiate between the SEPM upgrade and the Client side upgrade paths.

Despite this, we can clearly see some of the fixes in SEP12.1RU2MP1 directly relate to performing client upgrades from SEP clients older than RU2:

http://www.symantec.com/docs/TECH204685

So to that end, I've created an IDEA for Symantec to document and support more upgrade paths of SEP Clients to the latest version.  Please let me know your thoughts, and add your voice to the IDEA if you believe it to be of benefit:

https://www-secure.symantec.com/connect/ideas/support-more-sep-121-client-migration-paths

Virus sent through Skype

$
0
0
I need a solution

Dear Moderator / Technician

 

My computer has just been affected by a virus and I seem to be unable to remove it.

The infected file was sent by a trustworthy contact and presented as a PDF file. As my contact and I share a lot of files through Skype for professional reasons, I was not aware that this would be a virus.

 

The virus saves itself on the location you have last saved a file sent through skype on (in my case, the Desktop) and when you open the file, it suddenly becomes unavailable and your skype history gets deleted. In addition, when you try to send a Skype message, it gets automatically deleted.

Worrying thing is that two of my skype contacts sent me empty messages so I suspect they were infected as well.

 

I asked my contact to confirm that Google Chrome cannot open any session and he did. I tried to uninstall Chrome but it would not let me.

 

I have run a virus scan and it found one trackware file (name unavailable) but I do not believe this is the solution to the problem.

 

Any guidance you could give would be much appreciated.

 

Eric

PC Rolling Back

$
0
0
I need a solution

Is there any way to prevent a "Roll back" I have never seen ANY program outside of Symantec install then up and remove itself.

Initially what happened was I was removing SEP 12.1.2015 2015, but the user logged the PC off and signed in under his own name, this killed all processes that were currently running, I was also running a Malwarebytes scan at the time the user logged off. I was not able to find SEP installed after I had logged back in under the administrator account. I decided to run Cleanwipe, which I did, and it took two restarts and I saw that it had completed, I also checked the registry for HKLM and HKCU for Symantec folders and they were not there, they were also NOT in the program files (x86). I figured ok, all is clear so I can install the newest version of SEP, I was installing SEP Client 12.1.2100.2093 to a Windows 7 64BIT PC. I had downloaded the package from the Fileconnect, and copied and unzipped it on the PC. When I went to install it the installation looked fairly normal, but near the end, the rollback began, and NOTHING was installed. After the rollback was complete, I checked for the SEPInst logs and found nothing, both the Windows\temp and the C:\temp folder were empty.

 

1. Why wouldn't this install properly after I had run the cleanwipe?

2. Is there anyway to PREVENT rollbacks from happening?

3. Why does SEP even HAVE a rollback? I have never seen that on any program outside of SEP

How do I make Symantec_Endpoint_Protection_12.1.2_MP1_Win64-bit_Client_EN.exe into a package

$
0
0
I need a solution

I have downloaded the Symantec_Endpoint_Protection_12.1.2_MP1_Win64-bit_Client_EN.exe, just to test it out. I do not want to upgrade my SEPM server until the next release of SEP comes out. How can I make this a managed client package that I can push out with my current SEPM server which is hosting SEPM 12.1.2015 2015. The server is Windows 2008 and the clients are Windows 7 64 Bit clients.

 


Is it possible to block thumb drives but allow external hard drives?

$
0
0
I need a solution

Currently using SEP 11 RU7 MP2.  Investigating for the first time using application and device control.  My ultimate goal is to be able to block only USB thumb drives but allow all other forms of USB devices, such as mice, printers, GPS, cameras, external hard drives, SD cards, etc.

Through this article here, I was able to block all USB storage media, but since thumb drives, external hard drives, SD cards, camera's, etc., all use the same GUID, all storage devices get blocked.  This policy does allow mice, printers, etc, to work, though

What I'd like to know: is it possible to block only thumb drives and allow other similar storage devices without getting into allowing individual devices, which in our environment of over 15,000 users would be beyond time consuming.

SEPM won't work version 12.1.1000.157 RU1

$
0
0
I need a solution

I have a SEPM server where the login screen comes up and then the SEPM service will stop. It will say logging in for a long time then it tells me the service may be stopped. I am using the embedded database. The event log gives me this error.

The Java Virtual Machine has exited with a code of -1, the service is being stopped.

I have rebooted the server etc. I updated Java-maybe a no no.

I am at a loss here.

Monitors Summary with no information

$
0
0
I need a solution

Hi all, I need some help. I have a SEPM 12.1 (RTM) installed on a Win2k3 server and the DB is a SQL Server installed on another server. My problem is that the monitors summary doesnt show information (no information/blank data) and when i try to make a Risk Report from Logs, i get "no entries". The last data for this type of report is from 20 days back. However if a try to get a Computer Status report from past 24 hours i get results.

Virus and Spyware Protection Def out of date

$
0
0
I need a solution

We have the latest version of the server console and clients running at 12.1.2015.2015 , 30% of the clients are updating their antivirus definitions and the rest of the machines are not. They all seem to be stuck on april 12th update and wont update past that. even when running a manual intelligentupdater it fails. I have tried to reinstall the clients but it just wont take.I have the  Intelligentupdater txt , syslog , and settings .live log files from the client. The machines are windows xp 32 bit and are being managed.

Why is SEP 12.1 RU2 making requests to symantecliveupdate.com?

$
0
0
I need a solution

I need assistance on trying to figure out why my machines are attempting to reach out to the following location.  Our current LiveUpdate policy states that no machines should go to the Internet to pull updates.  They are only suppose to hit the SEPM or GUPs.  Can someone explain what these requests are and what portion of the policy configuration directs these requests?  The list of requests I see repeatedly are below.

http://liveupdate.symantecliveupdate.com/sepc$20behavior$20and$20security$20heuristics$2012.1$20ru2_microdefsb.curdefs_symalllanguages_livetri.zip

http://liveupdate.symantecliveupdate.com/sepc$20cids$20signatures$2012.1$20ru2_microdefsb.curdefs_symalllanguages_livetri.zip

http://liveupdate.symantecliveupdate.com/sepc$20extended$20file$20attributes$20and$20signatures$2012.1$20ru2_microdefsb.curdefs_symalllanguages_livetri.zip

http://liveupdate.symantecliveupdate.com/sepc$20iron$20revocation$20list$2012.1$20ru2_microdefsb.curdefs_symalllanguages_livetri.zip

http://liveupdate.symantecliveupdate.com/sepc$20iron$20settings$2012.1$20ru2_microdefsb.curdefs_symalllanguages_livetri.zip

http://liveupdate.symantecliveupdate.com/sepc$20srtsp$20settings_12.1$20ru2_symalllanguages_livetri.zip

http://liveupdate.symantecliveupdate.com/sepc$20submission$20control$20data_12.1$20ru2_symalllanguages_livetri.zip

http://liveupdate.symantecliveupdate.com/sepc$20virus$20definitions$20win32$2012.1$20ru2$20h_microdefsb.curdefs_symalllanguages_livetri.zip

http://liveupdate.symantecliveupdate.com/sepc$20virus$20definitions$20win32$2012.1$20ru2$20h_microdefsb.error_symalllanguages_livetri.zip

http://liveupdate.symantecliveupdate.com/sepc$20virus$20definitions$20win64$20$28x64$29$2012.1$20ru2$20h_microdefsb.curdefs_symalllanguages_livetri.zip

http://liveupdate.symantecliveupdate.com/sepc$20virus$20definitions$20win64$20$28x64$29$2012.1$20ru2$20h_microdefsb.error_symalllanguages_livetri.zip

Migrating Scheduled Reports in SEPM

$
0
0
I need a solution

Hi all

I'm in the middle of a migration project from SEPM 11 to 12. We're using the replication method, so migrating everything to a new more powerful box with newer OS, bin the old one once replicated and upgrade the new one to 12.

However, I've noticed the scheduled reports don't replicate (understandable as you wouldn't want 10 copies of a report from each SEPM box) however there doesn't appear to be any export or migrate option.

Are these stored in the database or a config file somewhere I can move across?

Thanks

Oliver

Shared Insight Cache 12.1.2 (VShield) - Security Virtual Appliance Status "Unknown"

$
0
0
I need a solution

I have deployed a new Symantec Endpoint Manager Server 12.1.2 and have deployed "Security Virtual Appliances" to each VMWare host in our environment.  Prior to deploying the SVAs, I built a VShield server in our VMWare 5 environment.  I enabled SHARED INSIGHT CACHE USING VSHIELD in the policies on the SEP Manager for the appropriate servers.  I then deployed the SEP 12.1.2 client to 4 servers that have the VMWARE TOOLS client installed.   When I check the SECURITY VIRTUAL APPLIANCE column for those servers in the SEPM, the status shows as UNKNOWN.  I have rebooted the SVAs and the servers but nothing changes the status.  Has anyone else had this experience or have any insight into what's happening with this?

Thanks.


sylink file

$
0
0
I need a solution

what is the path of sylink file in 12.1 version. Is it different path from 11.0 because file is not available in path

C:\Program Files\Symantec\Symantec Endpoint Protection

C:\Program Files (x86)\Symantec\Symantec Endpoint Protection

8671591
1367060017
2712571

Replication between 2 servers

$
0
0
I need a solution

i have installed 12.1 ru2 in one server and other is old one version 11.0.7. will replication work between both sepm version?

8671801
1367047206
2712571

disk space required

$
0
0
I need a solution

how much space required for embedded databse after upgrading in sepm 12.1 ru2?

Client count - 2500

Server will be use for replication.

virus in pen drive

$
0
0
I need a solution

i have attach pendrive in one of my system after connected some shortcut file created of that folder which available in pen drive, is it a virus?

Defination not update

$
0
0
I need a solution

Hi,

I have one of unmanaged sep client.when i am run live update virus and spyware protection defination not updatating.

I have check log find some error.

 

****************************************************************************************************
Symantec LiveUpdate Engine 2.0.0.311   (Release)
OS: Windows 7 Ultimate  32-bit VerInfo: 6.1 ServicePack: 1.0
LanguageID: 00000409
WinHttp.dll Version: 6.1.7601.17514
----------------------------------------------------------------------------------------------------
Session started at: 2013/04/27 17:27:07.773    (UTC +05:30)
ProcessId: 1792, ThreadId: 5084, SessionId: 76
Machine ID: 64F1D886-6EAF-89BB-0463-7B253FCE9E0B
Agent Field: SEP/12.1.671.4971 MID/{64F1D886-6EAF-89BB-0463-7B253FCE9E0B} SID/76
----------------------------------------------------------------------------------------------------
  Component: Moniker: {263395A0-D3D8-4be4-80B5-202C94EF4AA0}, P: SEPC Iron Settings v12.1, V: MicroDefsB.CurDefs, L: SymAllLanguages.
  Component: Moniker: {31D8C93E-8DB2-4eeb-8D75-87FD92F1C62C}, P: SEPC CIDS Signatures v12.1, V: MicroDefsB.Apr, L: SymAllLanguages.
  Component: Moniker: {535CB6A4-441F-4e8a-A897-804CD859100E}, P: SEPC Virus Definitions Win32 v12.1, V: MicroDefsB.CurDefs, L: SymAllLanguages.
  Component: Moniker: {55DE35DC-862A-44c9-8A2B-3EF451665D0A}, P: SEPC CIDS Signatures v12.1, V: MicroDefsB.CurDefs, L: SymAllLanguages.
  Component: Moniker: {6AAE5D6B-C70C-4cdf-96C9-110AA1378E8C}, P: SEPC Virus Definitions Win32 v12.1, V: MicroDefsB.Error, L: SymAllLanguages.
  Component: Moniker: {6F678702-6A34-479b-9166-2C2EA45C68E4}, P: SESC AntiVirus Client Win32, V: 12.1, L: English.
  Component: Moniker: {810D5A61-809F-49c2-BD75-177F0647D2BA}, P: SEPC Iron Revocation List v12.1, V: MicroDefsB.CurDefs, L: SymAllLanguages.
  Component: Moniker: {B6DC6C8F-46FA-40c7-A806-B669BE1D2D19}, P: SEPC Submission Control Data, V: 12.1, L: SymAllLanguages.
  Component: Moniker: {D6AEBC07-D833-485f-9723-6C908D37F806}, P: SEPC Behavior And Security Heuristics v12.1, V: MicroDefsB.CurDefs, L: SymAllLanguages.
  Component: Moniker: {EDBD3BD0-8395-4d4d-BAC9-19DD32EF4758}, P: SEPC Iron Whitelist v12.1, V: MicroDefsB.CurDefs, L: SymAllLanguages.
  OnNotify() method for callback {EDBD3BD0-BEEF-4d4d-BAC9-19DD32EF4758} returned 0x0
  OnNotify() method for callback {2F090208-20DC-42f0-BBD8-B68B472F7215} returned 0x0
  OnNotify() method for callback {72DA128F-2591-43f2-B272-29DA5452A197} returned 0x0
  OnNotify() method for callback {810D5A61-BEEF-49c2-BD75-177F0647D2BA} returned 0x0
  OnNotify() method for callback {B6DC6C8F-BEEF-40c7-A806-B669BE1D2D19} returned 0x0
  OnNotify() method for callback {263395A0-BEEF-4be4-80B5-202C94EF4AA0} returned 0x0
  OnNotify() method for callback {511C2222-DEFD-22EE-B154-4A6A546B9793} returned 0x0
  Server selection complete. Server is HTTP://liveupdate.symantecliveupdate.com/ on port 80.
* WinHttp connection timeout: 12002 File: 1367030465jtun_sep12enncur26.m26
  File download error. Downloaded 239104 bytes. 2nd attempt of file download: 1367030465jtun_sep12enncur26.m26
* WinHttp connection timeout: 12002 File: 1366069785jtun_sep12ennful26.m26
  File download error. Downloaded 309520 bytes. 2nd attempt of file download: 1366069785jtun_sep12ennful26.m26
* WinHttp connection timeout: 12002 File: 1366069785jtun_sep12ennful26.m26
  File download error. Downloaded 46562320 bytes. 3rd attempt of file download: 1366069785jtun_sep12ennful26.m26
* WinHttp connection timeout: 12002 File: 1366069785jtun_sep12ennful26.m26
  File download error. Downloaded 17520 bytes. 4th attempt of file download: 1366069785jtun_sep12ennful26.m26
  Received cancellation request at 2013/04/27 18:33:31.959
* LUE session cancelled. file 1366069785jtun_sep12ennful26.m26
* Inventory SetAbort called on Moniker {263395A0-D3D8-4be4-80B5-202C94EF4AA0} (Inventory Module), with abort code 507
* Inventory SetAbort called on Moniker {31D8C93E-8DB2-4eeb-8D75-87FD92F1C62C} (Inventory Module), with abort code 507
* Inventory SetAbort called on Moniker {55DE35DC-862A-44c9-8A2B-3EF451665D0A} (Inventory Module), with abort code 507
* Inventory SetAbort called on Moniker {535CB6A4-441F-4e8a-A897-804CD859100E} (Inventory Module), with abort code 507
* Inventory SetAbort called on Moniker {6AAE5D6B-C70C-4cdf-96C9-110AA1378E8C} (Inventory Module), with abort code 507
* Inventory SetAbort called on Moniker {31D8C93E-8DB2-4eeb-8D75-87FD92F1C62C} (Inventory Module), with abort code 507
* Inventory SetAbort called on Moniker {55DE35DC-862A-44c9-8A2B-3EF451665D0A} (Inventory Module), with abort code 507
* Inventory SetAbort called on Moniker {535CB6A4-441F-4e8a-A897-804CD859100E} (Inventory Module), with abort code 507
* Inventory SetAbort called on Moniker {6AAE5D6B-C70C-4cdf-96C9-110AA1378E8C} (Inventory Module), with abort code 507
* Inventory SetAbort called on Moniker {6F678702-6A34-479b-9166-2C2EA45C68E4} (Inventory Module), with abort code 507
* Inventory SetAbort called on Moniker {810D5A61-809F-49c2-BD75-177F0647D2BA} (Inventory Module), with abort code 507
* Inventory SetAbort called on Moniker {B6DC6C8F-46FA-40c7-A806-B669BE1D2D19} (Inventory Module), with abort code 507
* Inventory SetAbort called on Moniker {D6AEBC07-D833-485f-9723-6C908D37F806} (Inventory Module), with abort code 507
* Inventory SetAbort called on Moniker {EDBD3BD0-8395-4d4d-BAC9-19DD32EF4758} (Inventory Module), with abort code 507
  RunLiveUpdate result code: 0x00000000
  Session max recursion count = 5
* Reporting error: 0x800700E8 
* Reporting error: 0x800700E8 
* Fail to submit error report: 0x80040300
----------------------------------------------------------------------------------------------------
Session ended at: 2013/04/27 18:33:45.623    (UTC +05:30)
****************************************************************************************************

 

****************************************************************************************************
Symantec LiveUpdate Engine 2.0.0.311   (Release)
OS: Windows 7 Ultimate  32-bit VerInfo: 6.1 ServicePack: 1.0
LanguageID: 00000409
WinHttp.dll Version: 6.1.7601.17514
----------------------------------------------------------------------------------------------------
Session started at: 2013/04/28 09:41:30.546    (UTC +05:30)
ProcessId: 1812, ThreadId: 5232, SessionId: 77
Machine ID: 64F1D886-6EAF-89BB-0463-7B253FCE9E0B
Agent Field: SEP/12.1.671.4971 MID/{64F1D886-6EAF-89BB-0463-7B253FCE9E0B} SID/77
----------------------------------------------------------------------------------------------------
  Component: Moniker: {263395A0-D3D8-4be4-80B5-202C94EF4AA0}, P: SEPC Iron Settings v12.1, V: MicroDefsB.CurDefs, L: SymAllLanguages.
  Component: Moniker: {31D8C93E-8DB2-4eeb-8D75-87FD92F1C62C}, P: SEPC CIDS Signatures v12.1, V: MicroDefsB.Apr, L: SymAllLanguages.
  Component: Moniker: {535CB6A4-441F-4e8a-A897-804CD859100E}, P: SEPC Virus Definitions Win32 v12.1, V: MicroDefsB.CurDefs, L: SymAllLanguages.
  Component: Moniker: {55DE35DC-862A-44c9-8A2B-3EF451665D0A}, P: SEPC CIDS Signatures v12.1, V: MicroDefsB.CurDefs, L: SymAllLanguages.
  Component: Moniker: {6AAE5D6B-C70C-4cdf-96C9-110AA1378E8C}, P: SEPC Virus Definitions Win32 v12.1, V: MicroDefsB.Error, L: SymAllLanguages.
  Component: Moniker: {6F678702-6A34-479b-9166-2C2EA45C68E4}, P: SESC AntiVirus Client Win32, V: 12.1, L: English.
  Component: Moniker: {810D5A61-809F-49c2-BD75-177F0647D2BA}, P: SEPC Iron Revocation List v12.1, V: MicroDefsB.CurDefs, L: SymAllLanguages.
  Component: Moniker: {B6DC6C8F-46FA-40c7-A806-B669BE1D2D19}, P: SEPC Submission Control Data, V: 12.1, L: SymAllLanguages.
  Component: Moniker: {D6AEBC07-D833-485f-9723-6C908D37F806}, P: SEPC Behavior And Security Heuristics v12.1, V: MicroDefsB.CurDefs, L: SymAllLanguages.
  Component: Moniker: {EDBD3BD0-8395-4d4d-BAC9-19DD32EF4758}, P: SEPC Iron Whitelist v12.1, V: MicroDefsB.CurDefs, L: SymAllLanguages.
  OnNotify() method for callback {EDBD3BD0-BEEF-4d4d-BAC9-19DD32EF4758} returned 0x0
  OnNotify() method for callback {2F090208-20DC-42f0-BBD8-B68B472F7215} returned 0x0
  OnNotify() method for callback {72DA128F-2591-43f2-B272-29DA5452A197} returned 0x0
  OnNotify() method for callback {810D5A61-BEEF-49c2-BD75-177F0647D2BA} returned 0x0
  OnNotify() method for callback {B6DC6C8F-BEEF-40c7-A806-B669BE1D2D19} returned 0x0
  OnNotify() method for callback {263395A0-BEEF-4be4-80B5-202C94EF4AA0} returned 0x0
  OnNotify() method for callback {511C2222-DEFD-22EE-B154-4A6A546B9793} returned 0x0
  Server selection complete. Server is HTTP://liveupdate.symantecliveupdate.com/ on port 80.
* WinHttp connection timeout: 12002 File: 1366069785jtun_sep12ennful26.m26
  File download error. Downloaded 147460 bytes. 2nd attempt of file download: 1366069785jtun_sep12ennful26.m26
* WinHttp connection timeout: 12002 File: 1366069785jtun_sep12ennful26.m26
  File download error. Downloaded 50682440 bytes. 3rd attempt of file download: 1366069785jtun_sep12ennful26.m26
* WinHttp connection timeout: 12002 File: 1366069785jtun_sep12ennful26.m26
  File download error. Downloaded 30660 bytes. 4th attempt of file download: 1366069785jtun_sep12ennful26.m26
* WinHttp connection timeout: 12002 File: 1366069785jtun_sep12ennful26.m26
  File download error. Downloaded 213160 bytes. 5th attempt of file download: 1366069785jtun_sep12ennful26.m26
* WinHttp connection timeout: 12002 File: 1366069785jtun_sep12ennful26.m26
  File download error. Downloaded 10220 bytes. 6th attempt of file download: 1366069785jtun_sep12ennful26.m26
* WinHttp connection timeout: 12002 File: 1366069785jtun_sep12ennful26.m26
  File download error. Downloaded 140160 bytes. 7th attempt of file download: 1366069785jtun_sep12ennful26.m26
* WinHttp connection timeout: 12002 File: 1366069785jtun_sep12ennful26.m26
  File download error. Downloaded 210240 bytes. 8th attempt of file download: 1366069785jtun_sep12ennful26.m26
* WinHttp connection timeout: 12002 File: 1366069785jtun_sep12ennful26.m26
  File download error. Downloaded 8760 bytes. 9th attempt of file download: 1366069785jtun_sep12ennful26.m26
* WinHttp connection timeout: 12002 File: 1366069785jtun_sep12ennful26.m26
  File download error. Downloaded 967980 bytes. 10th attempt of file download: 1366069785jtun_sep12ennful26.m26
* WinHttp connection timeout: 12002 File: 1366069785jtun_sep12ennful26.m26
  File download error. Downloaded 497860 bytes. 11th attempt of file download: 1366069785jtun_sep12ennful26.m26
* WinHttp connection timeout: 12002 File: 1366069785jtun_sep12ennful26.m26
  File download error. Downloaded 27740 bytes. 12th attempt of file download: 1366069785jtun_sep12ennful26.m26
* WinHttp connection timeout: 12002 File: 1366069785jtun_sep12ennful26.m26
  File download error. Downloaded 782560 bytes. 13th attempt of file download: 1366069785jtun_sep12ennful26.m26
* WinHttp connection timeout: 12002 File: 1366069785jtun_sep12ennful26.m26
  File download error. Downloaded 37960 bytes. 14th attempt of file download: 1366069785jtun_sep12ennful26.m26
* WinHttp connection timeout: 12002 File: 1366069785jtun_sep12ennful26.m26
  File download error. Downloaded 4277800 bytes. 15th attempt of file download: 1366069785jtun_sep12ennful26.m26
* WinHttp connection timeout: 12002 File: 1366069785jtun_sep12ennful26.m26
  File download error. Downloaded 38892940 bytes. 16th attempt of file download: 1366069785jtun_sep12ennful26.m26
* REQUEST_ERROR - error 12007 (0x00002EE7), result API_SEND_REQUEST. File: 1366069785jtun_sep12ennful26.m26
* Failed to download file after 16 attempts: 1366069785jtun_sep12ennful26.m26
* Incomplete download of file 1366069785jtun_sep12ennful26.m26
  OnNotify() method for callback {72DA128F-2591-43f2-B272-29DA5452A197} returned 0x0
  OnNotify() method for callback {511C2222-DEFD-22EE-B154-4A6A546B9793} returned 0x0
  OnNotify() method for callback {810D5A61-BEEF-49c2-BD75-177F0647D2BA} returned 0x0
  OnNotify() method for callback {2F090208-20DC-42f0-BBD8-B68B472F7215} returned 0x0
  OnNotify() method for callback {EDBD3BD0-BEEF-4d4d-BAC9-19DD32EF4758} returned 0x0
  OnNotify() method for callback {EDBD3BD0-BEEF-4d4d-BAC9-19DD32EF4758} returned 0x0
  OnNotify() method for callback {2F090208-20DC-42f0-BBD8-B68B472F7215} returned 0x0
* Inventory SetAbort called on Moniker {535CB6A4-441F-4e8a-A897-804CD859100E} (Inventory Module), with abort code 500
* Inventory SetAbort called on Moniker {6AAE5D6B-C70C-4cdf-96C9-110AA1378E8C} (Inventory Module), with abort code 500
* Inventory SetAbort called on Moniker {535CB6A4-441F-4e8a-A897-804CD859100E} (Inventory Module), with abort code 500
* Inventory SetAbort called on Moniker {6AAE5D6B-C70C-4cdf-96C9-110AA1378E8C} (Inventory Module), with abort code 500
* OnNotify() method for callback {72DA128F-2591-43f2-B272-29DA5452A197} failed; err = 0x80004005
* Inventory SetAbort called on Moniker {535CB6A4-441F-4e8a-A897-804CD859100E} (Inventory Module), with abort code 517
* Inventory SetAbort called on Moniker {6AAE5D6B-C70C-4cdf-96C9-110AA1378E8C} (Inventory Module), with abort code 517
* Inventory SetAbort called on Moniker {535CB6A4-441F-4e8a-A897-804CD859100E} (Inventory Module), with abort code 517
* Inventory SetAbort called on Moniker {6AAE5D6B-C70C-4cdf-96C9-110AA1378E8C} (Inventory Module), with abort code 517
* Callback {72DA128F-2591-43f2-B272-29DA5452A197} is a PostSession callback. Callback Failed. Result -2147467259
  OnNotify() method for callback {810D5A61-BEEF-49c2-BD75-177F0647D2BA} returned 0x0
  OnNotify() method for callback {B6DC6C8F-BEEF-40c7-A806-B669BE1D2D19} returned 0x0
  OnNotify() method for callback {263395A0-BEEF-4be4-80B5-202C94EF4AA0} returned 0x0
  OnNotify() method for callback {511C2222-DEFD-22EE-B154-4A6A546B9793} returned 0x0
* Update Failed - PostSession for moniker {535CB6A4-441F-4e8a-A897-804CD859100E}
  Update for moniker: {535CB6A4-441F-4e8a-A897-804CD859100E}, P: SEPC Virus Definitions Win32 v12.1, V: MicroDefsB.CurDefs, L: SymAllLanguages, package: 1367096130jtun_sep12enncur26.m26, SeqName: CurDefs, SeqNum: 130427007, has update status code: 208
* Reporting error: 0x80004005 Update failed PVL=SEPC Virus Definitions Win32 v12.1 MicroDefsB.CurDefs SymAllLanguages
* PostSession Callbacks Failed. Update status code for moniker {535CB6A4-441F-4e8a-A897-804CD859100E}, P: SEPC Virus Definitions Win32 v12.1, V: MicroDefsB.CurDefs, L: SymAllLanguages is: 0x      D0.
  Update for moniker: {55DE35DC-862A-44c9-8A2B-3EF451665D0A}, P: SEPC CIDS Signatures v12.1, V: MicroDefsB.CurDefs, L: SymAllLanguages, package: 1367026583jtun_sepccurd25.x86, SeqName: CurDefs, SeqNum: 130426001, has update status code: 100
  Update for moniker: {6AAE5D6B-C70C-4cdf-96C9-110AA1378E8C}, P: SEPC Virus Definitions Win32 v12.1, V: MicroDefsB.Error, L: SymAllLanguages, package: 1366069785jtun_sep12ennful26.m26, SeqName: HubDefs, SeqNum: 130415016, has update status code: 227
* Reporting error: 0xFFFFFF00 Update failed PVL=SEPC Virus Definitions Win32 v12.1 MicroDefsB.Error SymAllLanguages
* PostSession Callbacks Failed. Update status code for moniker {6AAE5D6B-C70C-4cdf-96C9-110AA1378E8C}, P: SEPC Virus Definitions Win32 v12.1, V: MicroDefsB.Error, L: SymAllLanguages is: 0x      E3.
  Update for moniker: {810D5A61-809F-49c2-BD75-177F0647D2BA}, P: SEPC Iron Revocation List v12.1, V: MicroDefsB.CurDefs, L: SymAllLanguages, package: 1367031298jtun_irev130417005.7z, SeqName: CurDefs, SeqNum: 130426023, has update status code: 100
  Update for moniker: {D6AEBC07-D833-485f-9723-6C908D37F806}, P: SEPC Behavior And Security Heuristics v12.1, V: MicroDefsB.CurDefs, L: SymAllLanguages, package: 1366739059jtun_bashsepc130404011-130412011.x01, SeqName: CurDefs, SeqNum: 130412011, has update status code: 100
  Update for moniker: {EDBD3BD0-8395-4d4d-BAC9-19DD32EF4758}, P: SEPC Iron Whitelist v12.1, V: MicroDefsB.CurDefs, L: SymAllLanguages, package: 1366973254jtun_iron2012_130416004.irn, SeqName: CurDefs, SeqNum: 130426003, has update status code: 100
  ***** Session Results *****
  Total Updates Available: 6
  Total Updates Succeeded: 4
  Total Updates Succeeded - Reboot Req: 0
  Total Updates Skipped: 0
  Total Updates Failed: 2
  RunLiveUpdate result code: 0x00000000
  Session max recursion count = 15
  Error report submitted
----------------------------------------------------------------------------------------------------
Session ended at: 2013/04/28 12:29:49.545    (UTC +05:30)
****************************************************************************************************

Viewing all 10484 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>