Unable to discover clients in etrust AV 7.1

Posted on 2006-05-19
Medium Priority
Last Modified: 2008-01-09
I have installed etrust av from CA on to my server.  In the admin console i have setupmy subnet.  This is a small networked environment with 5 clients.  On day one (three days ago) I was able to see all clients and have assigned each client to the appropriate policy branch.  On day to there was only one client and the server visable in the subnet and reports show that no clients are protected.

I have checked that the firewall is off on each client and have stopped and restarted av services.  I have also tested that when a down load is user inniated, it does download from the server.  

Question:  What additional steps or measures can i take to discovery my clients so that I can manage them in the admin virus console and run reports as disared?
Question by:dbennett01
1 Comment

Accepted Solution

pa1in earned 60 total points
ID: 16788471

I'd check the following:
1. Make sure that your subnet scan is for the correct IP address range.
2. If your pcs are not part of a domain, you will either need a user account with the same password on all the pcs, or you will need to modify the CA installation file ino6.icf file to allow the server IP address as a trusted server source.
3. Check the General logs on the admin server. You will probably find that the system encountered some errors when trying to apply policies to the workstations.

Featured Post

Threat Trends for MSPs to Watch

See the findings.
Despite its humble beginnings, phishing has come a long way since those first crudely constructed emails. Today, phishing sites can appear and disappear in the length of a coffee break, and it takes more than a little know-how to keep your clients secure.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

PREFACE The purpose of this guide is to explain what the SEPC Status Utility is and how it works. I have written the utility using AutoIt and have included the source code for your review. You are welcome to modify the code to your liking, but I wi…
This article investigates the question of whether a computer can really be cleaned once it has been infected, and what the best ways of cleaning a computer might be (in this author's opinion).
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
Suggested Courses

831 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question