Solved

Backup exec 10 error : Access denied to remote agent. Check the login account for the specified device.

Posted on 2006-06-15
3
348 Views
Last Modified: 2010-04-11
An overnight backup has been running fine for the last year. Last night the backup failed when connecting to our SQL server with the error message "Access denied to remote agent. Check the login account for the specified device"

I am not sure why this has happened as I dont thing anyone has messed with the permissions of the share. The backup exec machine is fine as it backed up another server just fine. What could have happened to my sql server.

Please can an expert help me resolve this issue.
0
Comment
Question by:gpersand
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 13

Expert Comment

by:prashsax
ID: 16913940
What account are you using for Veritas Server.

Is it a part of Domain Admins Group.

The Service Account must be in the Domain admins group to access the machines remotly.

If yes, then login to SQL server and check the local Security Policy.

1. Open the Security Policy of the server, and click on User Rights Assignment.

2. Then open the Access this computer from the network Policy and add the account being used for the backup, or if the account is part of Domain Admins, make sure that group is listed in the Policy editor.


0
 
LVL 13

Accepted Solution

by:
prashsax earned 500 total points
ID: 16913961
If nothing works.

Uninstall the Remote Agent from the SQL server.
Re-install it.(From console and not from Terminal Session)


This will fix the problem.
0
 

Author Comment

by:gpersand
ID: 16919009
How do I locally uninstall and reinstall the backup agent from the sql server?
0

Featured Post

Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Email attacks are the most common methods for initiating ransomware and phishing scams. Attackers want you to open an infected attachment or click a malicious link, and unwittingly download malware to your machine. Here are 7 ways you can stay safe.
Recovering from what the press called "the largest-ever cyber-attack", IT departments worldwide are discussing ways to defend against this in the future. In this process, many people are looking for immediate actions while, instead, they need to tho…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses
Course of the Month4 days, 18 hours left to enroll

636 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question