Solved

Symantec AntiVirus all versions, what is Validate.dat and what does it do?

Posted on 2007-04-04
6
310 Views
Last Modified: 2013-12-04
What does "C:\Program Files\Common Files\Symantec Shared\Validate.dat" do?  For security reasons we lock down the entire directory to read and execute for users, and audit failed access.  Everytime a user logs in ccApp tries to write to this file as the user.  I want to either stop Symantec from writing to the file or stop auditing it, but I need to know what the file actually does first.  Thanks!
0
Comment
Question by:cuzimbob1
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
6 Comments
 
LVL 66

Expert Comment

by:johnb6767
ID: 18854281
Can you open it in notepad and make anything out from it?
0
 

Author Comment

by:cuzimbob1
ID: 18854328
It's all "computer cuss."  Nothing discernable.
0
 
LVL 66

Expert Comment

by:johnb6767
ID: 18854378
I widh I had more info to offer then, searching pulls up nada.... Might be worth contacting Symantec support....
0
 
LVL 19

Accepted Solution

by:
CoccoBill earned 500 total points
ID: 18857003
Validate.dat seems to be called when the software is activated, so as the name suggests I suppose it contains data to validate your software as a legit versions (as in not pirated). Most likely you will need to grant your users write access to that file.
0

Featured Post

When ransomware hits your clients, what do you do?

MSPs: Endpoint security isn’t enough to prevent ransomware.
As the impact and severity of crypto ransomware attacks has grown, Webroot fought back, not just by building a next-gen endpoint solution capable of preventing ransomware attacks but also by being a thought leader.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Recently, Microsoft released a best-practice guide for securing Active Directory. It's a whopping 300+ pages long. Those of us tasked with securing our company’s databases and systems would, ideally, have time to devote to learning the ins and outs…
This article investigates the question of whether a computer can really be cleaned once it has been infected, and what the best ways of cleaning a computer might be (in this author's opinion).
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

734 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question