Solved

Symantec Antivirus 10.2 Client Push

Posted on 2009-04-01
2
955 Views
Last Modified: 2013-12-09
I've installed Symanted Antivirus 10.2 on a server at a client site. Everything's gone (relatively) smoothly, and I've been able to use the internal deployment tool to push the client to a test XP machine successfully. However, it seems that the \VPHOME\CLT-INST\*\ folders, except the WIN32 folder, are bare. The installation of the server program created custom installation files for pushing the client to 32-bit XP machines, but didn't create the files for pushing the client to any other operating systems. 32-bit Vista (in\VPHOME\CLT-INST\WIN32VISTA\) is the primary concern here.
Is there a way, maybe through the System Center Console, to create the files that the Client Remote Install Tool needs in order to push the client to a remote machine? I have the standard, base Vista installation files from the CD, but the tool won't push successfully using those files.
0
Comment
Question by:siyana
2 Comments
 
LVL 38

Accepted Solution

by:
Hypercat (Deb) earned 500 total points
ID: 24041272
I think this document will give you the instructions you need to prepare and use the Vista install files with the system center:
http://service1.symantec.com/support/ent-security.nsf/854fa02b4f5013678825731a007d06af/116a086a8994573f8825721800619d1c?OpenDocument 
0
 

Author Closing Comment

by:siyana
ID: 31565387
The key was this bit:
"copy GRC.DAT ... from the Symantec AntiVirus server location c:\Program Files\Symantec Client Security\Symantec AntiVirus\CLT-INST\Win32 to the CDVista\SAVVISTA ... folder from which you want to install."
I copied all the files from the CD folder into the \VPHOME\CLT-INST\WIN32VISTA\ folder, along with the GRC.DAT file from ..\WIN32\, and the push was successful to a test Vista machine. Thank you!
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Virus or Ransom ware 6 367
Zepto Virus Infection 3 81
Do I need additional protection from ransomware? 13 138
Is my window10 Safe? after a malware removed by AV? 5 27
Some site administrators might be considering how to filter incoming traffic to a site by identifying the domains or networks of the traffic source, in the same way that a spam filter does on an email server, such as blocking all emails sent from th…
I recently had to create a utility which aim is to update McAfee's Virusscan and that had to be launched from a command line. I thought I’d share my experience with you. Why is it useful to be able to update an Antivirus from the command line?…
This Micro Tutorial demonstrates using Microsoft Excel pivot tables, how to reverse engineer competitors' marketing strategies through backlinks.
Many functions in Excel can make decisions. The most simple of these is the IF function: it returns a value depending on whether a condition you describe is true or false. Once you get the hang of using the IF function, you will find it easier to us…

895 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now