[Okta Webinar] Learn how to a build a cloud-first strategyRegister Now

x
?
Solved

Our Engine: 8.911-1001, but why we still have the same problem "Insufficient system resources exist to complete the requested service"

Posted on 2009-04-15
9
Medium Priority
?
660 Views
Last Modified: 2013-12-04
We are also using TrendMicro Client/Server Security for SMB 3.6 ver on File Server, and sometimes get the message "Insufficient system resources exist to complete the requested service"  when large size file copying and  some of network files access by users from File Server side.

http://www.experts-exchange.com/Security/Vulnerabilities/Q_22948956.html
1. As above solution talking about the newest Engine should solve the problem. our Engine: 8.911-1001, why it still has the same problem.

2. Should we install those Patches (including Patch 1, Patch 2 and even CGI modules Patch)
http://www.trendmicro.com/download/product.asp?productid=97

Or ONLY change the registry "PagedPoolSize" to solve it?
http://esupport.trendmicro.com/8/Kernel-mode-memory-usage-of-the-ClientServer-Security-Agent-is-very-hi.aspx


Any further idea please ? Thanks !
tm.jpg
0
Comment
Question by:rhinoceros
  • 5
  • 3
8 Comments
 
LVL 3

Accepted Solution

by:
goban earned 750 total points
ID: 24162067
You are running an outdated version of the software. The upgrade to the latest version is free and resolves your problem.
 
Worry-Free Business Security - Advanced
(formerly Client Server Messaging Security for SMB)
Worry-Free Business Security - Standard
(formerly Client Server Security for SMB)
I went through this same issue several months ago. Here's two threads that discuss the issue you're having.
http://www.experts-exchange.com/Security/Vulnerabilities/Q_22948956.html
http://www.experts-exchange.com/Security/Vulnerabilities/Q_22948956.html
0
 
LVL 13

Author Comment

by:rhinoceros
ID: 24164383
>>You are running an outdated version of the software. The upgrade to the latest version is free and resolves your problem.
 
Free upgrade ? Let me check...
0
 
LVL 3

Expert Comment

by:goban
ID: 24164398
Yes, Free! Trend's current policy is for free product/version upgrades for the duration of your subscription. You can use the same activation key.
0
Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

 
LVL 13

Author Comment

by:rhinoceros
ID: 24201264
In fact, we feel it should has some improvement, but sometimes it still has the same problem even the newest version has been upgraded.

Error Message
"Not enough server storage is available to process this command"
(when large size file copying)

"Insufficient system resources exit to completel the requested service"
(when logon to server)
 

Any idea please ?
tm1.JPG
0
 
LVL 3

Expert Comment

by:goban
ID: 24220207
Have you isolated this problem to Trend Micro? If you uninstall the Trend Micro client from a test machine do you still recieve he error message?
0
 
LVL 13

Author Comment

by:rhinoceros
ID: 24221959
No, it has no error message when Trend Micro RealTime Scan SERIVCE is stopped.
0
 
LVL 13

Author Comment

by:rhinoceros
ID: 24372787
Last few weeks, I had tried to look for more information again. and found Event ID 1505-1508 in event log.

http://support.microsoft.com/kb/935649
Error message when you try to log on to a Windows Server 2003-based terminal server: "Windows cannot load the user's profile but has logged you on with the default profile for the system"

My case is not happened on TS, but it may solve my probelm for "PoolUsageMaximum" and "PagedPoolSize" modify?  Both registry changing will not have any effect to our server ?

Thanks !

0
 
LVL 13

Author Closing Comment

by:rhinoceros
ID: 31570839
Although it could not be fully solved, goban lets us know the newest version and then upgraded. In fact, it also has some improvement after selected "Scan files being created or modified" (Not checked "Scan files being retrieved).  
0

Featured Post

 The Evil-ution of Network Security Threats

What are the hacks that forever changed the security industry? To answer that question, we created an exciting new eBook that takes you on a trip through hacking history. It explores the top hacks from the 80s to 2010s, why they mattered, and how the security industry responded.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

When you put your credit card number into a website for an online transaction, surely you know to look for signs of a secure website such as the padlock icon in the web browser or the green address bar.  This is one way to protect yourself from oth…
It’s a season to be thankful, and we’re thankful for users like you who engage on site, solve technology problems, and network with others in the industry. What tech are we most thankful for? Keep reading.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
This video Micro Tutorial shows how to password-protect PDF files with free software. Many software products can do this, such as Adobe Acrobat (but not Adobe Reader), Nuance PaperPort, and Nuance Power PDF, but they are not free products. This vide…
Suggested Courses

834 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question