Solved

Symantec Endpoint Protection - Import\Export Policies

Posted on 2009-07-03
4
1,957 Views
Last Modified: 2012-05-07
Quick run down......exported a policy(antivirus and antispyware policy) out of SEP.  I'm trying to import that policy into another copy of SEP running on a different server in a completly different domain.  When importing the policy, I get an error that says "Failed to import the policy. Error: invalid import file."

Anyone know if this is possible?
0
Comment
Question by:GSLBermuda
  • 2
4 Comments
 
LVL 16

Assisted Solution

by:warturtle
warturtle earned 50 total points
ID: 24777344
Here is an article that might help:

http://service1.symantec.com/SUPPORT/ent-security.nsf/docid/2008110606154848?Open&seg=ent

There is an expert called - xmachine, he is quite knowledgeable in Symantec products and might be able to help as well.
0
 
LVL 8

Assisted Solution

by:jako
jako earned 50 total points
ID: 24778488
how did you transport the import file? for instance [wrong FTP type|some_editors] may add linefeeds to your carriage returns in that file and vice versa. This simple thing can be often overlooked when making the minor changes needed.
if that kind of import should be possible, be completely sure that your file syntax stays exactly the same.
0
 

Accepted Solution

by:
GSLBermuda earned 0 total points
ID: 24817731
Corrected the problem myself......simple.  It was failing because I was using a trail version.  After trying on a licensed copy, everything worked fine.
Thanks for the help and suggestions.
0
 
LVL 16

Expert Comment

by:warturtle
ID: 24821675
Hahaha, that wasn't really a question.  But, glad it worked out for you!!
0

Featured Post

How to run any project with ease

Manage projects of all sizes how you want. Great for personal to-do lists, project milestones, team priorities and launch plans.
- Combine task lists, docs, spreadsheets, and chat in one
- View and edit from mobile/offline
- Cut down on emails

Join & Write a Comment

This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Nothing in an HTTP request can be trusted, including HTTP headers and form data.  A form token is a tool that can be used to guard against request forgeries (CSRF).  This article shows an improved approach to form tokens, making it more difficult to…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

706 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now