?
Solved

Symantec Endpoint Protection -computers automaticaly removed then added?!?

Posted on 2011-09-12
7
Medium Priority
?
862 Views
Last Modified: 2013-12-09
Hi,
Symantec Endpoint Protection SBE V12. I received an automated email from the SPC_Server: "Number of clients changed: 3.  Changes could be that a client was added or removed."  -The report listed three computer "client changes" and said they were "removed".

I looked in the Protection Center and the three were indeed gone. But looking at the workstations the AV client is there and is running and reports everything is OK. -A day later I get notification of "removal" of another 2 computers. Later that same day all 5 computers re-apear in the Protection Center.

Can someone shed some light on why this would happen or point me towards a log file that might explain?

Thank you!
0
Comment
Question by:BobBrink
  • 3
  • 3
6 Comments
 
LVL 20

Accepted Solution

by:
jimmymcp02 earned 2000 total points
ID: 36531150
Its this what you are experiencing?
Clients may become disconnected from Symantec Endpoint Protection
Manager when using Location Based Communication Settings
Symantec Endpoint Protection is designed so that clients can know their location
(in the office, at home, on the road, etc.). Based on that location, their policies can
change, including the Management Server to which they are linked.
If you are using a policy that is triggered by a location, the client may become
disconnected when it is using that location-based policy.
To work around this problem:
¦ Change the client's location, even temporarily.
¦ Restart the client.

http://www.symantec.com/business/support/index?page=content&id=DOC4332&key=54619
0
 

Author Comment

by:BobBrink
ID: 36531285
Nope, no location based policies in place.

You got me thingking though. I checked DHCP and the "removal" and subsequent addition of the computers seems to coinside with a change to their IP address. I did not check all machines, but this was true on all three I looked at.  -Pretty goofy.

Thank you!

Bob
0
 
LVL 20

Expert Comment

by:jimmymcp02
ID: 36537603
Do you have groups?

If so are there any other groups that are not experiencing this issue? maybe we can move one of those affeted clients into a different groups for testing
0
Evaluating UTMs? Here's what you need to know!

Evaluating a UTM appliance and vendor can prove to be an overwhelming exercise.  How can you make sure that you're getting the security that your organization needs without breaking the bank? Check out our UTM Buyer's Guide for more information on what you should be looking for!

 

Author Comment

by:BobBrink
ID: 36540160
I've requested that this question be closed as follows:

Accepted answer: 0 points for BobBrink's comment http:/Q_27303157.html#36531285

for the following reason:

Got me going in right direction.
0
 

Author Comment

by:BobBrink
ID: 36537913
this was not my intent. My intent was to close and give all points to jummy
0
 
LVL 20

Expert Comment

by:jimmymcp02
ID: 36540161
I guess i have to object to closing the question in order to get the points :)
0

Featured Post

Concerto Cloud for Software Providers & ISVs

Can Concerto Cloud Services help you focus on evolving your application offerings, while delivering the best cloud experience to your customers? From DevOps to revenue models and customer support, the answer is yes!

Learn how Concerto can help you.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article investigates the question of whether a computer can really be cleaned once it has been infected, and what the best ways of cleaning a computer might be (in this author's opinion).
Curious about the latest ransomware attack? Check out our timeline of events surrounding the spread of this new virus along with tips on how to mitigate the damage.
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
Suggested Courses

621 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question