Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

Unlock KAV on workstatoin

Posted on 2013-12-27
4
Medium Priority
?
382 Views
Last Modified: 2013-12-30
In case the KAV policy has been deployed to the workstation, is it possible to unlock a particular workstation and modify the setting ?

Where can I start a manual KAV scan on client workstation in case the setting is locked ?

I'm using KAV 10.1.249.



Tks
0
Comment
Question by:AXISHK
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
4 Comments
 
LVL 30

Expert Comment

by:Sudeep Sharma
ID: 39742270
Most likely it would ask for the password which would be set by the Administrator while deploying it. If you know the password you could change the settings, however it would be reverted once you reboot the system.

Sudeep
0
 

Author Comment

by:AXISHK
ID: 39743066
The server is crashed and the password for the old KAV is lost. It is deployed by KAV 6.0 administrator kit.  

We have already deployed a KAV security centre 10.1.249. Try to deploy to this workstation but doesn't succeed. Guessing that we still need the password to uninstall it.

Is it possible to remove this KAV through registry modification ?

Tks
0
 
LVL 30

Accepted Solution

by:
Sudeep Sharma earned 2000 total points
ID: 39745959
Use kaspersky removal tool, it has the ability to remove the password protected application.

http://support.kaspersky.com/3057

Sudeep
0
 

Author Closing Comment

by:AXISHK
ID: 39745999
Tks
0

Featured Post

[Webinar] Lessons on Recovering from Petya

Skyport is working hard to help customers recover from recent attacks, like the Petya worm. This work has brought to light some important lessons. New malware attacks like this can take down your entire environment. Learn from others mistakes on how to prevent Petya like worms.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

PREFACE The purpose of this guide is to explain what the SEPC Status Utility is and how it works. I have written the utility using AutoIt and have included the source code for your review. You are welcome to modify the code to your liking, but I wi…
By the time you finish reading this article, you may have already lost all your money because you don't know the simple steps to securing your BitCoin wallet. BitCoin is an incredible invention. It is a decentralized currency system, which is the…
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

722 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question