Solved

Unlock KAV on workstatoin

Posted on 2013-12-27
4
377 Views
Last Modified: 2013-12-30
In case the KAV policy has been deployed to the workstation, is it possible to unlock a particular workstation and modify the setting ?

Where can I start a manual KAV scan on client workstation in case the setting is locked ?

I'm using KAV 10.1.249.



Tks
0
Comment
Question by:AXISHK
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
4 Comments
 
LVL 30

Expert Comment

by:Sudeep Sharma
ID: 39742270
Most likely it would ask for the password which would be set by the Administrator while deploying it. If you know the password you could change the settings, however it would be reverted once you reboot the system.

Sudeep
0
 

Author Comment

by:AXISHK
ID: 39743066
The server is crashed and the password for the old KAV is lost. It is deployed by KAV 6.0 administrator kit.  

We have already deployed a KAV security centre 10.1.249. Try to deploy to this workstation but doesn't succeed. Guessing that we still need the password to uninstall it.

Is it possible to remove this KAV through registry modification ?

Tks
0
 
LVL 30

Accepted Solution

by:
Sudeep Sharma earned 500 total points
ID: 39745959
Use kaspersky removal tool, it has the ability to remove the password protected application.

http://support.kaspersky.com/3057

Sudeep
0
 

Author Closing Comment

by:AXISHK
ID: 39745999
Tks
0

Featured Post

Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Change your password...do it now!. Probably the easiest point of access to your account is through guessing your password. If your password is guessable, do change it now. If not for your sake but for everyone else in your friends list. Remember …
OVERVIEW This guide provides information on the process performed when the Symantec Endpoint Protection (SEP) client checks in with the Symantec Endpoint Protection Manager (SEPM). AUDIENCE Information Technology personnel responsible for suppo…
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

735 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question