Solved

symantec endpoint management server ip change

Posted on 2014-09-06
1
883 Views
Last Modified: 2014-09-23
Symantec endpoint management server  change change the ip, will this change affect connected endpoint client pc?
0
Comment
Question by:litmic
1 Comment
 
LVL 63

Accepted Solution

by:
btan earned 500 total points
ID: 40308264
This is similar to question such as does SEPM requires a static IP?
It is not necessary although it is recommended.  And for your case, the clients should not be affected as if they can find the SEPM through a Management server list (MSL) for you site.

MSL includes the current IP address and the host name for SEPM.  If you install SEPM on a machine without a static the clients will need to use only the name of SEPM and it must be resolved by the client to the SEPM manager.

You should be able to see the MSL under Policies > Policy Components > Management Server Lists > Add Management Server List. And probably find your (old) server IP address with certain priority tagged to it e.g. (normally) Priority 1 for primary and priority 2 for secondary or old SEPM.

Note that you can only create your own Management Server list and can’t edit the default list with the host name(s) of SEPM for the clients to resolve those name using DNS, WINs, or NetBIOS Broadcast depending on your network config.

Recommend to make sure the clients take the policy update and once that happens you do a check to see if client has any errors and for old SEPM server (physically) ppl tend to turn them off if fine...

Furthermore, note that clients connects to the SEPM manager by registering themselves and is assigned with an unique agent Id.  This id is then used for tracking by SEPM but the latter never contacts the client i.e. latter always initiates the communication to SEPM in either Push or Pull mode.  
E.g. Push - the clients connects to the SEPM and maintains a connection.  
E.g. Pull - the clients connect to SEPM at a heartbeat interval checks for updates and disconnects.
0

Featured Post

Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Article by: btan
The intent is not to repeat what many has know about Ransomware but more to join its dots of what is it, who are the victims, why it exists, when and how we respond on infection. Lastly, sum up in a glance to share such information with more to help…
Recently, I read that Microsoft has analysed statistics for their security intelligence report. It revealed: still, the clear majority of windows users do their daily work as administrator. An administrative account is a burden, security-wise. My ar…
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

749 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question