Solved

sep 12 invalid Token

Posted on 2014-11-05
4
137 Views
Last Modified: 2015-03-18
Getting an invalid token error in sep clients even though we have enough licenses
0
Comment
Question by:sonickmc
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
4 Comments
 
LVL 63

Accepted Solution

by:
btan earned 250 total points
ID: 40425582
this may be related to the count - it seems to be miscount and the product limitation per se

http://www.symantec.com/business/support/index?page=content&id=TECH184530
The typical configuration of the SEPM is that the SEPM will "remember" what clients have attached to it for up to 60 days after they stop checking in before they are deleted and the license is scavenged and made available for redeployment.

When a newly deployed client first checks in, it will receive its license from the SEPM, and then connect to Symantec servers "in the cloud" to request its Client Authentication Token (CAT). Symantec Endpoint Protection 12.1 associates the CAT with the client ID value (the "Hardware ID") that individually identifies a specific client. If a client receives a new Hardware ID, it will be treated as a new client, and thus must receive a new CAT.
0
 
LVL 12

Assisted Solution

by:jmlamb
jmlamb earned 250 total points
ID: 40440872
In addition to what btan has provided, the Insight Lookup functionality is not disabled as a result of this error. The clients can still perform reputation queries, but will not submit samples to Insight.
0

Featured Post

Guide to Performance: Optimization & Monitoring

Nowadays, monitoring is a mixture of tools, systems, and codes—making it a very complex process. And with this complexity, comes variables for failure. Get DZone’s new Guide to Performance to learn how to proactively find these variables and solve them before a disruption occurs.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Run .exe file from network share 2 91
Twitching screen 11 142
EICAR File 5 86
Check a file for virus / malware 24 167
By the time you finish reading this article, you may have already lost all your money because you don't know the simple steps to securing your BitCoin wallet. BitCoin is an incredible invention. It is a decentralized currency system, which is the…
Ransomware continues to be a growing problem for both personal and business users alike and Antivirus companies are still struggling to find a reliable way to protect you from this dangerous threat.
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

734 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question