Genel, Güvenlik
SEP 14 Pending License Activation Hatasının Çözümü

SEP 14 Pending License Activation Hatasının Çözümü

Herkese Merhaba, bugün SEP 14 (Symantec Endpoint Protection) Cloud uygulamasında Pending License Activation hatasının çözümünü anlatacağım.

Öncelikle şunu belirteyim Cloud sürümünde client e yüklediğimizde bu hatayı alıyorsanız 4 saat e kadar düzelme ihtimali var yani hemen işlem yapmak zorunda değilsiniz. İnternetten kaynaklı sebepleri de kontrol ettikten sonra alttaki işlemleri uygulamaya başlayabilirsiniz.

Bu hatayı aldığınız client da hiçbir koruma aktif olmaz ve admin arayüzde At Risk olarak işaretlenir.

Yapacağımız işlemler çok basit.

  1. İlk önce client makineden alttaki linkleri kontrol ediyoruz.

https://ins.spn.com

https://message.s2.spn.com

http://sasmain.symantec.com

http://sas1alt.symantec.com

https://ssaw.symantec.com

http://siaw.symantec.com

http://csasalt.symantec.com

http://csasmain.symantec.com

eğer bu URL lere ulaşamıyorsa Firewall unuzdan bunlara izin vermeniz gerekmektedir.

  1. Bilgisayarı restart edip Güvenli Mod da başlatıyoruz.
  1. Güvenli modda başlattıktan sonra alttaki klasörleri siliyoruz.

C:\ProgramData\Norton\00000083

C:\ProgramData\Norton\00000082

Program data gizli bir klasör olduğu için gizli klasörleri açmanız gerekir. Yada çalıştır a direk %ProgramData% yazarsanız klasöre ulaşabilirsiniz.

  1. Bilgisayarı restart edip normal şekilde başlatıyoruz.

Lisansın aktif olmuş olması gerekiyor. Eğer hala lisansınız aktif olmadıysa agent da secure ibaresini görmüyorsanız Agent ı kaldırıp tekrar kurmanız gerekmektedir.

İşinize yaraması dileğiyle.

Share this Story

Related Posts

Leave a Reply

Your email address will not be published. Required fields are marked *

Bu site, istenmeyenleri azaltmak için Akismet kullanıyor. Yorum verilerinizin nasıl işlendiği hakkında daha fazla bilgi edinin.

The Hacker News

  • Hackers Target Middle East Governments with Evasive "CR4T" Backdoor
    by [email protected] (The Hacker News) on 19 Nisan 2024 at 06:16

    Government entities in the Middle East have been targeted as part of a previously undocumented campaign to deliver a new backdoor dubbed CR4T. Russian cybersecurity company Kaspersky said it discovered the activity in February 2024, with evidence suggesting that it may have been active since at least a year prior. The campaign has been codenamed 

  • OfflRouter Malware Evades Detection in Ukraine for Almost a Decade
    by [email protected] (The Hacker News) on 18 Nisan 2024 at 14:25

    Select Ukrainian government networks have remained infected with a malware called OfflRouter since 2015. Cisco Talos said its findings are based on an analysis of over 100 confidential documents that were infected with the VBA macro virus and uploaded to the VirusTotal malware scanning platform since 2018. More than 20 such documents have been uploaded since 2022. "The documents contained VBA

  • FIN7 Cybercrime Group Targeting U.S. Auto Industry with Carbanak Backdoor
    by [email protected] (The Hacker News) on 18 Nisan 2024 at 13:58

    The infamous cybercrime syndicate known as FIN7 has been linked to a spear-phishing campaign targeting the U.S. automotive industry to deliver a known backdoor called Carbanak (aka Anunak). "FIN7 identified employees at the company who worked in the IT department and had higher levels of administrative rights," the BlackBerry research and intelligence team said in a new write-up. "They

  • Recover from Ransomware in 5 Minutes—We will Teach You How!
    by [email protected] (The Hacker News) on 18 Nisan 2024 at 11:17

    Super Low RPO with Continuous Data Protection:Dial Back to Just Seconds Before an Attack Zerto, a Hewlett Packard Enterprise company, can help you detect and recover from ransomware in near real-time. This solution leverages continuous data protection (CDP) to ensure all workloads have the lowest recovery point objective (RPO) possible. The most valuable thing about CDP is that it does not use

  • How to Conduct Advanced Static Analysis in a Malware Sandbox
    by [email protected] (The Hacker News) on 18 Nisan 2024 at 10:31

    Sandboxes are synonymous with dynamic malware analysis. They help to execute malicious files in a safe virtual environment and observe their behavior. However, they also offer plenty of value in terms of static analysis. See these five scenarios where a sandbox can prove to be a useful tool in your investigations. Detecting Threats in PDFs PDF files are frequently exploited by threat actors to