Genel, Güvenlik
SEP 14 Pending License Activation Hatasının Çözümü

SEP 14 Pending License Activation Hatasının Çözümü

Herkese Merhaba, bugün SEP 14 (Symantec Endpoint Protection) Cloud uygulamasında Pending License Activation hatasının çözümünü anlatacağım.

Öncelikle şunu belirteyim Cloud sürümünde client e yüklediğimizde bu hatayı alıyorsanız 4 saat e kadar düzelme ihtimali var yani hemen işlem yapmak zorunda değilsiniz. İnternetten kaynaklı sebepleri de kontrol ettikten sonra alttaki işlemleri uygulamaya başlayabilirsiniz.

Bu hatayı aldığınız client da hiçbir koruma aktif olmaz ve admin arayüzde At Risk olarak işaretlenir.

Yapacağımız işlemler çok basit.

  1. İlk önce client makineden alttaki linkleri kontrol ediyoruz.

https://ins.spn.com

https://message.s2.spn.com

http://sasmain.symantec.com

http://sas1alt.symantec.com

https://ssaw.symantec.com

http://siaw.symantec.com

http://csasalt.symantec.com

http://csasmain.symantec.com

eğer bu URL lere ulaşamıyorsa Firewall unuzdan bunlara izin vermeniz gerekmektedir.

  1. Bilgisayarı restart edip Güvenli Mod da başlatıyoruz.
  1. Güvenli modda başlattıktan sonra alttaki klasörleri siliyoruz.

C:\ProgramData\Norton\00000083

C:\ProgramData\Norton\00000082

Program data gizli bir klasör olduğu için gizli klasörleri açmanız gerekir. Yada çalıştır a direk %ProgramData% yazarsanız klasöre ulaşabilirsiniz.

  1. Bilgisayarı restart edip normal şekilde başlatıyoruz.

Lisansın aktif olmuş olması gerekiyor. Eğer hala lisansınız aktif olmadıysa agent da secure ibaresini görmüyorsanız Agent ı kaldırıp tekrar kurmanız gerekmektedir.

İşinize yaraması dileğiyle.

Share this Story

Related Posts

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

The Hacker News

  • Italy's Antitrust Regulator Fines Google and Apple for "Aggressive" Data Practices
    by [email protected] (Ravie Lakshmanan) on 27 Kasım 2021 at 06:34

    Italy's antitrust regulator has fined both Apple and Google €10 million each for what it calls are "aggressive" data practices and for not providing consumers with clear information on commercial uses of their personal data during the account creation phase. The Autorità Garante della Concorrenza e del Mercato (AGCM) said "Google and Apple did not provide clear and immediate information on t […]

  • This New Stealthy JavaScript Loader Infecting Computers with Malware
    by [email protected] (Ravie Lakshmanan) on 27 Kasım 2021 at 06:23

    Threat actors have been found using a previously undocumented JavaScript malware strain that functions as a loader to distribute an array of remote access Trojans (RATs) and information stealers. HP Threat Research dubbed the new, evasive loader "RATDispenser," with the malware responsible for deploying at least eight different malware families in 2021. Around 155 samples of this new malwar […]

  • Israel Bans Sales of Hacking and Surveillance Tools to 65 Countries
    by [email protected] (Ravie Lakshmanan) on 27 Kasım 2021 at 06:22

    Israel's Ministry of Defense has dramatically restricted the number of countries to which cybersecurity firms in the country are allowed to sell offensive hacking and surveillance tools to, cutting off 65 nations from the export list. The revised list, details of which were first reported by the Israeli business newspaper Calcalist, now only includes 37 countries, down from the previous 102: […]

  • Hackers Targeting Biomanufacturing Facilities With Tardigrade Malware
    by [email protected] (Ravie Lakshmanan) on 26 Kasım 2021 at 13:20

    An advanced persistent threat (APT) has been linked to cyberattacks on two biomanufacturing companies that occurred this year with the help of a custom malware loader called "Tardigrade." That's according to an advisory published by Bioeconomy Information Sharing and Analysis Center (BIO-ISAC) this week, which noted that the malware is actively spreading across the sector with the likely goal of […]

  • Crypto Hackers Using Babadeda Crypter to Make Their Malware Undetectable
    by [email protected] (Ravie Lakshmanan) on 26 Kasım 2021 at 10:32

    A new malware campaign has been discovered targeting cryptocurrency, non-fungible token (NFT), and DeFi aficionados through Discord channels to deploy a crypter named "Babadeda" that's capable of bypassing antivirus solutions and stage a variety of attacks. "[T]his malware installer has been used in a variety of recent campaigns to deliver information stealers, RATs, and even LockBit ransomware, […]