Genel, Güvenlik
SEP 14 Pending License Activation Hatasının Çözümü

SEP 14 Pending License Activation Hatasının Çözümü

Herkese Merhaba, bugün SEP 14 (Symantec Endpoint Protection) Cloud uygulamasında Pending License Activation hatasının çözümünü anlatacağım.

Öncelikle şunu belirteyim Cloud sürümünde client e yüklediğimizde bu hatayı alıyorsanız 4 saat e kadar düzelme ihtimali var yani hemen işlem yapmak zorunda değilsiniz. İnternetten kaynaklı sebepleri de kontrol ettikten sonra alttaki işlemleri uygulamaya başlayabilirsiniz.

Bu hatayı aldığınız client da hiçbir koruma aktif olmaz ve admin arayüzde At Risk olarak işaretlenir.

Yapacağımız işlemler çok basit.

  1. İlk önce client makineden alttaki linkleri kontrol ediyoruz.

https://ins.spn.com

https://message.s2.spn.com

http://sasmain.symantec.com

http://sas1alt.symantec.com

https://ssaw.symantec.com

http://siaw.symantec.com

http://csasalt.symantec.com

http://csasmain.symantec.com

eğer bu URL lere ulaşamıyorsa Firewall unuzdan bunlara izin vermeniz gerekmektedir.

  1. Bilgisayarı restart edip Güvenli Mod da başlatıyoruz.
  1. Güvenli modda başlattıktan sonra alttaki klasörleri siliyoruz.

C:\ProgramData\Norton\00000083

C:\ProgramData\Norton\00000082

Program data gizli bir klasör olduğu için gizli klasörleri açmanız gerekir. Yada çalıştır a direk %ProgramData% yazarsanız klasöre ulaşabilirsiniz.

  1. Bilgisayarı restart edip normal şekilde başlatıyoruz.

Lisansın aktif olmuş olması gerekiyor. Eğer hala lisansınız aktif olmadıysa agent da secure ibaresini görmüyorsanız Agent ı kaldırıp tekrar kurmanız gerekmektedir.

İşinize yaraması dileğiyle.

Share this Story

Related Posts

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

The Hacker News

  • Critical Code Execution Flaw Found in LIVE555 Streaming Library
    by [email protected] (Mohit Kumar) on 22 Ekim 2018 at 12:30

    Security researchers have discovered a serious code execution vulnerability in the LIVE555 streaming media library—which is being used by popular media players, along with a number of embedded devices capable of streaming media. LIVE555 streaming media, developed and maintained by Live Networks, is a set of C++ libraries companies and application developers use to stream multimedia over open […]

  • 8 Popular Courses to Learn Ethical Hacking – 2018 Bundle
    by [email protected] (Exclusive Deals) on 19 Ekim 2018 at 13:12

    Update (Oct 2018) — Over 30,000 students from all around the world have joined this training program so far. Due to the growing number of threats in the computer world, ethical hackers have become the most important player for not only governments but also private companies and IT firms in order to safeguard their systems and networks from hackers trying to infiltrate them. By 2020, […]

  • Critical Flaws Found in Amazon FreeRTOS IoT Operating System
    by [email protected] (Swati Khandelwal) on 19 Ekim 2018 at 08:35

    A security researcher has discovered several critical vulnerabilities in one of the most popular embedded real-time operating systems—called FreeRTOS—and its other variants, exposing a wide range of IoT devices and critical infrastructure systems to hackers. What is FreeRTOS (Amazon, WHIS OpenRTOS, SafeRTOS)? FreeRTOS is a leading open source real-time operating system (RTOS) for embedded […]

  • Tumblr Patches A Flaw That Could Have Exposed Users’ Account Info
    by [email protected] (Swati Khandelwal) on 17 Ekim 2018 at 18:16

    Tumblr today published a report admitting the presence of a security vulnerability in its website that could have allowed hackers to steal login credentials and other private information for users' accounts. The affected information included users email addresses, protected (hashed and salted) account passwords, self-reported location (a feature no longer available), previously used ema […]

  • LuminosityLink Hacking Tool Author Gets 30-Months Prison Sentence
    by [email protected] (Swati Khandelwal) on 17 Ekim 2018 at 14:18

    A 21-year-old Kentucky man who previously pleaded guilty to developing, marketing, and selling an infamous remote access trojan (RAT) called LuminosityLink has now been sentenced to 30 months in prison. According to a press release published Monday by U.S. Attorney’s Office, Colton Grubbs, who used online moniker 'KFC Watermelon,' was pleaded guilty for three counts--unlawfully accessing […]