Genel, Güvenlik
SEP 14 Pending License Activation Hatasının Çözümü

SEP 14 Pending License Activation Hatasının Çözümü

Herkese Merhaba, bugün SEP 14 (Symantec Endpoint Protection) Cloud uygulamasında Pending License Activation hatasının çözümünü anlatacağım.

Öncelikle şunu belirteyim Cloud sürümünde client e yüklediğimizde bu hatayı alıyorsanız 4 saat e kadar düzelme ihtimali var yani hemen işlem yapmak zorunda değilsiniz. İnternetten kaynaklı sebepleri de kontrol ettikten sonra alttaki işlemleri uygulamaya başlayabilirsiniz.

Bu hatayı aldığınız client da hiçbir koruma aktif olmaz ve admin arayüzde At Risk olarak işaretlenir.

Yapacağımız işlemler çok basit.

  1. İlk önce client makineden alttaki linkleri kontrol ediyoruz.

https://ins.spn.com

https://message.s2.spn.com

http://sasmain.symantec.com

http://sas1alt.symantec.com

https://ssaw.symantec.com

http://siaw.symantec.com

http://csasalt.symantec.com

http://csasmain.symantec.com

eğer bu URL lere ulaşamıyorsa Firewall unuzdan bunlara izin vermeniz gerekmektedir.

  1. Bilgisayarı restart edip Güvenli Mod da başlatıyoruz.
  1. Güvenli modda başlattıktan sonra alttaki klasörleri siliyoruz.

C:\ProgramData\Norton\00000083

C:\ProgramData\Norton\00000082

Program data gizli bir klasör olduğu için gizli klasörleri açmanız gerekir. Yada çalıştır a direk %ProgramData% yazarsanız klasöre ulaşabilirsiniz.

  1. Bilgisayarı restart edip normal şekilde başlatıyoruz.

Lisansın aktif olmuş olması gerekiyor. Eğer hala lisansınız aktif olmadıysa agent da secure ibaresini görmüyorsanız Agent ı kaldırıp tekrar kurmanız gerekmektedir.

İşinize yaraması dileğiyle.

Share this Story

Related Posts

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

The Hacker News

  • Google+ to Shut Down Early After New API Flaw Hits 52.5 Million Users
    by [email protected] (Mohit Kumar) on 10 Aralık 2018 at 21:02

    Google today revealed that Google+ has suffered another massive data breach, forcing the tech giant to shut down its struggling social network four months earlier than its actual scheduled date, i.e., in April 2019 instead of August 2019. Google said it discovered another critical security vulnerability in one of Google+'s People APIs that could have allowed developers to steal privat […]

  • How to Hack WiFi Password Easily Using New Attack On WPA/WPA2
    by [email protected] (Mohit Kumar) on 9 Aralık 2018 at 21:14

    Looking for how to hack WiFi password OR WiFi hacking software? Well, a security researcher has revealed a new WiFi hacking technique that makes it easier for hackers to crack WiFi passwords of most modern routers. Discovered by the lead developer of the popular password-cracking tool Hashcat, Jens 'Atom' Steube, the new WiFi hack works explicitly against WPA/WPA2 wireless network protocols […]

  • Australia Passes Anti-Encryption Bill—Here's Everything You Need To Know
    by [email protected] (Swati Khandelwal) on 7 Aralık 2018 at 13:18

    Australia's House of Representatives has finally passed the "Telecommunications Assistance and Access Bill 2018," also known as the Anti-Encryption Bill, on Thursday that would now allow law enforcement to force Google, Facebook, WhatsApp, Signal, and other tech giants to help them access encrypted communications. The Australian government argues the new legislation is important for nationa […]

  • SNDBOX: AI-Powered Online Automated Malware Analysis Platform
    by [email protected] (Mohit Kumar) on 6 Aralık 2018 at 20:07

    Looking for an automated malware analysis software? Something like a 1-click solution that doesn't require any installation or configuration…a platform that can scale up your research time… technology that can provide data-driven explanations… well, your search is over! Israeli cybersecurity and malware researchers today at Black Hat conference launch a revolutionary machine learning and […]

  • New Ransomware Spreading Rapidly in China Infected Over 100,000 PCs
    by [email protected] (Swati Khandelwal) on 6 Aralık 2018 at 19:30

    A new piece of ransomware is spreading rapidly across China that has already infected more than 100,000 computers in the last four days as a result of a supply-chain attack... and the number of infected users is continuously increasing every hour. What's Interesting? Unlike almost every ransomware malware, the new virus doesn't demand ransom payments in Bitcoin. Instead, the attacker is […]