Quantcast
Channel: Faronics
Viewing all 118 articles
Browse latest View live

Resolving potential BSOD issues after upgrading to Windows 10 Ann...

$
0
0

Overview

In some instances, customers may experience periodic BSOD issues after installing the Windows 10 Anniversary Update on machines protected by Deep Freeze.

Problem

The Windows 10 Anniversary update introduced additional drivers into the system that can interfere with the ability of our drivers to properly respond to some IO requests to our Storage Spaces or ThawSpaces.

Resolution

A hotfix for the issue is being worked on and will be released as soon as possible. Customers seeing this issue should contact the Faronics Support team to open a ticket on this issue to be advised when the update is released. The support team can be reached via email to support@faronics.com.

Workaround

This issue can be worked around by changing the load order for some drivers on the system. To apply the appropriate changes to a computer please follow the process below;

In Thawed state open regedit.exe and find following registry key:

HKLM\System\CurrentControlSet\Control\Class \{71A27CDD-812A-11D0-BEC7-08002BE2092F}\UpperFilters

Edit driver order as follows:

DeepFrz
Volsnap
FarSpace

Reboot the workstation, so the new order of drivers will take effect.

There are methods that can be used to deploy this fix in larger environments in an automated manner, for assistance in deploying this fix in larger deployments please contact the Faronics Support team.


How do I configure Deep Freeze to work with Bloomberg Professiona...

$
0
0

The following procedure was provided by Bloomberg, for support and assitance in implementing this process please contact Bloomberg support at HTTP://WWW.BLOOMBERG.COM/NOW/CONTACTS/

  1. Reboot the system Thawed
  2. Log into the computer using a profile/login that you are not trying to redirect or Data Igloo cannot redirect any registry keys. (For example. Don’t log in as you if you are trying to redirect your user profile)
  3. Open Data Igloo
  4. Go to User Profile (to redirect the enter profile) and then Registry Key redirection
  5. The following keys are to be redirected in order for Bloomberg software to update and retain information including licenses while the system is Frozen. And the registry keys that need to be saved/stored/kept are:
    • 32-bit Operating System
      • HKEY_LOCAL_MACHINE\SOFTWARE\Bloomberg L.P. (and all keys created under this key)
      • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
    • 64-bit Operating System
      • HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Bloomberg L.P. (and all keys created under thiskey)
      • HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall
        Users can have the rights listed below instead of Uninstall.
    • 32-bit Bloomberg Office Tools in 32-bit Operating System.
      • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\
        Bloomberg Office Tools (32-bit) 32-bit Bloomberg Office Tools in 64-bit Operating System
      • HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\
        Uninstall\Bloomberg Office Tools (32-bit)
    • 64-bit Bloomberg Office Tools in 64-bit Operating System
      • HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\
        Uninstall\Bloomberg Office Tools (64-bit)
  6. 6. Reboot the system Frozen and test the Bloomberg software

Problems accessing the Windows Store after installing Deep Freeze

$
0
0

Problem

After installing Deep Freeze the Windows Store cannot be accessed to download updated applications.

Cause

After installing Deep Freeze the Windows Update service is suppressed to prevent the install of updates and other changes while Deep Freeze is managing the update process. This is done to prevent the system from attempting to install updates while the computer is in a protected state. If Deep Freeze is configured to control the Windows Update process this will occur if the computer is thawed or if the computer is frozen.

Workaround

Enabling the Windows Update Services in the Services Control Panel will allow the Windows Store to install applications while the machine is in the thawed state. If access to the Windows Store is required while the system is protected the option to control the Windows Update process will need to be disabled in the Deep Freeze configuration.

Windows Update Service and Deep Freeze

$
0
0
In Deep Freeze 8.35 and higher a change in behaviours was introduced to better allow for the control of the Windows Update process on protected machines. Due to this change machines running Deep Freeze may see the Windows Update Service and the Background Intelligent Transfer Service (BITS) disabled while Deep Freeze is installed.

This will impact the ability to run updates on client systems manually as these services are required for the update process to run. To allow for updates to be manually installed the Windows Update and BITS services must be enabled prior to starting the update process.

To start these services users can open the Services control panel applet by running the SERVICES.MSC command from a elevated command prompt and changing the Status of the services to Manual and then right clicking on those services to start them.

Alternatively the following commands can be run from an elevated command prompt;

SC CONFIG bits START=auto
SC START bits
SC CONFIG wuauserv START=auto
SC START wuauserv

Compatibility with Deep Freeze & Dell Data Protection

$
0
0
Customers attempting to install Deep Freeze on systems configured with Dell Data Protection Disk Encryption enabled may encounter issues with systems being unable to properly boot after the install process. This occurs due to a conflict between the encryption package and the Deep Freeze software. To resolve this the exceptions outlined in the document below must be configured in the Dell Data Protection management console.

Problems installing Deep Freeze Configuration Administrator on 32...

$
0
0
Customers may have difficulties installing updated versions of the Deep Freeze Enterprise Console on servers running 32bit versions of Windows Server 2008 or Windows Vista.

During the install process systems running the 32bit version of Windows Server 2008 and Windows Vista will attempt to launch the utility to embed the customers customization code on the client machines. This process will fail, resulting in an enterprise console and configuration administrator that is not functional.

At this time Faronics recommends moving the Configuration Administrator and Enterprise Console to a 64bit operating system to address this issue.

Deep Freeze Mac and OWC Aura SSD Devices

$
0
0
Attempting to install Deep Freeze Mac on SSD devices manufactured by Other World Computing results in machines that cannot be configured in a way that allows the internal device to be frozen.

This stems from the OWC devices identifying themselves as an external device, and Deep Freeze Mac does not support use on a disk device that reports as a external device.

Problems with BootCamp on NVME equipped Apple Hardware when runni...

$
0
0

Faronics is aware of an issue impacting customers running Apple Hardware who run Windows on the Apple hardware using BootCamp. On systems configured with an NVME based SSD the operating system will fail to boot once Deep Freeze is installed. This issue appears to only affect systems running Apple OEM NVME SSD disks.


Running macOS High Sierra without the APFS file system.

$
0
0

As of macOS 10.13 Apple systems running Solid State disks are, by default, being converted to use an updated file system called APFS on the boot disk. Deep Freeze does not support installation on a APFS based system and cannot be used on systems that have been upgraded to macOS High Sierra and converted to APFS at this time.

While Faronics does intend to support AFPS in a future release of the Deep Freeze product we at this time cannot provide a timeframe for support. For customers who wish to upgrade to High Sierra, and run Deep Freeze this document will detail a process for performing the macOS upgrade and suppressing the conversion of the file system to APFS

It is important to note that while converting to APFS is the default during the High Sierra install process not all machines are converted during the upgrade. Systems running a magnetic disk, or systems configured as a Fusion Drive are not automatically converted and continue to use the existing HPFS+ based file system on the boot volumes.

The attached document will detail the process of installing High Sierra and suppressing the conversion of the system to APFS in order to continue to be able to use Deep Freeze on the client system without interruption.

If the client system has already updated to High Sierra and has converted to APFS the only way to revert this setting will require a reformat of the disk and a reinstall of the operating system.

How do I move my Deep Freeze Enterprise Console to another machin...

$
0
0
You've been visited by some generous technology elves and now have a new server setup.  The process for migrating your existing Deep Freeze Enterprise Console to the new server will depend on what method your workstations use to connect to the Enterprise Console.

If your workstations are configured to use LAN mode under the 'Advanced Options':
  1. Install the Deep Freeze Enterprise software on the new server with the same customization code (recall this code is an unrecoverable encryption key set by your organization at the time of install).
  2. Shutdown the old Deep Freeze console and close down the network connections. This will force the machines to check into the new server (a reboot of the workstation may be needed).
If your workstations are configured to use LAN/WAN mode under the 'Advanced Options' with a hostname or IP address configured:

  1. Install the Deep Freeze Enterprise software on the new server with the same customization code (recall this code is an unrecoverable encryption key set by your organization at the time of install).
  2. Open the Deep Freeze Administrator on the current server.
  3. Open the most recently deployed Deep Freeze workstation installation or configuration (.rdx) file.
  4. Under the 'Advanced Options' tab, modify the 'Console IP' value where the machines report into.
  5. Hit 'Save As' to create a new configuration file. Name it so it is easily recognized without opening the file (depfrz-<today's date>-new server.rdx as an example).
  6. When you are ready to cut the machines over, open the Deep Freeze Enterprise console.
  7. Select the machines you wish to move to the new server, and right click on the group. Select 'Update configuration'.
  8. Once the configuration has been applied successfully, reboot to apply the network change when the machines are available to do so.
  9. The machines should now begin to report into the new console (There will still be entries for the workstations in the old console, but they will have an '!' in front indicating a lack of communication).
Optional - Reconnecting your Deep Freeze Enterprise Console to the Cloud Connector

Once you have the machines reporting to your Deep Freeze console, you'll need to connect the Enterprise Console to the cloud. Ensure your old console is no longer connected to Deep Freeze Cloud before you connect the newly installed Enterprise Console.
  1. Hit the cloud button in the new console (this only appears if you have a license key applied), at which point you'll need to enter your customization code, and cloud credentials.
  2. When you connect the to the Deep Freeze Cloud, you'll be prompted to create a new site, or connect to an existing one. Select your existing site from the list.  A new site will not display any of your existing policies, or deployed Cloud Agents, even if it has a similar name.
Please note, as of version 8.5, we no longer support running the console on Windows Server 2003/R2, and 2008.  Windows Server 2008 R2 or higher are supported.

Why can't I see my workstations in the Deep Freeze Enterprise Con...

$
0
0
Workstations failing to display in the console can have a number of underlying causes.  This document outlines a basic troubleshooting step by step you can use to self-diagnose the cause.  If at any point, you are unclear of what to do next, please contact Faronics Technical Support for further assistance.  

1)Deep Freeze Client Service Timeout

The DFServ service will stop attempting to attempting to contact the management Console after approximately 2 hours if it's unable to reach the background service.  Start by rebooting the machine when you are able to confirm the Deep Freeze Enterprise Console is up and running on the network.  


2)Network Communication Issues

a)Windows clients may have the firewall turned on 

Deep Freeze could require either TCP or UDP protocols; either the firewall can be turned off, or an exception should be added for each protocol type for the Deep Freeze communication port being used (default is 7725). In Windows Vista or higher, it may be necessary to set outbound port exceptions if there are outbound restrictions set in the firewall. 

Note, that Windows updates can enable the firewall even when it was previously disabled.  Both inbound and outbound exceptions can be set under the firewall 'Advanced Settings' in Windows Vista and higher.

b)The Console and clients do not have the correct network settings


Login to the Deep Freeze client, and check the network tab.  

i)Confirm that the client and console are using the same port number.  This port must be available on the Deep Freeze Enterprise Console under 'Tools>Network Configuration'. 
ii)Confirm what communication mode is configured on the client itself:  LAN vs LAN/WAN

LAN mode broadcasts on the configured Deep Freeze port within the local subnet to find what IP address the console has.  There are many things that might block this type of communication: firewalls, logical segmentation of the network (VLANs) to name a few reasons.  If you are configured for LAN mode, switch a machine to use LAN/WAN mode by:
  • Selecting WAN mode radial button
  • Fill in the hostname or IP address of the console 
  • Hit 'Apply and Restart' once completed to apply the changes
c)Something on the network is blocking the communication between the Console and the clients

Try to connect to the Deep Freeze Console by using the built-in Windows Telnet client. This is installed by default in Windows XP, but will needs to be added through 'Programs and Features>Turn Windows features on or off' in Windows Vista and higher.  Please note, the command requires elevated privileges in Windows Vista and higher.
  • Click on the start menu
  • Type 'cmd' in the search bar
  • Right click on 'Command Prompt' to find the 'Run as Administrator' option and select it
In the Command Prompt window, type:

Telnet <IP or Hostname of Console Machine from the 'Network' tab in Deep Freeze> 7725
Note: 7725 is the default port, but please make the appropriate substitution if you're using an alternate port number

If it connects properly, you will see a random splash of ASCII characters since the communication is encrypted.  If you are unable to connect, you will need to verify things on the Deep Freeze Enterprise server.


3)Deep Freeze Enterprise Server Service Issues

a)Verify the port exists on the console

The port is configured in the Deep Freeze Enterprise Console under the 'Tools>Network Configuration' menu.  Verify the port your client is attempting to connect to is configured in the Deep Freeze Console.

b)The Deep Freeze Console is unable to connect to the background service

This is indicated by a lack of polar bear icon in the console.  You will see a polar bear with C beside 'localhost:7725' if there are no connection issues. If this is an icon of two computer monitors:
  • Go under the 'Tools' menu, and enter the 'Network Configuration'
  • Uncheck 'Enable Local Service' and select 'Ok'
  • Once more, enter the 'Tools>Network Configuration' dialog
  • Check the option to 'Enable the local service' and select 'Ok'
The service will restart.  You can determine success or failure if the icon changes to the familiar Polar Bear with a small red 'C' in the bottom left corner within 30-60 seconds.  If it still persists, something is preventing the service from communicating on the port you are using.  Typically, this is a port conflict.  You can test by:
  • Search 'cmd' in the search bar, right click on 'Command Prompt' to find the 'Run as Administrator' option and select it
  • Run 'netstat -vonba > log.txt' to export the current list of ports in use on the system
  • Search the file for your Deep Freeze port (ex. 7725) 
  • If any other programs aside from 'DFConsole.exe', or 'DFServerservice.exe' are using this port, there is a conflict and will prevent correct Deep Freeze Console functions

4)Verify the Customization Code Matches Between the Client and Server

What is the customization code and why is it important?
https://faronics.kayako.com/Knowledgebase/Article/View/4/0/what-is-the-customization-code-and-why-is-it-important

How do I test if I have the right Customization Code?
https://faronics.kayako.com/Knowledgebase/Article/View/187/0/how-do-i-test-if-i-have-the-right-customization-code

When upgrading to certain versions of Deep Freeze, you may be prompted to re-enter your customization code.  Additionally, in some rare instances, if the Deep Freeze Console or Administrator applications were still running in memory when Deep Freeze was re-initialized, they may be configured with different codes.  You can test this by:

  • On the client, hold the 'Shift' key and double click on the Polar Bear icon (alternatively you can use the hotkey combination of Ctrl-Alt-Shift-F6)
  • On lower left side of the the login screen, the OTP token will be listed - note down this token number (XXXXXXXX:XXXXXXXX)
  • There will be options to generate a temporary access password based off this provided token using either the Deep Freeze Enterprise Console or Administrator
    • In the Deep Freeze Console, go to 'Tools>One Time Passwords'
    • In the Deep Freeze Configuration Administrator, go to 'File>One Time Passwords'
  • Enter the token provided into the dialog box, and press the button to 'Generate Password' 
  • Note the provided password and attempt to login to the Deep Freeze workstation
If the Customization Code matches between the client and server, this will allow you to access Deep Freeze controls.  Otherwise, the password space will blank itself and you will be forced to re-enter a password.  If this fails, the steps below will allow you to reset the Customization Code on the Console/Server only:
 
  • Close all Deep Freeze management applications (ensure the network services are shut down): Deep Freeze Enterprise Console (DFConsole.exe), Configuration Administrator (DFAdmin.exe), and the Console Communication Service (Dfserverservice.exe).  Double check they are not running using Windows Task Manager (taskmgr.exe) by checking under 'Processes' or 'Details'
  • Run the following utility to initialize all Deep Freeze components with the appropriate Customization Code:
    • "C:\Program Files\Faronics\Deep Freeze Enterprise\DFInit.exe"   (32-bit)
    • "C:\Program Files (x86)\Faronics\Deep Freeze Enterprise\DFInit.exe"  (64-bit)

This should give you some points to check on.  If you are unable to resolve the issue, please contact Faronics Technical Support for further assistance.  

Deep Freeze: Using PowerShell with DF Console Custom Actions

$
0
0

Overview
This document details the process of creating a Custom Action in Deep Freeze Enterprise Console using Windows PowerShell scripting technology


Introduction
A Deep Freeze Action File is an XML file that allows end users to define additional functionality in the Deep Freeze Enterprise Console. An Action File defines a method for calling an external command or program file and passing some workstation-specific information (e.g. machine IP addresses, computer names).

This document describes an example of using PowerShell script to initiate a remote command or run a process remotely on selected workstation(s) using Deep Freeze Enterprise Console.  It is assumed the user has some knowledge of PowerShell scripting, XML language, as well as Deep Freeze Custom Action XML syntax. For more information about Custom Action scripting please refer to Deep Freeze user’s guide and Technical Papers.


Configuring the environment and testing PowerShell script
To be able to use Windows PowerShell remote commands, PowerShell must be installed on the target Windows workstations and enabled. Recent Windows OS already have PowerShell installed, but those systems still may be shipped in a locked down configuration, where PowerShell is disabled.

The easiest way to enable Windows PowerShell remoting is to use the Enable-PSRemoting cmdlet on target workstation. To do this, launch Windows PowerShell with Admin rights and run following command:

PS C:\> Enable-PSRemoting -Force

This enables Windows Remoting service (WinRM) and configures the Windows Firewall so that it can accept incoming commands within same Domain. Mixed Domain environments require some additional configuration to get remote execution working, which is not in the scope of this document.


Testing PowerShell script
Before implementing PowerShell script as a Custom Action, it is a good practice to run the script on its own to insure it works correctly. In that case it makes it easier troubleshoot the script.

For the purpose of this document we will use a “Invoke-Command” which runs a script remotely. It has following syntax:

Invoke-Command -computername [COMPUTER] -ScriptBlock { [COMMAND] }

where [COMPUTER] is the target workstation Computer name, and [COMMAND] is the series of PoweShell commands.

In order to run PowerShell command without initiating PowerShell session we will use following command:

powershell -Command "& { <list of PowerShell commands> ;}"

In a following example it shows a command which uses PowerShell script for running IpConfig remotely against the target workstation with the name "Workstation1":

powershell -Command "& {Invoke-Command -computername Workstation1} -ScriptBlock {ipconfig /all; Start-Sleep -s 10};}"

This command can be launched from Windows Command Prompt window and will bring up a full IPConfig report for the target workstation and keep the Command Prompt window open for 10 seconds.

Implementing Custom Action for running a remote command
Once the above script has been successfully tested, it now can be embedded into Custom Action inside <EXECUTE> tag, where computer name will be parameterized with %%WKSNAME%% parameter, which is contextual to the selected workstation. Upon launching Custom Action Deep Freeze Console will build the actual command by replacing %%WKSNAME%% parameter with the currently selected workstation name:

<EXECUTE>powershell -Command & "{Invoke-Command -computername %%WKSNAME%% -ScriptBlock {ipconfig /all; Start-Sleep -s 10};}"</EXECUTE>

Some other Custom Action properties tags can be implemented accordingly to the user's requirements. Following is the complete Custom Action XML code:

<ACTION#>

    <CAPTION>

       <ENGLISH>Get ipconfig info</ENGLISH>

       <GERMAN>Get ipconfig info</GERMAN>

       <JAPANESE>Get ipconfig info</JAPANESE>

       <SPANISH>Get ipconfig info</SPANISH>

       <FRENCH>Get ipconfig info</FRENCH>

       <CHINESE>Get ipconfig info</CHINESE>

       <PORTUGUESE>Get ipconfig info</PORTUGUESE>

    </CAPTION>

    <FILEMENU>Y</FILEMENU>

    <POPUPMENU>Y</POPUPMENU>

           <SILENT>Y</SILENT>

    <SUBITEMS/>

    <PARAMS/>

    <SYNC/>

    <LOG/>

    <EXECUTE>powershell -Command &amp; &quot;{Invoke-Command -computername %%WKSNAME%% -ScriptBlock {ipconfig /all; Start-Sleep -s 10};}&quot;</EXECUTE>

    <WORKDIR>C:\Windows\system32\</WORKDIR>

</ACTION#>

This code snippet can be added into existing CustomActions.xml file, where <ACTION#> tag must be edited with actual number of action as it would show in Console Custom Action menus.

Note: in XML code some of the special characters must be replaced with character entities, as seen in above code sample.

In order the newly created Custom Action take effect, the Deep Freeze Console must be restarted.


Implementing Custom Action which prompts user to enter a remote command
In previous example we have created a specific custom action for running IPCconfig. This way user can create an unlimited number of predefined Custom Actions for each specific command as per user requirements.

However, it may give more flexibility, if the Custom Action would prompt the user to enter a command or program to be run on selected workstation. In order to achieve this, the command must parameterized inside the XML file similarly to workstation name described above.

In the below XML code sample we have reworked the previous PowerShell command, which now remotely runs cmd command, which in its turn launches any command, script or executable represented by %CMD% parameter, entered by user.

<ACTION#>
<CAPTION>

<ENGLISH>Push remote command using Powershell</ENGLISH>
<G
ERMAN>Push remote command using Powershell</GERMAN>
<JAPANESE>Push remote command using Powershell</JAPANESE>
<SPANISH>Push remote command using Powershell</SPANISH>
<FRENCH>Push remote command using Powershell</FRENCH>
<CHINESE>Push remote command using Powershell</CHINESE>
<PORTUGUESE>Push remote command using Powershell</PORTUGUESE>
</CAPTION>
<FILEMENU>Y</FILEMENU>

<POPUPMENU>Y</POPUPMENU>
<SILENT>Y</SILENT>
<SUBITEMS/>
<PARAMS>
<CMD>
<VAR>%CMD%</VAR>
<CAPTION>
<ENGLISH>Command</ENGLISH>
<GERMAN>Befehl</GERMAN>
<JAPANESE>ƒRƒ}ƒ“ƒh</JAPANESE>
<SPANISH>Comando</SPANISH>
<FRENCH>Commande</FRENCH>
<CHINESE>ÃüÁî</CHINESE>
<PORTUGUESE>Comando</PORTUGUESE>
</CAPTION>
</CMD>
</PARAMS>

<SYNC>N</SYNC>
<LOG/>
<EXECUTE>powershell -Command &quot;&amp; {Invoke-Command -computername %%WKSNAME%% -ScriptBlock {cmd /c %CMD%}&quot;</EXECUTE>
<WORKDIR>C:\Windows\system32\</WORKDIR>
</ACTION#>

Installation errror #01020000 when installing on Windows 10 Fall ...

$
0
0
When attempting to install Deep Freeze Enterprise 8.38 or earlier and Deep Freeze Standard 8.37 or earlier on a computer running Windows 10 Fall Creators build (1709) users may encounter a error indicating;

#01020000
Deep Freeze Enterprise could not be installed.  The system will be restarted.

This issue has been resolved with a updated version of Deep Freeze.
Customers should download version 8.51 or higher of Deep Freeze Enterprise, or 8.38 of Deep Freeze Standard to resolve this issue. The latest version of Deep Freeze can be downloaded from Faronics Labs for our North American customers. International customers can download from the Faronics Customer Center.

Problems with systems running macOS not booting after installing ...

$
0
0
During the installation of software updates some instances have been noted where the system in question is unable to boot and will show a screen with a prohibited sign after installing Apple Software updates. In some cases we are seeing systems having the boot volume converted to a Core Storage Volume after the installation of Apple Software Updates. On systems running Deep Freeze this results in the system being unable to boot as Deep Freeze cannot properly access or control Core Storage Volumes.

To resolve this issue;
  1. Shut down the machine completely.
  2. Boot the computer from the recovery partition by holding down COMMAND-R at boot time.
  3. After booting open the terminal by selecting the appropriate option from the utilities menu.
  4. Run the following command in the terminal;

    diskutil cs list

    In the output from the command you should see a line indicating;

    Logical Volume xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxx

    Note down this long string of letters and numbers on your system
  5. Run the following command to revert the Core Storage Volume.

    diskutil cs revert xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxx

    Replacing the "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxx" with the combination of letters and numbers that you saw in step three.
  6. Reboot the system.

If you do not see an entry for your Logical Volume or you see the message "No Core Storage Logical Volume Groups Found" then the issue affecting your machine is likely unrelated to this issue and you will need to contact Faronics support to investigate further.

Workstations running Deep Freeze Enterprise and McAfee’s Endpoint...

$
0
0

Problem

Systems running Deep Freeze and McAffe Endpoint Security or Virus Scan will fail to communicate with the ePolicy Orchestrator server resulting in systems not properly updating virus definitions.

To help mitigate against replay attacks against the ePO Server the McAfee Agent and ePO Server maintain a sequence number that incremented each time that a client checks in with the ePO Server. In the event that a client checks in with a lower than expected sequence number the ePO Serer will reject the communication with the client machine resulting in the errors described above.

On the server’s side an error log similar to the following will be shown in the agent_%computername%.log file;

2009-11-12 11:57:34        I       #1492        naInet        Reading acknowledgement from ePO Server
2009-11-12 11:57:34        I       #1492        naInet        Received response [] from ePO Server
2009-11-12 11:57:34        I       #1492        naihttp       Failed to get acknowledgement from Server
2009-11-12 11:57:34        E       #1492        imsite        Error trace:
2009-11-12 11:57:34        E       #1492        imsite        [uploadFile,,/spipe/pkg?AgentGuid={91EEA947-D3FB-4CC2-AEC7-05D15CDB5C6A}Source=Agent_3.0.0,pkg00129024970542750000_12124.spkg,C:\Documents and Settings\All Users\Administrator\McAfee\Common Framework\Unpack,C:\Documents and Settings\All Users\Administrator\McAfee\Common Framework\Unpack\pkg00129024970544780000_2913.spkg]->
2009-11-12 11:57:34        E       #1492        imsite         NaInet library returned code == -14

Solution
To prevent this from occurring the sequence checking feature of the ePO server will need to be disabled. This is done by editing the SERVER.INI file (located in C:\Program Files\McAfee\ePolicy Orchestrator\DB by default)  on the ePO Server to include the following entry;

ConnectionsRequireValidSequenceNumber=0

In some cases, administrators may need to take additional steps to address this issue on machines impacted by the issue by resetting the McAfee Agent GUID used to identify the systems affected. This can be done my removing the following registry keys from the system;

32-Bit:  [HKEY_LOCAL_MACHINE\SOFTWARE\Network Associates\ePolicy Orchestrator\Agent\]
64-Bit:  [HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Network Associates\ePolicy Orchestrator\Agent\]

After removing these registry keys the McAfee Framework Service will need to be restarted, or the system will need to be rebooted.

Documentation on this issue can be found on the McAfee Website at the URL’s below;

Sequence number invalid (computers running McAfee Agent fail to connect to the ePolicy Orchestrator server)

https://kc.mcafee.com/corporate/index?page=content&id=KB60776

 

How to reset the McAfee Agent GUID if computers are not displayed in the ePolicy Orchestrator directory

https://kc.mcafee.com/corporate/index?page=content&id=KB56086

 


Updating McAfee Endpoint Security during Deep Freeze Maintenance

$
0
0

Overview

This document will detail the recommended practice for configuring a McAfee Endpoint Security to update properly when Deep Freeze is protecting a workstation.

Introduction


Deep Freeze provides administrators with a way to protect workstations from changes by rolling back any change made to the computer at reboot. Deep Freeze does not make any distinction between changes that are malicious, or changes that are desired on a workstation and this can pose some challenges in managing 3rd party products that require updates to occur on a periodic basis.

The most common interaction that we find on customers workstations is between antivirus software and Deep Freeze. Antivirus software by design requires periodic updates to maintain it’s effectiveness on a client workstation, and problems may arise unless steps are taken to ensure that the antivirus software can perform updates in a timely manner.

Scheduled are used to configure the antivirus software to update in a time frame where Deep Freeze will not be protecting the workstations. This has the advantage of being one of the less difficult methods to configure but does require that the workstations have a period of time where they will not be used and can be configured to update automatically.

Configuring McAfee Endpoint Security to update with Deep Freeze

McAfee Endpoint Security supports the use of a command line function that can be used to trigger antivirus updates when the workstations enter into maintenance mode. To configure Deep Freeze to trigger McAfee Endpoint Security to update when maintenance mode starts follow the process below:

Deep Freeze 8.x or Higher

  1. Open the Deep Freeze Configuration Administrator.
  2. Configure your Deep Freeze install package as per your normal requirements, including passwords and other settings that may be required.
  3. Click on the Workstation Tasks tab.
  4. Select Batch File in the Task Type drop down and click Add.
  5. Name the event “McAfee Antivirus” in the Name field.
  6. Select the frequency for the updates to occur in the Day drop down and set the start and end time for the event.
  7. The options “Allow User to Cancel Event”, “Shutdown after Maintenance”, and “Disable Keyboard and Mouse” can be enabled if desired.
  8. Click on the Batch File tab.
  9. Enter the following in the Batch File Contents field on the tab:

    @ECHO OFF
    IF EXIST "C:\Program Files\McAfee\Endpoint Security\Threat Prevention\amcfg.exe" "C:\Program Files\McAfee\Endpoint Security\Threat Prevention\amcfg.exe" /UPDATE
    IF EXIST "C:\Program Files (x86)\McAfee\Endpoint Security\Threat Prevention\amcfg.exe" "C:\Program Files (x86)\Endpoint Security\Threat Prevention\amcfg.exe" /UPDATE

  10. Click on the “Create” button on the toolbar and save the Workstation Install Program in a location that you will remember.
  11. Install the updated workstation install file on your workstations.

 

Deep Freeze Certificate of Networthiness (CoN)

$
0
0
This KB article contains a copy of the Certificate of Networthiness (CoN) for Deep Freeze 8.x.

Customers may have issues with workstation seeds when upgrading t...

$
0
0
Problem
In some cases customers may see workstations stop communicating with the Enterprise Console after upgrading to Deep Freeze 8.53 if they have only the Deep Freeze Seed installed on the client system.

Workaround
Customers should manually update workstations that are only running the Deep Freeze Seed to 8.53.
Viewing all 118 articles
Browse latest View live