So my question is: How can I force the SEPM to send down a policy that disables (unchecks) the Tamper Protect box? I know that I can switch to server control mode for a couple hours and the setting will be sent down to all online clients.but that seems like a kludgy way to do things and only gets the online clients. Tamper Protection blocks modifications to Symantec Endpoint Protection registry settings, files, and prevents tampering with running processes on Windows clients. The problem is this, we run in "Mixed Mode" and every time a new client comes out (MP2 in this case) and is pushed down from our SEPM, Tamper Protect gets re-enabled or if it's a new install, tamper protect is enable by default. Tamper Protection is a key technology that protects Symantec Endpoint Protection processes and resources from any attempts of alteration or disabling. Tamper Protect seems to conflict with our two factor authentication software and unfortunately.upgrading the two factor software is not an option. We have an issue with SEP (and SAV for that matter) assisting in a BSOD with a stop 50 error if "Tamper Protect" is enabled when a machine is rebooted.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |