setup_kes.exe /pEULA=1 /pPRIVACYPOLICY=1 /pKSN=0 /pSKIPPRODUCTCHECK=1 /pSKIPPRODUCTUNINSTALL=1
setup.exe /pEULA=1 /pKSN=0 /pSKIPPRODUCTCHECK=1 /pSKIPPRODUCTUNINSTALL=1
43588000
bahri 668
693 ameri
690 safashad
659 hossein
696 behzad
panahdoost 664
691 dinvari
659 sarafraz
Change KSC Default :
1- Endpoint password (from interface)
2- Both KSN be ok
3- File Threat —> All files
4- File Threat —>Performance —> Medium Scan
5- Local Tasks —> Removable Driver Scan—> Quick Scan
……………………………………………………….
Trace
If the plugins, installation packages, and product versions match on the end devices, I will need product traces.
On the problematic KSC server, collect data according to the following scenario:
1) Enable the Administration Server trace recording using the trace_server-4 archive.zip
https://support.kaspersky.com/ksc/15.1/diagnostics/15025#block3
2) Enable recording the traces of the update download task in the KSC server storage using the archive trace_nagent-4.zip
3) Start the update download task and wait for the error.
4) Disable the collection of all traces and collect them.
5) Export task completion events – https://support.kaspersky.com/ksc15/295928
6) Collect the latest GSI report from the administration server under investigation – https://support.kaspersky.com/common/diagnostics/3632#block1
Collect the received data into a single archive and send it to me for analysis.
server upgrade
- backup
- upgrade ksc
- create package (net agent & kes)
- upgrade agent (task)
- upgrade kes (task)
- policy license agreement (tak be tak)
- baraye V zire 12 kes pak & restart & install kes (pass kladmin morede niaz)
change server (ba ip ghabli)
- backup (az ghabli)
- install sql
- install ksc
- restore backup
- install plugins
- set kardane ip ghabli rooye server
change server (taghire ip)
- backup (az ghabli)
- change administration server (task)
- sakhte accounte admin dar hame systemha
- task klmover (tike agent ra barmidarim)
- install sql
- install ksc
- restore backup
- install plugins