Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to www.eventid.net. The EventId.Net for Splunk Add-on assumes that Splunk is collecting information from Windows servers and workstation via the Splunk Universal Forwarder.
Create Log File Error!
|English: Request a translation of the event description in plain English.|
According to Symantec document id 2007111411152348, the Symantec Endpoint Protection Manager uses Radius communication and requires port 1812 to be available for the Enforcer (see References below). If a Radius Server is already installed it may be using the same port and is causing this problem. Other installed software may also be using this port.
Change the port the Endpoint Protection Manager uses
Navigate to C:\Program Files\Symantec\Symantec Endpoint Protection Manager\tomcat\etc
Open the conf.properties file
Add a line at the bottom that reads:
where xxxx is the desired port number
Save and close the conf.properties file
Restart the IIS Admin Service
Click Start > Run
Type services.msc and click OK
Right-click on IIS Admin Service and click Restart
Run the Management Server Configuration Wizard
Click Start > All Programs > Symantec Endpoint Protection Manager > Management Server Configuration Wizard
Change the port the existing Radius Server (or other third party software) is using
Install the Symantec Endpoint Protection Manager on a different computer where port 1812 is not in use.
|Private comment: Subscribers only. See example of private comment|
|Links: ME953230, Symantec document id 2007111411152348|
|Search: Google - Bing - Microsoft - Yahoo - EventID.Net Queue (0) - More links...|
|Custom search for *****: Google - Bing - Microsoft - Yahoo|
Send comments or solutions
- Notify me when updated