SlideShare a Scribd company logo
1 of 6
Knowledge Base Article
Page 1 of 6
Created On: 28-Oct-2013
Author: Eric Roberson
Title
Computers running McAfee Antivirus (beta) become unresponsive during
startup
Description of Issue
 Computers running McAfee Antivirus hang or freeze when starting up
or while logging onto the network.
 Information in this solution applies only to pilot/test computers for
McAfee Antivirus (beta).
Description of Resolution
This solution contains several parts. Follow each section carefully. The
variable {computername} refers to the remote or target computer.
PREREQUISITE: Recover an unresponsive computer
This section must be performed locally on the remote computer. Consider
connecting to the remote computer using Remote Desktop Protocol (RDP.)
1. If the computer hangs during startup, press CTRL + ALT + END to
start task manager.
2. Click the Processes Tab, then click Image Name to sort the list of
running processes.
3. Click the MfeFFCore.exe process, then click End Process.
4. The computer will log on successfully after stopping the MfeFFCore.exe
process.
PART 1: Copy necessary files to remote computer
Parts one, two, and three may be performed remotely without user
intervention. Before completing these sections, go to Part 4: Confirm
Functionality to determine whether these steps are necessary.
1. On the target computer, check for
{computername}c$windowssystem32psexec.exe. If necessary,
copy EDCAPP25MMQT$PSEXEC.EXE to
{computername}c$windowssystem32.
2. Open a command using an account with elevated privileges (eg.
A_UserID). Type net use ohcfs01groups * /u:lyb{user_ID},
Knowledge Base Article
Page 2 of 6
then press Enter. When prompted, enter the password for a regular
user ID.
3. Type Copy ohcfs01groupseveryonesleep.exe
{computername}C$Batch.
4. Type Copy ohcfs01groupseveryoneframepkg.exe
{computername}C$Batch.
5. Type Net use ohcfs01groups /d. Press the letter ‘Y’ to
disconnect when prompted. Continue to Part 2: Apply the Soulution.
PART 2: Apply the solution
1. Open a command using an account with elevated privileges (eg.
A_UserID). Type psexec –s –h {computername} cmd.exe.
2. Type hostname to verify connectivity to the remote computer.
3. Type c:batchframepkg.exe /forceuninstall, then press Enter.
Wait for the command to complete, which may take five minutes or
longer.
4. Type SET TEMP=C:BATCH, then press Enter.
Knowledge Base Article
Page 3 of 6
NOTE: The command line SET TEMP=C:BATCH is case sensitive.
Please use All CAPS.
5. Type C:BatchFramePkg.exe /install=agent /forceinstall
/DataDir=C:Batch, then press Enter. Wait for the command to
complete, which may take ten minutes or longer.
NOTE: This command line is case sensitive. Be sure to use correct
upper and lower case letters.
Knowledge Base Article
Page 4 of 6
6. Restart the computer. Type shutdown /r /f /t 600 /c “Save your
work! Restarting computer in 10 minutes to complete antivirus
agent installation.”
7. Type ping -4 {computername} –t –w 15000. Continue to Part 3
once a ping response is received.
PART 3: Retrieve updated policy
Retrieve the updated policy so new encryption keys are copied and files are
decrypted on the remote computer.
1. Open a command using an account with elevated privileges (eg.
A_UserID). Type psexec –s –h {computername} cmd.exe.
2. Type hostname to verify connectivity to the remote computer.
3. Type CDProgram FilesMcAfeeCommon Framework, then press
Enter.
4. Type each of the following commands, waiting 60 seconds between
typing each command:
 CmdAgent.exe /C
 CmdAgent.exe /E
 CmdAgent.exe /P
5. Restart the computer. Type shutdown /r /f /t 600 /c “Save your
work! Restarting computer in 10 minutes to complete antivirus
agent installation.”
PART 4: Confirm functionality
Confirm necessary decryption keys are present and files are being decrypted.
1. Connect to the remote computer using RDP.
2. Browse to the folder C:Program FilesMcAfeeEndpoint
Encryption for Files and Folders. Double click MfeFFConsole.exe.
3. Click the Status Report button at the top left, then expand Available
Keys in the column on the right.
Knowledge Base Article
Page 5 of 6
4. If both encryption keys appear, then the solution has been applied
successfully and the new policy is in effect.
5. To check for files waiting to be decrypted, open Windows Explorer.
Right click the C: drive, then click McAfee Endpoint Encryption >
Search Encrypted.
6. Click the Search button at the top right. If no encrypted files are
found, then the solution has been applied successfully and the new
policy is in effect. Also consider checking the following directories for
encrypted files:
 C:localdocs (both Win XP and Win 7)
 C:ProgramData (Win 7 only)
 C:Documents and SettingsAll UsersApplication Data (Win XP
Only)
Knowledge Base Article
Page 6 of 6
NOTE: Please allow enough time for the decryption process after
applying Steps two and three above.
Additional Information
For additional support, contact the End User Computing or Information
Technology Foundation teams.
Revision History
Revision Number Date Editor Summary of revision
0.1 28-Oct-2013 Eric Roberson First Draft
1.0 28-Oct-2013 Eric Roberson Technical Edit
Tags
McAfee Endpoint Encryption, Decrypt, Decryption, Encrypt, Encryption,
Antivirus

More Related Content

What's hot

Get rid of windows secure workshop virus
Get rid of windows secure workshop virusGet rid of windows secure workshop virus
Get rid of windows secure workshop virusFixPCyourself
 
Delete infomash.com browser redirect virus
Delete infomash.com browser redirect virusDelete infomash.com browser redirect virus
Delete infomash.com browser redirect virusFixPCyourself
 
Crackle.com redirect virus removal help
Crackle.com redirect virus removal helpCrackle.com redirect virus removal help
Crackle.com redirect virus removal helpFixPCyourself
 
File recovery virus removal guide
File recovery virus removal guideFile recovery virus removal guide
File recovery virus removal guideFixPCyourself
 
Cridex trojan removal guide
Cridex trojan removal guideCridex trojan removal guide
Cridex trojan removal guideFixPCyourself
 
Bifrost trojan or bifrose virus removal help
Bifrost trojan or bifrose virus removal helpBifrost trojan or bifrose virus removal help
Bifrost trojan or bifrose virus removal helpFixPCyourself
 
How to get rid of polizia postale e delle virus
How to get rid of polizia postale e delle virusHow to get rid of polizia postale e delle virus
How to get rid of polizia postale e delle virusFixPCyourself
 
Guide to remove infomoneyservice.com redirect virus
Guide to remove infomoneyservice.com redirect virusGuide to remove infomoneyservice.com redirect virus
Guide to remove infomoneyservice.com redirect virusFixPCyourself
 
Delete runclips.com browser hijacker
Delete runclips.com browser hijackerDelete runclips.com browser hijacker
Delete runclips.com browser hijackerFixPCyourself
 
How to get rid of windows web commander virus
How to get rid of windows web commander virusHow to get rid of windows web commander virus
How to get rid of windows web commander virusFixPCyourself
 
Isearch.claro search.com virus removal help
Isearch.claro search.com virus removal helpIsearch.claro search.com virus removal help
Isearch.claro search.com virus removal helpFixPCyourself
 
How to get rid of windows premium defender virus
How to get rid of windows premium defender virusHow to get rid of windows premium defender virus
How to get rid of windows premium defender virusFixPCyourself
 
How to get rid of microsoft security essentials alert virus
How to get rid of microsoft security essentials alert virusHow to get rid of microsoft security essentials alert virus
How to get rid of microsoft security essentials alert virusFixPCyourself
 
TEMS Intallation 8.0.3 Guide
TEMS Intallation 8.0.3 GuideTEMS Intallation 8.0.3 Guide
TEMS Intallation 8.0.3 GuideTempus Telcosys
 
How to get rid of windows control series
How to get rid of windows control seriesHow to get rid of windows control series
How to get rid of windows control seriesFixPCyourself
 
How to get rid of live security platinum 3.6.1
How to get rid of live security platinum 3.6.1How to get rid of live security platinum 3.6.1
How to get rid of live security platinum 3.6.1FixPCyourself
 
How to get rid of windows profound security virus
How to get rid of windows profound security virusHow to get rid of windows profound security virus
How to get rid of windows profound security virusFixPCyourself
 
How to get rid of xp antispyware 2013 virus
How to get rid of xp antispyware 2013 virusHow to get rid of xp antispyware 2013 virus
How to get rid of xp antispyware 2013 virusFixPCyourself
 
How to get rid of stop online piracy automatic protection system virus
How to get rid of stop online piracy automatic protection system virusHow to get rid of stop online piracy automatic protection system virus
How to get rid of stop online piracy automatic protection system virusFixPCyourself
 
How to get rid of xp internet security 2013 virus
How to get rid of xp internet security 2013 virusHow to get rid of xp internet security 2013 virus
How to get rid of xp internet security 2013 virusFixPCyourself
 

What's hot (20)

Get rid of windows secure workshop virus
Get rid of windows secure workshop virusGet rid of windows secure workshop virus
Get rid of windows secure workshop virus
 
Delete infomash.com browser redirect virus
Delete infomash.com browser redirect virusDelete infomash.com browser redirect virus
Delete infomash.com browser redirect virus
 
Crackle.com redirect virus removal help
Crackle.com redirect virus removal helpCrackle.com redirect virus removal help
Crackle.com redirect virus removal help
 
File recovery virus removal guide
File recovery virus removal guideFile recovery virus removal guide
File recovery virus removal guide
 
Cridex trojan removal guide
Cridex trojan removal guideCridex trojan removal guide
Cridex trojan removal guide
 
Bifrost trojan or bifrose virus removal help
Bifrost trojan or bifrose virus removal helpBifrost trojan or bifrose virus removal help
Bifrost trojan or bifrose virus removal help
 
How to get rid of polizia postale e delle virus
How to get rid of polizia postale e delle virusHow to get rid of polizia postale e delle virus
How to get rid of polizia postale e delle virus
 
Guide to remove infomoneyservice.com redirect virus
Guide to remove infomoneyservice.com redirect virusGuide to remove infomoneyservice.com redirect virus
Guide to remove infomoneyservice.com redirect virus
 
Delete runclips.com browser hijacker
Delete runclips.com browser hijackerDelete runclips.com browser hijacker
Delete runclips.com browser hijacker
 
How to get rid of windows web commander virus
How to get rid of windows web commander virusHow to get rid of windows web commander virus
How to get rid of windows web commander virus
 
Isearch.claro search.com virus removal help
Isearch.claro search.com virus removal helpIsearch.claro search.com virus removal help
Isearch.claro search.com virus removal help
 
How to get rid of windows premium defender virus
How to get rid of windows premium defender virusHow to get rid of windows premium defender virus
How to get rid of windows premium defender virus
 
How to get rid of microsoft security essentials alert virus
How to get rid of microsoft security essentials alert virusHow to get rid of microsoft security essentials alert virus
How to get rid of microsoft security essentials alert virus
 
TEMS Intallation 8.0.3 Guide
TEMS Intallation 8.0.3 GuideTEMS Intallation 8.0.3 Guide
TEMS Intallation 8.0.3 Guide
 
How to get rid of windows control series
How to get rid of windows control seriesHow to get rid of windows control series
How to get rid of windows control series
 
How to get rid of live security platinum 3.6.1
How to get rid of live security platinum 3.6.1How to get rid of live security platinum 3.6.1
How to get rid of live security platinum 3.6.1
 
How to get rid of windows profound security virus
How to get rid of windows profound security virusHow to get rid of windows profound security virus
How to get rid of windows profound security virus
 
How to get rid of xp antispyware 2013 virus
How to get rid of xp antispyware 2013 virusHow to get rid of xp antispyware 2013 virus
How to get rid of xp antispyware 2013 virus
 
How to get rid of stop online piracy automatic protection system virus
How to get rid of stop online piracy automatic protection system virusHow to get rid of stop online piracy automatic protection system virus
How to get rid of stop online piracy automatic protection system virus
 
How to get rid of xp internet security 2013 virus
How to get rid of xp internet security 2013 virusHow to get rid of xp internet security 2013 virus
How to get rid of xp internet security 2013 virus
 

Viewers also liked

The Etiological Spectrum of Acute Sensory Myelitis
The Etiological Spectrum of Acute Sensory MyelitisThe Etiological Spectrum of Acute Sensory Myelitis
The Etiological Spectrum of Acute Sensory MyelitisFatia Ramadhana
 
Greenough Group Company Overview 04.19.2015
Greenough Group Company Overview 04.19.2015Greenough Group Company Overview 04.19.2015
Greenough Group Company Overview 04.19.2015Ed Canty
 
THE ADDRESS : The Business of Extraordinary Living : Presented by Sotheby's :...
THE ADDRESS : The Business of Extraordinary Living : Presented by Sotheby's :...THE ADDRESS : The Business of Extraordinary Living : Presented by Sotheby's :...
THE ADDRESS : The Business of Extraordinary Living : Presented by Sotheby's :...Paula Story
 
ENG3305_Adv_Essay_Writing_gay_men_and_barebacking
ENG3305_Adv_Essay_Writing_gay_men_and_barebackingENG3305_Adv_Essay_Writing_gay_men_and_barebacking
ENG3305_Adv_Essay_Writing_gay_men_and_barebackingEric Roberson
 
Lập bản đồ tư duy - Nguyenngoquyen.com
Lập bản đồ tư duy - Nguyenngoquyen.comLập bản đồ tư duy - Nguyenngoquyen.com
Lập bản đồ tư duy - Nguyenngoquyen.comanhngoc890
 
Karlov_GIS_Mapping_Final (2)
Karlov_GIS_Mapping_Final (2)Karlov_GIS_Mapping_Final (2)
Karlov_GIS_Mapping_Final (2)Rachel Karlov
 
Shailendra Singh_Business_Analyst
Shailendra Singh_Business_AnalystShailendra Singh_Business_Analyst
Shailendra Singh_Business_AnalystShailendra Singh
 
How to Use Social Media
How to Use Social MediaHow to Use Social Media
How to Use Social MediaAlex Farncomb
 
College magazine analysis
College magazine analysisCollege magazine analysis
College magazine analysisRyanHalliday_
 
14185310 김다인
14185310 김다인14185310 김다인
14185310 김다인Epion Gi
 
Audience Research
Audience Research Audience Research
Audience Research JacobDMBird
 

Viewers also liked (20)

The Etiological Spectrum of Acute Sensory Myelitis
The Etiological Spectrum of Acute Sensory MyelitisThe Etiological Spectrum of Acute Sensory Myelitis
The Etiological Spectrum of Acute Sensory Myelitis
 
Natali
NataliNatali
Natali
 
Greenough Group Company Overview 04.19.2015
Greenough Group Company Overview 04.19.2015Greenough Group Company Overview 04.19.2015
Greenough Group Company Overview 04.19.2015
 
CreativEva
CreativEvaCreativEva
CreativEva
 
mens graphics
mens graphicsmens graphics
mens graphics
 
THE ADDRESS : The Business of Extraordinary Living : Presented by Sotheby's :...
THE ADDRESS : The Business of Extraordinary Living : Presented by Sotheby's :...THE ADDRESS : The Business of Extraordinary Living : Presented by Sotheby's :...
THE ADDRESS : The Business of Extraordinary Living : Presented by Sotheby's :...
 
ENG3305_Adv_Essay_Writing_gay_men_and_barebacking
ENG3305_Adv_Essay_Writing_gay_men_and_barebackingENG3305_Adv_Essay_Writing_gay_men_and_barebacking
ENG3305_Adv_Essay_Writing_gay_men_and_barebacking
 
Lập bản đồ tư duy - Nguyenngoquyen.com
Lập bản đồ tư duy - Nguyenngoquyen.comLập bản đồ tư duy - Nguyenngoquyen.com
Lập bản đồ tư duy - Nguyenngoquyen.com
 
Karlov_GIS_Mapping_Final (2)
Karlov_GIS_Mapping_Final (2)Karlov_GIS_Mapping_Final (2)
Karlov_GIS_Mapping_Final (2)
 
Certified QA QC Manager
Certified QA QC ManagerCertified QA QC Manager
Certified QA QC Manager
 
Shailendra Singh_Business_Analyst
Shailendra Singh_Business_AnalystShailendra Singh_Business_Analyst
Shailendra Singh_Business_Analyst
 
jh
jhjh
jh
 
How to Use Social Media
How to Use Social MediaHow to Use Social Media
How to Use Social Media
 
Shot list
Shot listShot list
Shot list
 
Eva
EvaEva
Eva
 
College magazine analysis
College magazine analysisCollege magazine analysis
College magazine analysis
 
14185310 김다인
14185310 김다인14185310 김다인
14185310 김다인
 
Audience Research
Audience Research Audience Research
Audience Research
 
Video worksheet
Video worksheetVideo worksheet
Video worksheet
 
PG Diploma in Piping Design Course
PG Diploma in Piping Design CoursePG Diploma in Piping Design Course
PG Diploma in Piping Design Course
 

Similar to McAfee_Causes_Computer_To_Hang

How To Make System Work Faster
How To Make System Work FasterHow To Make System Work Faster
How To Make System Work FasterGaurav bhatnagar
 
18IF004_CNS.docx
18IF004_CNS.docx18IF004_CNS.docx
18IF004_CNS.docxRajAmbere1
 
How_To_Manually_Reinstall_SCCM2012_Agent
How_To_Manually_Reinstall_SCCM2012_AgentHow_To_Manually_Reinstall_SCCM2012_Agent
How_To_Manually_Reinstall_SCCM2012_AgentEric Roberson
 
Privileges Escalation by Exploiting Client-Side Vulnerabilities Using Metasploit
Privileges Escalation by Exploiting Client-Side Vulnerabilities Using MetasploitPrivileges Escalation by Exploiting Client-Side Vulnerabilities Using Metasploit
Privileges Escalation by Exploiting Client-Side Vulnerabilities Using MetasploitVishal Kumar
 
Operating systems 2
Operating systems 2Operating systems 2
Operating systems 2mariacalji
 
install k+dcan cable standard tools 2.12 on windows 10 64bit
install k+dcan cable standard tools 2.12 on windows 10 64bitinstall k+dcan cable standard tools 2.12 on windows 10 64bit
install k+dcan cable standard tools 2.12 on windows 10 64bitWORLD OBD2
 
Windows 10 Error c1900101
Windows 10 Error c1900101Windows 10 Error c1900101
Windows 10 Error c1900101Jhon Brown
 
Scan to Folder Easy Setup Guide.pdf
Scan to Folder Easy Setup Guide.pdfScan to Folder Easy Setup Guide.pdf
Scan to Folder Easy Setup Guide.pdfMaricoRiverConservat
 
ClusterDesktop manual how-to use for windows clients
ClusterDesktop manual how-to use for windows clientsClusterDesktop manual how-to use for windows clients
ClusterDesktop manual how-to use for windows clientsEmil Parashkevov
 
Penetrating Windows 8 with syringe utility
Penetrating Windows 8 with syringe utilityPenetrating Windows 8 with syringe utility
Penetrating Windows 8 with syringe utilityIOSR Journals
 
Encryption Laboratory   Purpose of the Lab   T.docx
Encryption Laboratory   Purpose of the Lab   T.docxEncryption Laboratory   Purpose of the Lab   T.docx
Encryption Laboratory   Purpose of the Lab   T.docxYASHU40
 
Creating peer to peer network nadia perandos bisnar
Creating peer to peer network nadia perandos bisnarCreating peer to peer network nadia perandos bisnar
Creating peer to peer network nadia perandos bisnarPerla Pelicano Corpez
 
Hosts setup
Hosts setupHosts setup
Hosts setupdragoj
 

Similar to McAfee_Causes_Computer_To_Hang (20)

Hosts setup
Hosts setupHosts setup
Hosts setup
 
How To Make System Work Faster
How To Make System Work FasterHow To Make System Work Faster
How To Make System Work Faster
 
RE02DOI-1
RE02DOI-1RE02DOI-1
RE02DOI-1
 
18IF004_CNS.docx
18IF004_CNS.docx18IF004_CNS.docx
18IF004_CNS.docx
 
How_To_Manually_Reinstall_SCCM2012_Agent
How_To_Manually_Reinstall_SCCM2012_AgentHow_To_Manually_Reinstall_SCCM2012_Agent
How_To_Manually_Reinstall_SCCM2012_Agent
 
Privileges Escalation by Exploiting Client-Side Vulnerabilities Using Metasploit
Privileges Escalation by Exploiting Client-Side Vulnerabilities Using MetasploitPrivileges Escalation by Exploiting Client-Side Vulnerabilities Using Metasploit
Privileges Escalation by Exploiting Client-Side Vulnerabilities Using Metasploit
 
Operating systems 2
Operating systems 2Operating systems 2
Operating systems 2
 
install k+dcan cable standard tools 2.12 on windows 10 64bit
install k+dcan cable standard tools 2.12 on windows 10 64bitinstall k+dcan cable standard tools 2.12 on windows 10 64bit
install k+dcan cable standard tools 2.12 on windows 10 64bit
 
Windows 10 Error c1900101
Windows 10 Error c1900101Windows 10 Error c1900101
Windows 10 Error c1900101
 
5 stepmainttut
5 stepmainttut5 stepmainttut
5 stepmainttut
 
Mac
MacMac
Mac
 
Scan to Folder Easy Setup Guide.pdf
Scan to Folder Easy Setup Guide.pdfScan to Folder Easy Setup Guide.pdf
Scan to Folder Easy Setup Guide.pdf
 
ClusterDesktop manual how-to use for windows clients
ClusterDesktop manual how-to use for windows clientsClusterDesktop manual how-to use for windows clients
ClusterDesktop manual how-to use for windows clients
 
Penetrating Windows 8 with syringe utility
Penetrating Windows 8 with syringe utilityPenetrating Windows 8 with syringe utility
Penetrating Windows 8 with syringe utility
 
Encryption Laboratory   Purpose of the Lab   T.docx
Encryption Laboratory   Purpose of the Lab   T.docxEncryption Laboratory   Purpose of the Lab   T.docx
Encryption Laboratory   Purpose of the Lab   T.docx
 
Creating peer to peer network nadia perandos bisnar
Creating peer to peer network nadia perandos bisnarCreating peer to peer network nadia perandos bisnar
Creating peer to peer network nadia perandos bisnar
 
Presentation1
Presentation1Presentation1
Presentation1
 
computing networks and operating system
computing networks and operating system computing networks and operating system
computing networks and operating system
 
Hosts setup
Hosts setupHosts setup
Hosts setup
 
Windows 0.1
Windows 0.1Windows 0.1
Windows 0.1
 

More from Eric Roberson

ENG3331_Adv_Desktop_Publishing_adp_aat_catalog_assignment4
ENG3331_Adv_Desktop_Publishing_adp_aat_catalog_assignment4ENG3331_Adv_Desktop_Publishing_adp_aat_catalog_assignment4
ENG3331_Adv_Desktop_Publishing_adp_aat_catalog_assignment4Eric Roberson
 
ENG3373_Advertising_finalsubmissionletter
ENG3373_Advertising_finalsubmissionletterENG3373_Advertising_finalsubmissionletter
ENG3373_Advertising_finalsubmissionletterEric Roberson
 
ENG3373_Advertising_poster_slogan2
ENG3373_Advertising_poster_slogan2ENG3373_Advertising_poster_slogan2
ENG3373_Advertising_poster_slogan2Eric Roberson
 
ENG3373_Advertising_poster_slogan1
ENG3373_Advertising_poster_slogan1ENG3373_Advertising_poster_slogan1
ENG3373_Advertising_poster_slogan1Eric Roberson
 
ENG3373_Advertising_featurestory_fordateline
ENG3373_Advertising_featurestory_fordatelineENG3373_Advertising_featurestory_fordateline
ENG3373_Advertising_featurestory_fordatelineEric Roberson
 
ENG3329_Environmental_Writing_greening_of_datacenters
ENG3329_Environmental_Writing_greening_of_datacentersENG3329_Environmental_Writing_greening_of_datacenters
ENG3329_Environmental_Writing_greening_of_datacentersEric Roberson
 
ENG3308_Legal_Writing_legal_memo_cov
ENG3308_Legal_Writing_legal_memo_covENG3308_Legal_Writing_legal_memo_cov
ENG3308_Legal_Writing_legal_memo_covEric Roberson
 
ENG3317_Public_Relations_positionpaper_lgbt_workplace_equality
ENG3317_Public_Relations_positionpaper_lgbt_workplace_equalityENG3317_Public_Relations_positionpaper_lgbt_workplace_equality
ENG3317_Public_Relations_positionpaper_lgbt_workplace_equalityEric Roberson
 
ENG3317_Public_Relations_newsrelease_print
ENG3317_Public_Relations_newsrelease_printENG3317_Public_Relations_newsrelease_print
ENG3317_Public_Relations_newsrelease_printEric Roberson
 
ENG3317_Public_Relations_newsrelease_broadcast
ENG3317_Public_Relations_newsrelease_broadcastENG3317_Public_Relations_newsrelease_broadcast
ENG3317_Public_Relations_newsrelease_broadcastEric Roberson
 
ENG3317_Public_Relations_media_kit_contents
ENG3317_Public_Relations_media_kit_contentsENG3317_Public_Relations_media_kit_contents
ENG3317_Public_Relations_media_kit_contentsEric Roberson
 
ENG3317_Public_Relations_featurestory_lgbt_workplace_equality
ENG3317_Public_Relations_featurestory_lgbt_workplace_equalityENG3317_Public_Relations_featurestory_lgbt_workplace_equality
ENG3317_Public_Relations_featurestory_lgbt_workplace_equalityEric Roberson
 
ENG3317_Public_Relations_backgrounder_lgbt_workplace_equality
ENG3317_Public_Relations_backgrounder_lgbt_workplace_equalityENG3317_Public_Relations_backgrounder_lgbt_workplace_equality
ENG3317_Public_Relations_backgrounder_lgbt_workplace_equalityEric Roberson
 
ENG3317_RhetoricalTheory_ideological_analysis_of_aids_memorial_quilt
ENG3317_RhetoricalTheory_ideological_analysis_of_aids_memorial_quiltENG3317_RhetoricalTheory_ideological_analysis_of_aids_memorial_quilt
ENG3317_RhetoricalTheory_ideological_analysis_of_aids_memorial_quiltEric Roberson
 
ENG3317_RehtoricalTheory_neo_aristotelian_analysis_of_karlyn_kohrs_campbell
ENG3317_RehtoricalTheory_neo_aristotelian_analysis_of_karlyn_kohrs_campbellENG3317_RehtoricalTheory_neo_aristotelian_analysis_of_karlyn_kohrs_campbell
ENG3317_RehtoricalTheory_neo_aristotelian_analysis_of_karlyn_kohrs_campbellEric Roberson
 
gradschool_personalstatement
gradschool_personalstatementgradschool_personalstatement
gradschool_personalstatementEric Roberson
 
County_AccessDataEnterprise3_3TopologyChart_RevisedJune2011_byERoberseon
County_AccessDataEnterprise3_3TopologyChart_RevisedJune2011_byERoberseonCounty_AccessDataEnterprise3_3TopologyChart_RevisedJune2011_byERoberseon
County_AccessDataEnterprise3_3TopologyChart_RevisedJune2011_byERoberseonEric Roberson
 
Visio-AccessDataEnterprise3_3TopologyChart_Revised13Jul2011_byERoberson
Visio-AccessDataEnterprise3_3TopologyChart_Revised13Jul2011_byERobersonVisio-AccessDataEnterprise3_3TopologyChart_Revised13Jul2011_byERoberson
Visio-AccessDataEnterprise3_3TopologyChart_Revised13Jul2011_byERobersonEric Roberson
 
LargeCorp_AccessData_Examiner3TopologyChart_Revised22June2011_byERoberseon
LargeCorp_AccessData_Examiner3TopologyChart_Revised22June2011_byERoberseonLargeCorp_AccessData_Examiner3TopologyChart_Revised22June2011_byERoberseon
LargeCorp_AccessData_Examiner3TopologyChart_Revised22June2011_byERoberseonEric Roberson
 
Robersone5_ENG6318_FinalEssayOnLanguageUse
Robersone5_ENG6318_FinalEssayOnLanguageUseRobersone5_ENG6318_FinalEssayOnLanguageUse
Robersone5_ENG6318_FinalEssayOnLanguageUseEric Roberson
 

More from Eric Roberson (20)

ENG3331_Adv_Desktop_Publishing_adp_aat_catalog_assignment4
ENG3331_Adv_Desktop_Publishing_adp_aat_catalog_assignment4ENG3331_Adv_Desktop_Publishing_adp_aat_catalog_assignment4
ENG3331_Adv_Desktop_Publishing_adp_aat_catalog_assignment4
 
ENG3373_Advertising_finalsubmissionletter
ENG3373_Advertising_finalsubmissionletterENG3373_Advertising_finalsubmissionletter
ENG3373_Advertising_finalsubmissionletter
 
ENG3373_Advertising_poster_slogan2
ENG3373_Advertising_poster_slogan2ENG3373_Advertising_poster_slogan2
ENG3373_Advertising_poster_slogan2
 
ENG3373_Advertising_poster_slogan1
ENG3373_Advertising_poster_slogan1ENG3373_Advertising_poster_slogan1
ENG3373_Advertising_poster_slogan1
 
ENG3373_Advertising_featurestory_fordateline
ENG3373_Advertising_featurestory_fordatelineENG3373_Advertising_featurestory_fordateline
ENG3373_Advertising_featurestory_fordateline
 
ENG3329_Environmental_Writing_greening_of_datacenters
ENG3329_Environmental_Writing_greening_of_datacentersENG3329_Environmental_Writing_greening_of_datacenters
ENG3329_Environmental_Writing_greening_of_datacenters
 
ENG3308_Legal_Writing_legal_memo_cov
ENG3308_Legal_Writing_legal_memo_covENG3308_Legal_Writing_legal_memo_cov
ENG3308_Legal_Writing_legal_memo_cov
 
ENG3317_Public_Relations_positionpaper_lgbt_workplace_equality
ENG3317_Public_Relations_positionpaper_lgbt_workplace_equalityENG3317_Public_Relations_positionpaper_lgbt_workplace_equality
ENG3317_Public_Relations_positionpaper_lgbt_workplace_equality
 
ENG3317_Public_Relations_newsrelease_print
ENG3317_Public_Relations_newsrelease_printENG3317_Public_Relations_newsrelease_print
ENG3317_Public_Relations_newsrelease_print
 
ENG3317_Public_Relations_newsrelease_broadcast
ENG3317_Public_Relations_newsrelease_broadcastENG3317_Public_Relations_newsrelease_broadcast
ENG3317_Public_Relations_newsrelease_broadcast
 
ENG3317_Public_Relations_media_kit_contents
ENG3317_Public_Relations_media_kit_contentsENG3317_Public_Relations_media_kit_contents
ENG3317_Public_Relations_media_kit_contents
 
ENG3317_Public_Relations_featurestory_lgbt_workplace_equality
ENG3317_Public_Relations_featurestory_lgbt_workplace_equalityENG3317_Public_Relations_featurestory_lgbt_workplace_equality
ENG3317_Public_Relations_featurestory_lgbt_workplace_equality
 
ENG3317_Public_Relations_backgrounder_lgbt_workplace_equality
ENG3317_Public_Relations_backgrounder_lgbt_workplace_equalityENG3317_Public_Relations_backgrounder_lgbt_workplace_equality
ENG3317_Public_Relations_backgrounder_lgbt_workplace_equality
 
ENG3317_RhetoricalTheory_ideological_analysis_of_aids_memorial_quilt
ENG3317_RhetoricalTheory_ideological_analysis_of_aids_memorial_quiltENG3317_RhetoricalTheory_ideological_analysis_of_aids_memorial_quilt
ENG3317_RhetoricalTheory_ideological_analysis_of_aids_memorial_quilt
 
ENG3317_RehtoricalTheory_neo_aristotelian_analysis_of_karlyn_kohrs_campbell
ENG3317_RehtoricalTheory_neo_aristotelian_analysis_of_karlyn_kohrs_campbellENG3317_RehtoricalTheory_neo_aristotelian_analysis_of_karlyn_kohrs_campbell
ENG3317_RehtoricalTheory_neo_aristotelian_analysis_of_karlyn_kohrs_campbell
 
gradschool_personalstatement
gradschool_personalstatementgradschool_personalstatement
gradschool_personalstatement
 
County_AccessDataEnterprise3_3TopologyChart_RevisedJune2011_byERoberseon
County_AccessDataEnterprise3_3TopologyChart_RevisedJune2011_byERoberseonCounty_AccessDataEnterprise3_3TopologyChart_RevisedJune2011_byERoberseon
County_AccessDataEnterprise3_3TopologyChart_RevisedJune2011_byERoberseon
 
Visio-AccessDataEnterprise3_3TopologyChart_Revised13Jul2011_byERoberson
Visio-AccessDataEnterprise3_3TopologyChart_Revised13Jul2011_byERobersonVisio-AccessDataEnterprise3_3TopologyChart_Revised13Jul2011_byERoberson
Visio-AccessDataEnterprise3_3TopologyChart_Revised13Jul2011_byERoberson
 
LargeCorp_AccessData_Examiner3TopologyChart_Revised22June2011_byERoberseon
LargeCorp_AccessData_Examiner3TopologyChart_Revised22June2011_byERoberseonLargeCorp_AccessData_Examiner3TopologyChart_Revised22June2011_byERoberseon
LargeCorp_AccessData_Examiner3TopologyChart_Revised22June2011_byERoberseon
 
Robersone5_ENG6318_FinalEssayOnLanguageUse
Robersone5_ENG6318_FinalEssayOnLanguageUseRobersone5_ENG6318_FinalEssayOnLanguageUse
Robersone5_ENG6318_FinalEssayOnLanguageUse
 

McAfee_Causes_Computer_To_Hang

  • 1. Knowledge Base Article Page 1 of 6 Created On: 28-Oct-2013 Author: Eric Roberson Title Computers running McAfee Antivirus (beta) become unresponsive during startup Description of Issue  Computers running McAfee Antivirus hang or freeze when starting up or while logging onto the network.  Information in this solution applies only to pilot/test computers for McAfee Antivirus (beta). Description of Resolution This solution contains several parts. Follow each section carefully. The variable {computername} refers to the remote or target computer. PREREQUISITE: Recover an unresponsive computer This section must be performed locally on the remote computer. Consider connecting to the remote computer using Remote Desktop Protocol (RDP.) 1. If the computer hangs during startup, press CTRL + ALT + END to start task manager. 2. Click the Processes Tab, then click Image Name to sort the list of running processes. 3. Click the MfeFFCore.exe process, then click End Process. 4. The computer will log on successfully after stopping the MfeFFCore.exe process. PART 1: Copy necessary files to remote computer Parts one, two, and three may be performed remotely without user intervention. Before completing these sections, go to Part 4: Confirm Functionality to determine whether these steps are necessary. 1. On the target computer, check for {computername}c$windowssystem32psexec.exe. If necessary, copy EDCAPP25MMQT$PSEXEC.EXE to {computername}c$windowssystem32. 2. Open a command using an account with elevated privileges (eg. A_UserID). Type net use ohcfs01groups * /u:lyb{user_ID},
  • 2. Knowledge Base Article Page 2 of 6 then press Enter. When prompted, enter the password for a regular user ID. 3. Type Copy ohcfs01groupseveryonesleep.exe {computername}C$Batch. 4. Type Copy ohcfs01groupseveryoneframepkg.exe {computername}C$Batch. 5. Type Net use ohcfs01groups /d. Press the letter ‘Y’ to disconnect when prompted. Continue to Part 2: Apply the Soulution. PART 2: Apply the solution 1. Open a command using an account with elevated privileges (eg. A_UserID). Type psexec –s –h {computername} cmd.exe. 2. Type hostname to verify connectivity to the remote computer. 3. Type c:batchframepkg.exe /forceuninstall, then press Enter. Wait for the command to complete, which may take five minutes or longer. 4. Type SET TEMP=C:BATCH, then press Enter.
  • 3. Knowledge Base Article Page 3 of 6 NOTE: The command line SET TEMP=C:BATCH is case sensitive. Please use All CAPS. 5. Type C:BatchFramePkg.exe /install=agent /forceinstall /DataDir=C:Batch, then press Enter. Wait for the command to complete, which may take ten minutes or longer. NOTE: This command line is case sensitive. Be sure to use correct upper and lower case letters.
  • 4. Knowledge Base Article Page 4 of 6 6. Restart the computer. Type shutdown /r /f /t 600 /c “Save your work! Restarting computer in 10 minutes to complete antivirus agent installation.” 7. Type ping -4 {computername} –t –w 15000. Continue to Part 3 once a ping response is received. PART 3: Retrieve updated policy Retrieve the updated policy so new encryption keys are copied and files are decrypted on the remote computer. 1. Open a command using an account with elevated privileges (eg. A_UserID). Type psexec –s –h {computername} cmd.exe. 2. Type hostname to verify connectivity to the remote computer. 3. Type CDProgram FilesMcAfeeCommon Framework, then press Enter. 4. Type each of the following commands, waiting 60 seconds between typing each command:  CmdAgent.exe /C  CmdAgent.exe /E  CmdAgent.exe /P 5. Restart the computer. Type shutdown /r /f /t 600 /c “Save your work! Restarting computer in 10 minutes to complete antivirus agent installation.” PART 4: Confirm functionality Confirm necessary decryption keys are present and files are being decrypted. 1. Connect to the remote computer using RDP. 2. Browse to the folder C:Program FilesMcAfeeEndpoint Encryption for Files and Folders. Double click MfeFFConsole.exe. 3. Click the Status Report button at the top left, then expand Available Keys in the column on the right.
  • 5. Knowledge Base Article Page 5 of 6 4. If both encryption keys appear, then the solution has been applied successfully and the new policy is in effect. 5. To check for files waiting to be decrypted, open Windows Explorer. Right click the C: drive, then click McAfee Endpoint Encryption > Search Encrypted. 6. Click the Search button at the top right. If no encrypted files are found, then the solution has been applied successfully and the new policy is in effect. Also consider checking the following directories for encrypted files:  C:localdocs (both Win XP and Win 7)  C:ProgramData (Win 7 only)  C:Documents and SettingsAll UsersApplication Data (Win XP Only)
  • 6. Knowledge Base Article Page 6 of 6 NOTE: Please allow enough time for the decryption process after applying Steps two and three above. Additional Information For additional support, contact the End User Computing or Information Technology Foundation teams. Revision History Revision Number Date Editor Summary of revision 0.1 28-Oct-2013 Eric Roberson First Draft 1.0 28-Oct-2013 Eric Roberson Technical Edit Tags McAfee Endpoint Encryption, Decrypt, Decryption, Encrypt, Encryption, Antivirus