Troubleshooting the Installation
Administrative Privileges
Installation of Endpoint Security requires the user to have administrator privileges.
-
Installing or uninstalling the client on Windows 7 and higher with active UAC (User Access Control) requires the user to invoke the installer with the "run as administrator" option. To enable this right-click mouse option, add the following information to the registry:
[HKEY_CLASSES_ROOT\Msi.Package\shell\runas\command]
@=hex(2):22,00,25,00,53,00,79,00,73,00,74,00,65,00,6d,00,52,00,6f,00,6f,00,74,\
00,25,00,5c,00,53,00,79,00,73,00,74,00,65,00,6d,00,33,00,32,00,5c,00,6d,00,\
73,00,69,00,65,00,78,00,65,00,63,00,2e,00,65,00,78,00,65,00,22,00,20,00,2f,\
00,69,00,20,00,22,00,25,00,31,00,22,00,20,00,25,00,2a,00,00,00
-
To install or uninstall using the command line, the user must have administrator privileges ("run as administrator").
-
Microsoft packages. During installation, the 1720 error message may occur:
"Error 1720. There is a problem with this Windows Installer package.
A script required for this install to complete could not be run.
Contact your support personnel or package vendor.
Custom action ExtractConfigs script error -2147024770, : Line 2, C?"Microsoft suggests KB311269: Register the
WScript
object by running the "wscript -regserver
" command from a command prompt or from the Run option on the Start menu. -
For information about the DES encryption on Windows 7 clients, see Step 1 of 3: Configuring the Active Directory Server for Authentication.
Repairing Clients
If a client deployment fails, you can Repair the client, which installs the Endpoint Security client on the computer again. Repair a client in one of these ways
-
Run Repair from Push Operations in SmartEndpoint
A Check Point GUI application which connects to the Endpoint Security Management Server, to manage your Endpoint Security environment - to deploy, monitor and configure Endpoint Security clients and policies..
-
Run Repair from the endpoint computer. Administrator privileges are required.
To repair an Endpoint Security client from the endpoint computer on Windows:
-
Make sure that the original EPS.msi and PreUpgrade.exe files are on the endpoint computer.
-
Go to Control Panel > Programs and Features > Uninstall or change a program.
-
Right-click Check Point Endpoint Security and select Repair.
EPS Service for VPN Connectivity
If the VPN client is unable to connect to the configured Security Gateway Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources., a Connectivity to the VPN server is lost message shows. To resolve this:
-
Make sure that the Check Point Endpoint Security service (the EPS service) is up and running.
-
If this service does not exist, install it by opening a command prompt and running:
"c:\Program Files\CheckPoint\Endpoint Security\Endpoint Connect\TracSrvWrapper.exe" -install
Uninstalling the Client on Windows
Administrator privileges are required to uninstall the client.
To uninstall the Endpoint Security client on Windows computers:
-
Make sure that the original
EPS.msi
andPreUpgrade.exe
files are present on the endpoint computer. -
Go to Control Panel > Programs and Features > Uninstall or change a program.
-
Uninstall the Endpoint Security client.
-
If the client has Full Disk Encryption
A component on Endpoint Security Windows clients. This component combines Pre-boot protection, boot authentication, and strong encryption to make sure that only authorized users are given access to information stored on desktops and laptops. Acronym: FDE. installed, run the Uninstall or change a program applet again after the disk completes the decryption.
After you uninstall the Endpoint Security client, you must reset the computer through SmartEndpoint on the Security Management Server Dedicated Check Point server that runs Check Point software to manage the objects and policies in a Check Point environment within a single management Domain. Synonym: Single-Domain Security Management Server.. See Resetting a Computer.
|
Note - We recommend that you run a database backup on a daily basis. |