![]() You must specify the path name and file name.įor example, you can type the following command: The configuration file includes the following management server settings: The client still runs and protects the client computer.Įxports the client’s configuration file to an. This feature is called Memory Exploit Mitigation in subsequent versions. Version 14: smc -disable -gem *Version 14: smc -disable -gem *Įnables/disables the Symantec Endpoint Protection Generic Memory Exploit Mitigation system. Password requirement for -disable as of 14.2 RU1Įnables/disables the Symantec Endpoint Protection Memory Exploit Mitigation system. Using smc to change a device’s tenant or domainĮnables/disables the Symantec Endpoint Protection firewall and Intrusion Prevention System. You download this file from the cloud console. Requires the Symantec_Agent_Setup.exe installation file for the destination cloud domain or tenant. Moves a client computer from Symantec Endpoint Protection Manager management to cloud console management. Moves a cloud-managed device to another cloud domain or tenant. Smc -cloudmanaged path\to \Symantec_Agent_Setup.exe ![]() If this command is password-protected, the client is disabled within one minute after the end user types the correct password.Ĭhecks whether the smc client service is installed.Ĭhecks whether the smc client service is running. ![]() Stops the client service and unloads it from memory. Here is the list of parameters you can use for the smc.exe as of Version 14.3: Parameter The client part of Symantec’s (sorry Broadcom’s) Endpoint Protection can be controlled via command line in various ways.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |