This is a troubleshooting guide for Symantec Endpoint Protection (SEP) or Symantec Endpoint Security (SES) agents. This guide should be used when an issue with the SEP or SES agent is occurring but attempts to find root cause have failed. Below are steps that can be performed to narrow down which feature, driver, process, policy, rule, setting or other component of the agent may be causing or contributing to the issue.
This method of troubleshooting helps rule out parts of the product by removing or disabling them entirely. Similar to process of elimination; divide and conquer. Remove variables from the equation, test again, rinse and repeat until the offending piece is found. This may seem like a tedious or lengthy process, but it can actually save time when it comes to complex issues especially when there are no error messages present, no logs being written, or other indicators pointing in a specific direction. Also, throughout this process, when the issue is isolated, this presents a workaround that can be replicated to other affected devices until a permanent fix can be implemented.
These steps may be taken on your own or at the direction of a Support Agent.
Note: The steps below walk through various ways to remove or disable protection features of the SEP/SES agent. These steps should only be used for troubleshooting or temporary workarounds. Under normal circumstances we strongly recommend enabling all protection features and policies which allows the agent to provide as much protection as possible.
Generally these steps are meant to be followed in order, but depending on the specific issue or troubleshooting done so far, you may be able to skip some steps. They are sorted in magnitude of functional impact to the SEP agent, but don’t necessarily need to be followed chronologically. Meaning, the first step makes the most changes to the SEP agent as possible, while the last step focuses on fine-tuning policy settings that have a smaller impact.
The 14.3.x SEP and SES agent are the same agent, but able to be managed by two different platforms: On-Premise Symantec Endpoint Protection Manager or Cloud-managed Symantec Endpoint Security (ICDm). Depending on the management platform, it may enable additional features or protection. The naming conventions between the two platforms for similar agent functionality can differ slightly. For example, the On-Premise “Application and Device Control policy” is the same as the Cloud-managed Custom Application Behavior Policy” and “Device Control Policy”. As a result, some of the steps below may be slightly different depending on how the agent is managed. The general methodology remains the same however; , remove variables from the equation until the cause is identified.
This step can often be overlooked depending on knowledge of the issue. This completely removes the agent from the system and requires a restart. It is useful in situations where the issue is intermittent or if it is unclear whether or not the SEP/SES agent is a contributing factor.
After restarting, attempt to reproduce the issue.
Stopping smc (Symantec Management Client) is a quick troubleshooting step that disables several protection features of SEP at once. If configured, a password prompt will be presented when this command is issued. For details about which features are disabled when issuing a smc -stop command, visit the KB below.
What functions of the Endpoint Protection client are disabled by the smc -stop command
https://knowledge.broadcom.com/external/article/157972/what-functions-of-the-endpoint-protectio.html
Since this command disables many of the protection capabilities of the agent but leaves the drivers running, it can be a useful first step to guide additional troubleshooting steps.
*Note: The SEP agent UI must be closed to stop smc.
This is the most common and useful step in component isolation troubleshooting. It involves removing protection features from the device so applicable policies are not enforced and component drivers are removed.
Since the protection agent is made up of several different components such as Malware Protection, Firewall, Intrusion Prevention, Application Control, etc, removing each one by one for testing can be a slow process. It’s best to take a divide and conquer approach. Start by removing half of the features, restarting and testing again. Once you have the results, if the issue still occurs, remove half of the remaining components then test again. Repeat these steps until the issue has been narrowed down to a specific component.
***Note: There are mechanisms in place to prevent the modification of an agent’s installed feature set. Depending on the method being used below, ensure you’ve temporarily removed any enforcement of installed features or know the uninstall password. If this consideration is ignored you may see removed features automatically reinstalled which will prolong or invalidate testing. These include:
Depending on the issue, you will be able to make an educated guess on which feature(s) may be causing the issue and only remove one or two specific components to test your hypothesis. Generally speaking, here are some “buckets” of features that often go along with certain types of issues.
Network related issues
Browser related issues
USB/External devices not working
There are a few different ways to remove features from devices. While the specifics vary per method, they all can be effective. Use whichever method is preferable to you. The Control Panel method allows the most granular control while the other options may be easier from a management console perspective.
This is the easiest and fastest method for rapid testing if you have access to an affected device.
***Note: If you have a Feature Selection Policy (Cloud) or Install Package with maintain existing features (On-prem) assigned to the group which this device is in, any changes directly in the control panel will be reverted shortly after any manual changes are made. It’s suggested that you move this device to a test group that doesn’t have either of those items applied so it doesn’t interfere with testing.
After restarting, attempt to reproduce the issue.
If directly accessing the client to remove features using the Control Panel isn’t feasible, the next best option is using a Feature Selection Policy to selectively control which features are installed on an agent. The Feature Selection policy is an optional policy within SES that, when applied to a Group with devices in it, will control what features those devices have installed.
***Note: It is not possible to remove some features using this method such as Malware Protection.
You can use this policy to selectively add or remove features from devices without needing remote access. To use this option:
It will take a few minutes for the devices to retrieve the policy and apply the changes. Depending on the features removed, a restart may be required. The device will inform the user if a restart is required, the Security Status in ICDm will also indicate a restart is required.
***Note: Restart settings can be controlled using the System Policy under Client Restart Settings section. By Default, a logged in user will be able to delay a required restart.
Once restarted, you can confirm the features were removed from the Device by clicking on it and scroll down to the Feature Status section. After confirming the Feature(s) have been removed, test for the issue again.
If directly accessing the client to remove features using the Control Panel isn’t feasible, the next best option is to use the “Install Packages” feature to selectively control which features are installed on an agent.
Once you have clicked OK the SEPM will make this altered installation package available to any devices in that test group. Depending on the configuration communication settings, the client will check in with the SEPM and then see that it has been given installation instructions that differ from what it currently has installed. It will download any necessary installation files from the SEPM (most likely they’re already cached) and then perform a reconfiguration of the installed features. After it has removed or added features based on the Feature Set policy, the client may need a restart.
After the client has removed or added the desired features and a restart has been performed (if needed), attempt to reproduce the issue again. Repeat these steps as necessary until the Feature causing the issue is found.
If you’re fairly certain which feature is causing the issue, but all attempts to make configuration changes to resolve the issue have failed, a good troubleshooting step is to either disable the feature by policy or withdraw the policy. This is an excellent confirmation step because if taking this action resolves the issue it confirms you’ve successfully isolated the issue to one feature. In most cases where disabling the policy feature resolves the issue, a combination of policy changes and/or exceptions can resolve the issue.
Disabling a feature by policy or withdrawing the policy means that the underlying driver or technology is still in place, it just won’t be enforcing any policies.
The specific steps below will vary depending on the policy in question. But we’ll cover the most common situations. Some policies can be withdrawn from a group entirely, others cannot. Some policies have a simple on/off toggle for the entire feature, others do not. So the steps may vary slightly depending on the policy/feature you’re working with but we’ll cover the most common steps.
***Note: Create a group specifically for testing so only target test devices are impacted.
Not all policies can be withdrawn from a Group, but for those that can, the steps are as follows.
Policies that cannot be withdrawn:
This will remove the policy from the group and any devices contained within it. Wait for the client to receive the updated policy change and then test again.
****Note: Create a copy of any policy you intend to test disabling and apply it to the test group. This way only the desired test devices are impacted. Also disable inheritance to allow modification of policies for this test group.
This is the easiest method to completely disable a policy, however not all policies can be disabled this way. To determine or not the policy you need to disable can be modified this way, follow these steps:
***Note: Only disable test policies using this method so the entire environment doesn’t have the feature disabled.
This will disable the policy for any group it’s assigned to and any devices contained within it. Wait for the client to receive the updated policy change and then test again.
For policies (Virus and Spyware, LiveUpdate, and Memory Exploit Mitigation) that have the “Enable this policy” checkbox greyed out, this is the next best method for disabling features by policy.
To disable Memory Exploit Mitigation (MEM) by policy:
Test to see if the issue can be reproduced.
Another option rather than disabling may be to check the “Set the protection action for all techniques to log only”. This would essentially place the system in a monitor mode.
***Note: If the issue is with AV/AS, most likely it’s Auto-Protect, SONAR, Download Protection or ELAM. Rarely is it one of the other features. All of the settings are mentioned below, but you can save time by focusing on the four items mentioned above.
Edit the policy then make the following changes:
Test to see if the issue can be reproduced.
It’s unlikely the policy itself is causing an issue. It merely controls when and where the agent gets content (definitions). If you need to stop a client from running LiveUpdate however, follow these steps:
This can only be done for Windows agents. This will prevent Windows devices from running LiveUpdate or getting content from the SEPM.
Test to see if the issue can be reproduced.
It’s recommended to create a “Component Isolation” test group directly under the “Default” group. It will simplify testing.
While most policies can be withdrawn from groups, if there’s a different policy of the same type applied to the parent group, that policy will then be inherited, invalidating the testing. To get around this, the removal testing would be done in a group under the Default group, and the policies are also removed from that group. In this scenario it would impact other child groups which is undesirable. Therefore, the least destructive method is creating a new policy of the same policy type you’re trying to remove and then “disable the feature” by policy. Disabling the feature by policy will vary per policy type. Below are the steps per policy:
For all policy types, you must create a new policy first:
Adaptive Protection
Allow List
App Control
Compliance
Custom Application Behavior
Deny List
Detection and Response
Device Control
Exploit Protection
Feature Selection
Firewall
If the issue is narrowed down to the Firewall component, testing Firewall Rules is the next step. For additional steps see article Network application does not work with Endpoint Protection firewall installed.
Intrusion Prevention
Network Integrity
Threat Defense for AD
*Note: If TDAD was never configured, this policy can be ignored.
Trusted Updater
Unwanted Mobile Application
Web and Cloud Access Protection
For Reference:
If all SEP/SES protection features have been uninstalled using the steps above, the install is in a “Core Files Only” mode. This refers to the Interactive SEP Custom Setup page where you can remove all features except for Core Files. After reducing the install set to Core Files only and restarting, if you’re still experiencing the issue, there are several drivers remaining when in Core Files only. They are listed below along with steps to disable them if necessary.
These drivers can be disabled using Windows Service Configuration command via command prompt or by editing the registry. Use whichever is most convenient to you, but document the current state so it can be reverted when testing is complete.
*Note: Both of these methods require Tamper Protection be disabled. Only disable Tamper Protection on test systems.
Below is a list of Core Files only drivers to test disabling using one of the methods below the list. The list is ordered by likelihood of causing an issue.
Use the service name above in place of <service_name> below in the steps. No quotes, no greater or less than symbols.
*Note: Tamper Protection must be disabled to use either method listed below. Only disable Tamper Protection on devices these steps will be performed on.
Depending on the driver identified as causing the issue, it may be possible to leave it disabled while reinstalling protection features so that some level of protection is applied to the device while the investigation is ongoing.
Once the issue has been narrowed down to a specific service, revert the previously changed service settings.