You've observed that some recently imaged machines are being assigned identical computer GUIDs. Even after attempting to add these duplicate GUIDs to the AgentBlackList table, the issue persists.
The NS logs show messages such as: "Host Resource 0480bd38-0229-4465-9d61-446e8529e558 shares GUID with another machine:<Computer1>.EXAMPLE.COM. The resource must change its guid."
Further investigation of the ResourceKeyChanged table reveals that the same machines are repeatedly exchanging the same GUIDs. Despite efforts to reset GUIDs on these agents, their logs indicate that the same GUIDs are being returned from the SMP.
When you try to run "aexagentutil.exe /ResetGuid", it seems that is no longer effective for resetting agent GUIDs.
ITMS 8.x
The machines were improperly prepared for imaging capture as they have references to the same DSUniqueID. It was found that the image includes the same DSUniqueID and was used to image all those machines.
If you are experiencing issues with duplicate machine IDs, consider the following troubleshooting steps:
Example 1:
<resource typeGuid="{493435F7-3B17-4C4C-B07F-C23E7AB7781F}" guid="{0480BD38-0229-4465-9D61-446E8529E558}" name="Computer">
<resource typeGuid="{493435F7-3B17-4C4C-B07F-C23E7AB7781F}" guid="{0480BD38-0229-4465-9D61-446E8529E558}" name="Computer1">
<key name="fqdn" value="Computer2.example.com"/>
<key name="name.domain" value="Computer2.EXAMPLE"/>
<key name="name.domain" value="Computer2.example.com"/>
<key name="uniqueid" value="######-a56d-4b82-bbb0-0d0983980963"/>
<key name="uniqueid" value="dm48o2Lm0uKo/ATISfE/Ww=="/>
<key name="uniqueid" value="gejEU1C/W38BThNjmmhIpw=="/>
<key name="uniqueid" value="mYmhJUH3Pw330gioaN/yTg=="/>
<key name="uniqueid" value="O9JOrrHMOuXpKMA/V9ly0Q=="/>
</resource>
Example 2:
<resource typeGuid="{493435F7-3B17-4C4C-B07F-C23E7AB7781F}" guid="{0480BD38-0229-4465-9D61-446E8529E558}" name="Computer" ref="1">
<resource typeGuid="{493435F7-3B17-4C4C-B07F-C23E7AB7781F}" guid="{0480BD38-0229-4465-9D61-446E8529E558}" name="Computer" ref="1">
<key name="fqdn" value="Computer.example.com"/>
<key name="name.domain" value="Computer.EXAMPLE"/>
<key name="name.domain" value="Computer.example.com"/>
<key name="uniqueid" value="1V42HpOCg4svGeXbY3UbFw=="/>
<key name="uniqueid" value="######-a56d-4b82-bbb0-0d0983980963"/>
<key name="uniqueid" value="3M/XYx8uBf6H9DNh8p7t/Q=="/>
<key name="uniqueid" value="f9ACt/xhyBEifgS0aQS8JA=="/>
<key name="uniqueid" value="xtq6zQ8iPWFddB0TllW9jg=="/>
</resource>
Example Output:
C:\>smatool.exe /AGENT DUMP RESOURCEKEYS
Keys:
fqdn: Computer.example.com
name.domain: Computer.EXAMPLE
name.domain: Computer.example.com
uniqueid: ######-a56d-4b82-bbb0-0d0983980963
uniqueid: dm48o2Lm0uKo/ATISfE/Ww==
uniqueid: gejEU1C/W38BThNjmmhIpw==
uniqueid: mYmhJUH3Pw330gioaN/yTg==
uniqueid: O9JOrrHMOuXpKMA/V9ly0Q==
Understanding the Problem:
A common cause of duplicate uniqueid values (especially those resembling GUIDs like ######-a56d-4b82-bbb0-0d0983980963) is the "DSUniqueID" value, which is generated during the initial imaging process. If an image with this DSUniqueID is used to deploy multiple machines, they will all share the same resource key. Since this key is a merging key, agents will continuously re-register with the same GUID from the perspective of the SMP (Symantec Management Platform). This leads to agents being blacklisted or merged into a single entry, causing registration and policy retrieval failures.
Note: The only key named "uniqueid" that contains a plain GUID is a DS (Deployment Solution) key.
To resolve issues stemming from a shared DSUniqueID:
Scenario 1: "cloudid" Resource Key
With ITMS 8.7.2, a new "CloudID" resource key was introduced. This key uniquely identifies computer and user resources across Azure AD tenants, assisting in merging resources from Azure AD imports and those created by SMA (Symantec Management Agent). The "cloudid" value contains the Azure AD tenant ID and the ID of the Azure AD device or user account. Currently, only computer devices joined to Azure AD are supported; Azure AD registered devices are not. If "cloudid" is present, the machine is joined to Azure AD, and SMA obtains this information from the OS.
Sample "cloudid" keys:
Computer resource key:
<resource typeGuid="{2C3CB3BB-FEE9-48DF-804F-90856198B600}" guid="{5EADDE2C-8244-464E-9D67-0FC84D4E2998}" name="computer_name"><key name="cloudid" value="cda05ba8-49ce-4ae9-acf2-15eb38d8b48d.7650B649-D844-4C5D-82EF-3E29C67C5A9C"/></resource>
User resource key:
<resource typeGuid="{FD864F19-4437-4A4F-8709-58EB5E3AE0A4}" name="AZUREAD\user_name"><key name="cloudid" value="cda05ba8-49ce-4ae9-acf2-15eb38d8b48d.AD5F720C-43BA-4ACE-BD25-40A2CDE664EA"/></resource>
dsregcmd.exe /debug /leave
Steps:
Scenario 2: "tpmid" Resource Key
ITMS 8.7.1 introduced a new feature that uses machine TPM 2.0 encryption keys to generate a unique ID called "tpmid."
Example "tpmid" key:
<key name="cloudid" value="xxxxxxxxxxxxxxxx-0f64b6755421.xxxxxxxxxxxxx-9a96723e0680"/>
<key name="fqdn" value="computer.example.com"/>
<key name="name.domain" value="computer.example"/>
<key name="name.domain" value="computer.example.com"/>
<key name="tpmid" value="xxxxxxxxxxxxxxxxxxxxxxxxx+6qbwaY="/>
<key name="uniqueid" value="123456789JdBovg=="/>
<key name="uniqueid" value="987654321KLBxoydnabw=="/>
<key name="wmdm_device_id" value="xxxxxxxxxxxxxxC26C37B9AB"/>
Understanding "tpmid" duplicates: The TPM EK (Endorsement Key), which populates the "tpmid" entry, is designed to be unique. If a duplicate "tpmid" is found, it implies the key was copied from another machine, likely during the cloning of virtual machines. When VMs are cloned, the administrator should ensure that the TPM keys for the new machines are changed, as the VMware cloning process copies all data, including TPM keys.
240039 "Agent revocation after Deploying an image with agent included"