Error: “Error getting status – Cannot find license file”

To resolve this issue, run the following command from the command prompt. Ensure that the complete path of the MyFiles folder is specified:

lmstat -a -c “C:Program Files (x86)CitrixLicensingMyFiles”

Or

lmstat -a -c “C:Program FilesCitrixLicensingMyFiles”

Note: On 64-bit versions of Windows, there are two folders for application files. All 32-bit applications are installed in Program Files (x86) folder. All 64-bit applications are installed in the Program Files folder.

Related:

  • No Related Posts

ShareConnect Desktop App

ShareConnect Desktop allows you to access remote computers and file servers simultaneously, without having to logging into a web browser. You can download the Desktop App from within your ShareConnect account.

This app is supported for both Windows and Mac users.

User-added image

Install the Desktop App

Log in to your ShareConnect account. You can download the desktop app from the navigation menu on the left. You are also prompted to download the desktop app when clicking on a computer to establish a remote connection.

User-added image


Follow the instructions to install the app. The desktop app is now installed, and you can launch it from your desktop or your Programs/Apps menus.



Using the Desktop App

Launch the ShareConnect Desktop app and enter your ShareConnect credentials (email and password).

Note: If you have the 2-step verification enabled on your ShareConnect account, you will need to provide a code that is sent to your mobile phone number as an extra security measure.

Select your host computer from the left navigation and enter the host computer’s credentials.

User-added image
User-added image

Remote Screensharing – Access a Remote Desktop Session

Once you have chosen a computer and verified that computer’s credentials, the remote session will be displayed within the desktop window.

User-added image
User-added image

The Toolbar contains the following options:

  • File Transfer – Load a separate window where you can upload and download files between your computer and the host.
  • Full Screen – Maximize the desktop app window to view the host computer screen at a higher resolution.
  • Zoom – Incremental zoom to view specific areas of the host computer screen.
  • Actual Size – Expand the viewer window.
  • CTRL-ALT-DEL – Send a CTRL-ALT-DEL command to the host computer.
  • Switch Monitors – Choose which monitor to display. You may also resize your the Desktop App window to fit the full monitor span.
  • Settings – The Settings icon allows the following settings:
  • Unblank Host Screen – Unblank the host computer’s screen so that it may be physically viewed, i.e., clients.
  • Audio – Choose to hear audio from the host computer.
  • Current Printer – Select the local printer you wish to use when printing files from the host computer.


File Transfer (Windows)

Clicking the File Transfer icon will open the file viewer in a separate window.

Here, you can browse the local file directory of the host computer as well as download, rename, edit and delete certain files and folders. Drag and drop files between folders for quick and easy transfers.

Right-click files to take a specific action, or select the file and use the toolbar located in the middle of the module. When using the Open and Edit option, a file will be modified on your PC and then uploaded back when you have Saved or Closed the program used to edit.

User-added image

Right-click files to take supported actions

User-added image
User-added image

File Transfer (Mac)

The File Transfer menu is slightly different than the File Transfer function for Windows users.

The File Browser will open as a separate window. Here, you can browse through the files and take various actions on them using the toolbar at the bottom of the module. Depending on your Mac and the programs installed there, opening and editing files locally may not be supported.

User-added image


Remote Screensharing and File Server – Simultaneous Remote Sessions

  • Use the menu on the left to open up your Computers list. Select another computer to connect to.
  • Once connected, you can switch between remote sessions by clicking on the appropriate tab at the top of the app window.

User-added image


File Server – View and Download Files on the Desktop App

  • After you connect to your server, you can see a list of folders.
  • To view and edit your files, navigate to a specific file and double-click on it. Choose the option to Open and Edit and save the file on your host.
  • To download your files, navigate to a folder of your choice or create a new folder by selecting the Make New Folder button and click OK.

File Server – Upload Files via the Desktop App

  • To upload a file, you must navigate to the folder of your choice and click on the Upload button at the bottom of your Viewer window.
  • You can browse within your local computer to locate the file you want and double-click on it to upload it.

Remote Printing

To print documents remotely, set your Current Printer in the Settings menu.

Once a printer has been set, any documents printed from the host computer will print to the chosen printer.

User-added image


ShareConnect for IT Admins

Client users can submit Help Tickets from their host computer. Submitted tickets can be reviewed by Admin users from the ShareConnect Desktop app, and remote troubleshooting sessions can be established with the click of a button. Click here for information on how to use this feature.



Settings and Preferences

Click the Settings icon in the upper left to adjust various preferences. The settings available to you are inherited from your account-wide settings.

User-added image
User-added image

Related:

  • No Related Posts

ShareConnect Mobile Viewer

You can access host computers via the ShareConnect mobile app for iOS and Android.

Note – Multiple monitors cannot be viewed from the ShareConnect mobile app.

Connect to a Computer

Log in to your ShareConnect account. Select the View Files button beside the computer you want to remotely access and enter your system’s credentials.

You will see the following on the ShareConnect Mobile Viewer:

Remote Computer – The computer that you are connected to remotely.

Search – Ability to search for files or apps within a folder.

Recent Files – The 10 most recently used files.

Applications – All applications present on your host computer. By default, you will see a couple of browsers and Microsoft Office applications.

Folders – A list of all folders in your remote computer.

Files List – A table list of the files with details.

You can also remotely access your host computer by clicking Show Desktop under your computer’s name in the left navigation.

You can disconnect from your host computer by clicking Disconnect your host computer’s name. You will be redirected to the My Computer’s page.


The ShareConnect Mobile Viewer Toolbar

When you connect remotely to a host computer to begin a ShareConnect session, the ShareConnect Viewer toolbar helps you with performing certain actions on your remote computer. The toolbar is located in the right navigation of your Viewer screen.

In addition to helping you on your remote computer, you can apply security settings to your host computer.

Search – Search within files and folders available on your remote computer.

Maximize – Displays the remote computer screen in 100% size.

FIT – Displays the remote computer within your ShareConnect Viewer window.

Zoom – Performs the zoom out and zoom in functionality respectively.

Full screen – Displays the remote computer in full screen mode.

Ctrl Alt Del – Sends the Ctrl-Alt-Del command to the remote computer

Windows – Sends the Windows command to the remote computer.

Leave Session – Ends your ShareConnect remote session.

Security Settings – Apply security settings to blank your remote computer’s screen and lock keyboard & mouse action in-session

User-added image

Related:

  • No Related Posts

Export ShareFile Legal Data

All contacts, tasks, or court deadlines within ShareFile Legal should be retrieved from the app, as they are not stored within the ShareFile account connected to the app like other files and attachments.

Export Deadlines to your Calendar

User-added image

You can export your court deadlines to your Google, ICAL, or Outlook calendar. To do so, sign into ShareFile Legal and access the Deadlines section of your account.

User-added image
User-added image

Google Calendar Instructions

  • Go to Google Calendar and click the arrow next to “Other calendars”
  • Select Add by URL from the menu and paste the address generated

ICAL, Outlook or Other Instructions

Click Generate Link to create a link you can click – the link will automatically open the default calendar application on your computer.

User-added image



Retrieve Tasks

User-added image
You can export your tasks to your Google, ICAL, or Outlook calendar. To do so, sign into ShareFile Legal and access the Tasks section of your account.
User-added image

We recommend that you select Include All Tasks in the event that other users on your account do not retrieve their own.

Google Calendar Instructions

  • Go to Google Calendar and click the arrow next to “Other calendars”
  • Select Add by URL from the menu and paste the address generated above

ICAL, Outlook or Other Instructions

Click Generate Link to create a link you can click – the link will automatically open the default calendar application on your computer.


User-added image

Retrieve Legal Contacts

User-added image
Contacts are not stored in a centralized location for export – we recommend accessing the Contacts section of your ShareFile Legal account and retrieving all important Contact information.
User-added image

Related:

  • No Related Posts

Does “Blocked” Attack Indicate System Infection?

I need a solution

We use the Cloud version of Symantec Endpoint Protection (Small Business Edition) on several servers running Windows Server 2012 R2 Essentials as the server OS.  On a couple of the servers, we continue to receive warning alerts from SEP that state “System Infected” under the “Attack Signature” column.  Yet all of the intrusions have a status of “Blocked” on the same report.  Does this mean that the servers are actually infected or that the attempted intrusions were blocked and therefore are not on the server at all?

Should we run a stronger tool like SymDiag on these servers?

I find the terminology here rather confusing and inconsistent.  Any assistance you can offer will be greatly appreciated.  I’m not sure if there is something to worry about here or not.

John

0

Related:

  • No Related Posts

Microsoft Releases November 2019 Windows 10 Patch Which Fixes 74 Flaws

Windows Alternatives - Feature Image
  • The November Windows patch is out, and it comes with a large number of critical fixes.
  • All users are urged to update immediately, as the patch covers a wide range of software tools and products.
  • Some known minor issues accompany this update as always, but there are workarounds.

Microsoft has just released a pretty comprehensive patch for Windows 10, bringing 74 fixes, 13 of which address critical remote code execution (RCE) flaws. The software that is covered this time ranges from the OS core and the Edge browser to the Azure Stack, the Visual Studio, and the Exchange Server. All Windows 10 users will see the update on their settings menu, and everyone is advised to apply the patches as soon as possible, as they will help you stay safe and secure against a wide variety of threats.

More specifically, here are the most critical flaws that were fixed this time:

  • Hyper-V arbitrary code execution and failure to validate input from guest OSes (CVE-2019-0721, CVE-2019-1389, CVE-2019-1397, and CVE-2019-1398)
  • Microsoft Exchange RCE flaw (CVE-2019-1373)
  • SharePoint server information disclosure flaw (CVE-2019-1443)
  • Windows TCP/IP improper IPv6 packet handling (CVE-2019-1324)
  • Windows Graphics Device Interface information disclosure flaw (CVE-2019-1439)
  • Windows Graphics Component privilege elevation vulnerabilities (CVE-2019-1407 and CVE-2019-1433)
  • Microsoft Office for Mac inability to disable macros properly (CVE-2019-1457)
  • VBScript remote code execution vulnerability (CVE-2019-1390)
  • Microsoft Scripting Engine memory corruption flaws (CVE-2019-1426, CVE-2019-1427, CVE-2019-1428, and CVE-2019-1429)

The rest of the patches concern “important” level flaws, so they are also crucial in several use-case scenarios. For example, CVE-2019-1020 is a bypass vulnerability in the Windows secure boot process, allowing an attacker to load malicious software via a third-party bootloader. With the latest patch, this threat has been blocked.

Remember, if you’re using a security solution, it will get updated with new rules to cover the disclosed vulnerabilities. However, applying the OS updates should be an absolute priority in order to defend from any form of known exploitation methods. Moreover, Microsoft delivers Windows updates in a cumulative form, so you will also get other optimizations and improvements bundled with the security fixes.

Applying this update may cause a number of side-effects which Microsoft describes in their “known issues” section. For example, the Exchange Server may greet you with a “File failed to upload” error when trying to save files on a network location, and the exchange services may remain in a disabled state. OOBE (Out of Box Experience) may also be associated with problems creating a local user through IME (Input Method Editor). Finally, renaming files and folders on a CSV (Cluster Shared Volume) may fail with the following error: “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”. For most of these, there are workarounds provided by Microsoft.

Are you applying these monthly patches immediately, or do you instead do it whenever you have the time? Let us know in the comments down below, or on our socials, on Facebook and Twitter.

Related:

  • No Related Posts

Microsoft Windows Security Updates November 2019 overview

It is the second Tuesday of November 2019 and that means that it is Microsoft Patch Day. Microsoft released security and non-security updates for its Windows operating system and other company products.

Our overview provides you with information on these updates: it starts with an executive summary and information about the number of released updates for all supported client and server versions of Windows as well as the Microsoft Edge (classic) and Internet Explorer web browsers.

What follows is information about the updates, all with links to support articles on Microsoft’s website, the list of known issues, direct download links to cumulative updates for Windows, and additional update related information.

Click here to open the October 2019 Patch Day overview.

Microsoft Windows Security Updates October 2019

Download the following Excel spreadsheet to your local system; it lists security updates that Microsoft released in November 2019: November 2019 Security Updates

Executive Summary

feature update windows 10 1909

  • Microsoft released security updates for all supported client and server versions of the Microsoft Windows operating system.
  • The following Microsoft products have received security updates as well: Internet Explorer, Microsoft Edge, Microsoft Office, Secure Boot, Microsoft Exchange Server, Visual Studio, Azure Stack.
  • The Windows 10 version 1909 features are included in the Windows 10 version 1903 update but not activated until “they are turned on using an enablement package, which is a small, quick-to-install “master switch” that simply activates the Windows 10, version 1909 features.” Microsoft released a blog post that details how to get the update. (basically, install regular 1903 update, then check for updates again and the 1909 update should be offered)
  • Windows 10 Home, Pro, Pro for Workstations and IoT Core, version 1803 have reached end of servicing. These editions won’t receive security updates or other updates after November 12, 2019.

Operating System Distribution

  • Windows 7: 35 vulnerabilities: 4 rated critical and 31 rated important
    • CVE-2019-1389 | Windows Hyper-V Remote Code Execution Vulnerability
    • CVE-2019-1397 | Windows Hyper-V Remote Code Execution Vulnerability
    • CVE-2019-1419 | OpenType Font Parsing Remote Code Execution Vulnerability
    • CVE-2019-1441 | Win32k Graphics Remote Code Execution Vulnerability
  • Windows 8.1: 37 vulnerabilities: 3 rated critical and 34 rated important
    • Same as Windows 7 except for CVE-2019-1441 (not affected)
  • Windows 10 version 1803: 46 vulnerabilities: 5 critical and 41 important
    • CVE-2019-0721 | Hyper-V Remote Code Execution Vulnerability
    • CVE-2019-1389 | Windows Hyper-V Remote Code Execution Vulnerability
    • CVE-2019-1397 | Windows Hyper-V Remote Code Execution Vulnerability
    • CVE-2019-1398 | Windows Hyper-V Remote Code Execution Vulnerability
    • CVE-2019-1419 | OpenType Font Parsing Remote Code Execution Vulnerability
  • Windows 10 version 1809: 46 vulnerabilities: 4 critical and 42 important
    • Same as Windows 10 version 1803 except for CVE-2019-1389 (not affected)
  • Windows 10 version 1903: 46 vulnerabilities: 2 critical and 28 important
    • Same as Windows 10 version 1809 plus
    • CVE-2019-1430 | Microsoft Windows Media Foundation Remote Code Execution Vulnerability

Windows Server products

  • Windows Server 2008 R2: 35 vulnerabilities: 4 critical and 31 important.
    • CVE-2019-1441 | Win32k Graphics Remote Code Execution Vulnerability
    • CVE-2019-1419 | OpenType Font Parsing Remote Code Execution Vulnerability
    • CVE-2019-1397 | Windows Hyper-V Remote Code Execution Vulnerability
    • CVE-2019-1389 | Windows Hyper-V Remote Code Execution Vulnerability
  • Windows Server 2012 R2: 37 vulnerabilities: 3 critical and 34 important.
    • same as Windows Server 2008 R2 except for CVE-2019-1441 (not affected)
  • Windows Server 2016: 38 vulnerabilities: 2 critical and 20 important.
    • same as Windows Server 2008 R2 except for CVE-2019-1441 (not affected)
  • Windows Server 2019: 46 vulnerabilities: 2 critical and 29 are important
    • same as Windows Server 2008 R2 except for CVE-2019-1441 (not affected) plus
    • CVE-2019-0721 | Hyper-V Remote Code Execution Vulnerability

Other Microsoft Products

  • Internet Explorer 11: 2 vulnerabilities: 2 critical
  • Microsoft Edge: 4 vulnerabilities: 4 critical
    • CVE-2019-1413 | Microsoft Edge Security Feature Bypass Vulnerability
    • CVE-2019-1426 | Scripting Engine Memory Corruption Vulnerability
    • CVE-2019-1427 | Scripting Engine Memory Corruption Vulnerability
    • CVE-2019-1428 | Scripting Engine Memory Corruption Vulnerability

Windows Security Updates

Windows 7 SP1 and Windows Server 2008 R2

The security-only update resolves the following issues/makes the following changes:

  • Provides protections against the Intel® Processor Machine Check Error vulnerability (CVE-2018-12207). Note: the protection is not enabled by default. Consult this article for guidance.
  • Provides protections against the Intel® Transactional Synchronization Extensions (Intel® TSX) Transaction Asynchronous Abort vulnerability (CVE-2019-11135). Note: the protection is not enabled by default. Consult the Windows Client or Windows Server guides for guidance.
  • Security updates for various operating system components.

The monthly rollup update includes all of the updates of the security-only update plus:

  • Fixes an issue that prevented certain 16-bit Visual Basic 3 applications or other VB3 applications from running.
  • Fixes a temporary user profile issue when the policy “Delete cached copies of roaming profiles” is set.

Windows 8.1 and Server 2012 R2

The security-only update resolves the following issues/makes the following changes:

  • Same as Windows 7 SP1 and Windows Server 2008 R2.

The monthly rollup update includes all of the updates of the security-only update plus:

  • Same as Windows 7 SP1 and Windows Server 2008 R2 plus
  • Fixes an issue that prevented multiple Bluetooth Basic Rate devices from functioning properly after installing the August 2019 updates.
  • Fixes an issue that caused error 0x7E when connecting Bluetooth devices after installing the June 2019 updates.

Windows 10 version 1803

The cumulative update fixes the following issues / makes the following changes:

  • Fixes an issue that caused Windows Defender Application Control Code Integrity events to become unreadable.
  • Provides protections against the Intel® Processor Machine Check Error vulnerability (CVE-2018-12207). Note: the protection is not enabled by default. Consult this article for guidance.
  • Provides protections against the Intel® Transactional Synchronization Extensions (Intel® TSX) Transaction Asynchronous Abort vulnerability (CVE-2019-11135). Note: the protection is not enabled by default. Consult the Windows Client or Windows Server guides for guidance.
  • Security updates

Windows 10 version 1809

The cumulative update fixes the following issues / makes the following changes:

  • Fixes an issue that could cause the Microsoft Defender Advanced Threat Protection service to stop running or stop sending report data.
  • Provides protections against the Intel® Processor Machine Check Error vulnerability (CVE-2018-12207). Note: the protection is not enabled by default. Consult this article for guidance.
  • Provides protections against the Intel® Transactional Synchronization Extensions (Intel® TSX) Transaction Asynchronous Abort vulnerability (CVE-2019-11135). Note: the protection is not enabled by default. Consult the Windows Client or Windows Server guides for guidance.
  • Security updates

Windows 10 version 1903

The cumulative update lists changes for Windows 10 version 1903 and 1909. It appears that Microsoft included the changes of 1909 in the cumulative update but has not activated them at the time of writing.

  • Fixes an issue in the Keyboard Lockdown Subsystem that might not filter key input correctly.
  • Provides protections against the Intel® Processor Machine Check Error vulnerability (CVE-2018-12207). Note: the protection is not enabled by default. Consult this article for guidance.
  • Provides protections against the Intel® Transactional Synchronization Extensions (Intel® TSX) Transaction Asynchronous Abort vulnerability (CVE-2019-11135). Note: the protection is not enabled by default. Consult the Windows Client or Windows Server guides for guidance.
  • Security updates

Other security updates

  • Internet Explorer Cumulative Update: KB4525106
  • 2019-11 Security Monthly Quality Rollup for Windows Server 2008 (KB4525234)
  • 2019-11 Security Only Quality Update for Windows Server 2008 (KB4525239)
  • 2019-11 Security Monthly Quality Rollup for Windows Embedded 8 Standard and Windows Server 2012 (KB4525246)
  • 2019-11 Security Only Quality Update for Windows Embedded 8 Standard and Windows Server 2012 (KB4525253)
  • 2019-11 Cumulative Update for Windows Server, version 1909 and Windows 10 Version 1909 (KB4524570)
  • 2019-11 Cumulative Update for Windows 10 Version 1507 (KB4525232)
  • 2019-11 Cumulative Update for Windows Server 2016, and Windows 10 Version 1607 (KB4525236)
  • 2019-11 Cumulative Update for Windows 10 Version 1709 (KB4525241)
  • 2019-11 Cumulative Update for Windows 10 Version 1703 (KB4525245)
  • 2019-11 Servicing Stack Update for Windows Server 2016, and Windows 10 Version 1607 (KB4520724)
  • 2019-11 Servicing Stack Update for Windows 10 Version 1507 (KB4523200)
  • 2019-11 Servicing Stack Update for Windows 10 Version 1703 (KB4523201)
  • 2019-11 Servicing Stack Update for Windows 10 Version 1709 (KB4523202)
  • 2019-11 Servicing Stack Update for Windows 10 Version 1803, and Windows Server 2016 (KB4523203)
  • 2019-11 Servicing Stack Update for Windows 10 Version 1809, and Windows Server 2019 (KB4523204)
  • 2019-11 Servicing Stack Update for Windows Embedded Standard 7, Windows 7, and Windows Server 2008 R2 (KB4523206)
  • 2019-11 Servicing Stack Update for Windows Embedded 8 Standard and Windows Server 2012 (KB4523208)
  • 2019-11 Servicing Stack Update for Windows 8.1, Windows RT 8.1, and Windows Server 2012 R2 (KB4524445)
  • 2019-11 Servicing Stack Update for Windows Server, version 1909 and Windows 10 Version 1909 (KB4524569)
  • 2019-11 Servicing Stack Update for Windows Server 2008 (KB4526478)

Known Issues

Windows 8.1 and Windows Server 2012 R2

  • Certain operations may fail on Cluster Shared Volumes with the error code “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”

Windows 10 version 1803

  • Certain operations may fail on Cluster Shared Volumes with the error code “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”
  • May be unable to create a new local user during the Out of Box Experience when using Input Method Editor (IME) — Microsoft recommends setting the keyboard language to English during user creation or to use a Microsoft Account to complete the setup.

Windows 10 version 1809

  • Same as Windows 10 version 1803 plus
  • May receive error “0x800f0982 – PSFX_E_MATCHING_COMPONENT_NOT_FOUND” with some Asian language packs installed.

Windows 10 version 1903

  • May be unable to create a new local user during the Out of Box Experience when using Input Method Editor (IME) — Microsoft recommends setting the keyboard language to English during user creation or to use a Microsoft Account to complete the setup.

Security advisories and updates

ADV190024 | Microsoft Guidance for Vulnerability in Trusted Platform Module (TPM)

Non-security related updates

  • 2019-11 Dynamic Update for Windows 10 Version 1809 (KB4524761)
  • 2019-11 Dynamic Update for Windows 10 Version 1903 (KB4525043)
  • Windows Malicious Software Removal Tool – November 2019 (KB890830)

Microsoft Office Updates

You find Office update information here.

How to download and install the November 2019 security updates

windows updates security november 2019

Most home devices running Windows are configured to download and install security updates when they are released. Users who don’t want to wait for that to happen or have configured their systems to update manually only may run manual checks for updates or download the cumulative updates from Microsoft’s Update Catalog website.

The following needs to be done to check for updates manually:

  1. Open the Start Menu of the Windows operating system, type Windows Update and select the result.
  2. Select check for updates in the application that opens. Updates may be installed automatically when they are found or offered by Windows; this depends on the operating system and version that is used, and update settings.

Direct update downloads

Windows 7 SP1 and Windows Server 2008 R2 SP

  • KB4525235 — 2019-11 Security Monthly Quality Rollup for Windows 7
  • KB4525233 — 2019-11 Security Only Quality Update for Windows 7

Windows 8.1 and Windows Server 2012 R2

  • KB4525243 — 2019-11 Security Monthly Quality Rollup for Windows 8.1
  • KB4525250 — 2019-11 Security Only Quality Update for Windows 8.1

Windows 10 (version 1803)

  • KB4525237 — 2019-11 Cumulative Update for Windows 10 Version 1803

Windows 10 (version 1809)

  • KB4523205 — 2019-11 Cumulative Update for Windows 10 Version 1809

Windows 10 (version 1903)

  • KB4524570 — 2019-11 Cumulative Update for Windows 10 Version 1903

Additional resources

Summary
Microsoft Windows Security Updates November 2019 overview
Article Name
Microsoft Windows Security Updates November 2019 overview
Description
Microsoft released security and non-security updates for the Microsoft Windows operating system and other company products on November 12, 2019.
Author
Martin Brinkmann
Publisher
Ghacks Technology News
Logo
Ghacks Technology News
Advertisement

Related:

  • No Related Posts

Still see issues with Windows 10 Virus & Threat Protection showing “status unavailable”

I need a solution

Hello All,

We’re still seeing the issue described in this post:  https://www.symantec.com/connect/forums/windows-security-center-shows-status-unavailable-wsep-142?ts=1573500650

… but the post was marked as resolved and closed?

The issue:

Windows Defender Security Center – Virus & Threat Protection – Current Threats/Protection Settings/Protection Updates – all show “Status Unavailable”

Environment:

Windows 10 Enterprise – Version 10.0.17763  Build 17763

Symantec Endpoint Protection – Version 14.2.3335.1000 Build 3335

Suggestions?

0

Related:

  • No Related Posts

The connection to Microsoft Exchange is unavailable, Outlook must be online or connected

Microsoft Outlook, at times, is known to give an error saying — The action cannot be completed. The connection to Microsoft Exchange is unavailable, Outlook must be online or connected to complete this action. In this post, we will show how you can fix this problem and get back it to working as usual.

The connection to Microsoft Exchange is unavailable, Outlook must be online or connected to complete this action

The connection to Microsoft Exchange is unavailable, Outlook must be online or connected to complete this action

The connection to Microsoft Exchange is unavailable. Outlook must be online or connected to complete this action

There are two ways to fix tjis issue. First, create a new default profile. Second, Delete the default profile. Not many have multiple Outlook profiles is not always an option. So use the second method as follows:

  1. Delete Default Profile
  2. Create a New Outlook Profile
  3. Update or create your Outlook profile with RPC encryption
  4. Disable the encryption requirement on all CAS servers
  5. Deploy a Group Policy setting to update existing Outlook profiles with RPC encryption

The first, three can be configured by the end-user, while the last two are only for Servers.

1] Delete Default Profile

Change Default Outlook Profile Windows 10

  • Launch Outlook, and then click on Info > Account settings dropdown > Manage Profile
  • It will open the Mail Setup window. Click on Show Profiles button.
  • Delete the default profile by clicking on the Remove button.
  • Restart Outlook.

When you remove the profile, all offline cached content for its account will be removed. However, you can backup the OST profile to reuse it.

When you relaunch Outlook, you will have to create a new profile, and then go through the setup process again.

2] Create a New Outlook Profile

Create New Outlook Profile Windows 10

If you do not want to delete, you can create a new default profile. At the Mail Setup > Profiles section, you can click on the Add button, and then give a name to the profile. Next, you need to add the email accounts you want to add. Make sure to properly configure the email account, so the error doesn’t reappear. Also, make sure to set that as the default profile.

3] Update or create your Outlook profile with RPC encryption

create your Outlook profile with RPC encryption

Most of the users have all email accounts under one single profile. One of the email accounts may be having trouble with that is running Microsoft Exchange Server 2010, Microsoft Exchange Server 2013, or Microsoft Exchange Server 2016. These are usually corporate accounts that haven’t been configured properly.

  1. Launch Outlook, and then click on Info > Account settings dropdown > Manage Profile
  2. Click on E-mail Accounts > select the email which is configured with Exchange Server, and then click on Change > More Settings
  3. In the Microsoft Exchange window, switch to Security tab
  4. Select Encrypt data between Microsoft Office Outlook and Microsoft Exchange.
  5. Click Ok and exit

It should fix the issue if it were because of RPC encryption error.

4] Disable the encryption requirement on all CAS servers

This part is specifically for IT admins who can disable encryption requirements. Microsoft warns that it should be only used where you cannot immediately deploy the necessary RPC encryption settings on your Outlook clients. Run the following command in the Exchange Management Shell:

Set-RpcClientAccess –Server <Exchange server name> –EncryptionRequired:$False

You must run this cmdlet for all Client Access servers that are running Exchange Server 2010 or later version. Rerun this command for each Exchange server that has the Client Access Server role. Also, make sure to disable RPC encryption, which we talked about in the above step.

However, make sure to enable it back again after deployment with changes to the RPC requirement on the Outlook.

5] Deploy a Group Policy setting to update existing Outlook profiles with RPC encryption

Enable RPC Encryption Policy Settings

You can also change RPC settings on the server-side by using Group Policy. Navigate to User Configuration > Administrative Templates > Microsoft Office “Version number” > Account Settings > Exchange. Locate policy Enable RPC encryption and disable it.

We hope these methods helped you to resolve Outlook connected issues with Microsoft Exchange.