File Sync between HA pair ADM is broken or not working

ADM-HA file sync is broken. ADC ns.confand backup files are not synced anymore from HA1 to HA2.


[root@ CitrixADM:/var/mps/tenants/root/ns_conf] ls -altr */ns.conf | tail -5

-rw-rw-r– 1 pgxl nobody 692153 May 12 20:43 192.168.X.x/ns.conf

-rw-rw-r– 1 pgxl nobody 4223103 May 12 21:08 192.168.X.X/ns.conf

-rw-rw-r– 1 pgxl nobody 32625 May 13 04:48 192.168.X.X/ns.conf


[root@ CitrixADM-Sec:/var/mps/tenants/root/ns_conf] ls -altr */ns.conf | tail -5

-rw-rw-r– 1 pgxl nobody 472707 Dec 5 20:20 192.168.X.X/ns.conf

-rw-r–r– 1 pgxl nobody 472214 Dec 5 20:20 192.168.X.X/ns.conf

-rw-rw-r– 1 pgxl nobody 3853285 Dec 6 15:34 192.168.X.X/ns.conf

From mps_config.log:

Sunday, 1 Dec 19 01:32:30.958 +0000 [Error] [DeviceFilesDownload[#61]] SCP failed for: /var/mps/tenants/root/ns_conf/tmp_194.69.x.x/ns_config.tgz

Saturday, 7 Dec 19 15:45:23.265 +0000 [Debug] [ConfigScheduler[#2]] ns_conf_file_mgr::deleteNS::directory deleted: /var/mps/tenants/root/ns_conf/192.168.x.x

Saturday, 7 Dec 19 15:45:25.938 +0000 [Debug] [ConfigScheduler[#2]] ns_conf_file_mgr::deleteNS::directory deleted: /var/mps/tenants/root/ns_conf/192.168.x.x

Saturday, 7 Dec 19 15:46:12.703 +0000 [Debug] [ConfigScheduler[#2]] ns_conf_file_mgr::deleteNS::directory deleted: /var/mps/tenants/root/ns_conf/192.168.x.x

Saturday, 7 Dec 19 15:46:35.729 +0000 [Debug] [ConfigScheduler[#2]] ns_conf_file_mgr::deleteNS::directory deleted: /var/mps/tenants/root/ns_conf/192.168.x.x

Sunday, 8 Dec 19 02:31:25.018 +0000 [Error] [DeviceFilesDownload[#98]] SCP failed for: /var/mps/tenants/root/ns_conf/tmp_192.168.X.X/ns_config.tgz

Tuesday, 10 Dec 19 03:46:08.947 +0000 [Debug] [DeviceFilesDownload[#134]] execute Command Output with error dump : tar: Error opening archive: Failed to open ‘/var/mps/tenants/root/ns_conf/tmp_192.168.x.x/ns_config.tgz’

Tuesday, 10 Dec 19 03:46:08.947 +0000 [Error] [DeviceFilesDownload[#134]] ConfFileFromNS::run::untar command “tar xzf /var/mps/tenants/root/ns_conf/tmp_192.168.x.x/ns_config.tgz -C /var/mps/tenants/root/ns_conf/tmp_192.168.x.x” returned error


  • No Related Posts

Silent Uninstall For Tonight’s Removal

I need a solution

We recently aquired a customer who’s previous support used, we worked with them to temp remove the uninstall password but for some reason the uninstall key listed in the registry did not work.

If someone could let us know how to mass deploy a silent uninstal it would most helpful as we lost our ability now to remove the uninstall password since it was curtesy of them and they dont want to remove the password for too long since it effects all of their clinets, and all I can find is the cleanwipe tool but for some reason it doesnt seem to have any built-in switches.

If Symantec does not have a way then we will have to remote into each individual machine large count and perform the uninstall manually, please help!



Does Altiris support deployment of MSIX format packages

I do not need a solution (just sharing information)


Currently in our enviornment, Atiris as deployment solution of Win OS, MSI packages and legacy setups. As Microsoft is already relased a new tool named  MSIX packaging tool to manage the automate installaton of application installers of format of exe, msi, appx (appv ) to new format MSIX.

Need to know Altiris deployment kit would support the MSIX format packages/installer to deploy in an enterprise level ? If not , does Symantec is going to release new version of Altiris deployment tool to support the msix format ?.





  • No Related Posts

Sophos Anti Virus for Linux – Malicious Traffic Detection when enabled, can cause High CPU usage

This article confirms the expected behaviour of Malicious Traffic Detection when it is enabled as part of Sophos Anti Virus for Linux

Applies to the following Sophos product(s) and version(s)

Sophos Anti-Virus for Linux

Central Sophos Anti-Virus for Linux Version 10.4.1

Malicious Traffic Detection

Malicious Traffic Detection (MTD) on Linux server can be a very effective tool and is a valuable feature in many environments. In certain situations though, it can consume a notable amount of CPU time, this means it is not always an appropriate feature to enable.

Although MTD only actually queries packets like TCP, HTTP and HTTPS, and exclusions can be set to ignore data to specific addresses, every single packet needs to be touched to confirm what type of data packet it is or where it is going. This means that making configuration changes to reduce the scan look-ups “may” in some circumstances help a little, there is nothing that can be done to reduce the work load in making that initial scan.

For this reason, systems with a high network presence, like web-servers or file-servers, may experience periods of very high CPU usage as all the network data is touched. Sophos recommends testing the MTD feature on your Linux Servers before rolling it out fully. Note: The CPU peak usage may lag behind the network peaks..

Related information / See also

Sophos Malicious Traffic Detection: Frequently asked questions (FAQ)

Introduction to Central managed Sophos with Malicious Traffic Detection functionality


  • No Related Posts

Sophos Anti-Virus for Linux and Unix: How to uninstall

This knowledge base article provides the command to use to uninstall the Sophos Anti-Virus for Linux and Unix.

Applies to the following Sophos products and versions

Sophos Anti-Virus for Unix

Sophos Anti-Virus for Linux

On a console terminal of each Linux or Unix computer, run the uninstall script through the command: /opt/sophos-av/

This deletes the following:

  • All entries from the system startup that are associated with Sophos Anti-Virus
  • The Sophos Anti-Virus man pages in /usr/share/man
  • The savscan on-demand scanner in /usr/local/bin
  • /opt/sophos-av and its contents

If you’ve spotted an error or would like to provide feedback on this article, please use the section below to rate and comment on the article.

This is invaluable for us to ensure that we continually strive to give our customers the best information possible.


  • No Related Posts

Is there a command line to uninstall SEP 14 with uninstallation password?

I need a solution


I have Symantec EP ver 14 installed on more than 1500 clients, they are all managed via SEPM and an uninstallation password is set to prevent the users from uninstalling SEP on their machines.

Is there a command (or a script) to uninstall Symantec using an attribute for the uninstallation password in that command or script?

Thanks and regards,