The Sentinel64 service failed to start due to the following error: The system cannot find the device specified.

You notice that below event is repeatedly logged on your Windows System event log upon every restart of the system.  Here are couple of details I gathered which may come handy for someone looking for it. Error: Log Name:      SystemSource:        Sentinel64Event ID:      19Task Category: NoneLevel:         WarningKeywords:      ClassicUser:          N/AComputer:      TESTSRV2Description:The description for Event ID 19 from source Sentinel64 cannot be found. Either the component that raises this event is not installed on your local computer or the installation is corrupted. You can install or repair the component on the local computer. If the event originated on another computer, the display information […]

Read more

Certificate Requirements for Setting up AD FS (Active Directory Federation Services)

Certificate Requirements for Setting up AD FS During my recent evaluation of AD FS, I have gone through various articles but there wasn’t any clear mention or details about how the certificates be configured for AD FS.  Here is my attempt to share all of my learning and how I got it setup working.  I found the relevant MS article after I got whole of my setup done, it doesn’t show up in the search results 🙁 Environment: Windows Server 2012 AD FS 3.0 (which comes as default in server 2012 OS) Domain Functional Level: Windows Server 2008 R2 AD […]

Read more

Symantec Endpoint Protection (SEP) Reporting: SQL Stored Procedure to Generate Monthly Reports

It’s the security officers responsibility to overview the firm’s infrastructure risk exposure and trends in real time. Unfortunately, none of the industry leading security products has a feature to create a consolidated risk report that can help the top security officers to review and keep track with risk events. As I’ve great exposure into SEP DB schema, I’ve developed a SQL query that generates a consolidated report in a high level format classifying the risk events into below categories: [code language=”sql”] if user name matches *admin*, report it as "Admin account access" if user name matches "system", report it as […]

Read more