2013-04-16 10:32:35 INFO:no default set for reboot_schedule_settings in getHomepageConfigValue()
2013-04-16 10:32:35 INFO:no default set for reboot_prompt_message in getHomepageConfigValue()
2013-04-16 10:33:18 ERROR:
QUERY: select
PAT1.VERSION as IPS_VERSION,
SA.AGENT_ID,
SA.AGENT_TYPE,
SA.R_OS_TYPE,
SA.COMPUTER_ID,
SA.DOMAIN_ID,
SA.GROUP_ID,
SA.PROFILE_VERSION,
SA.PROFILE_SERIAL_NO,
SA.PROFILE_CHECKSUM,
SA.IDS_VERSION,
SA.IDS_SERIAL_NO,
SA.IDS_CHECKSUM,
SA.HI_STATUS,
SA.HI_REASONCODE,
SA.HI_REASONDESC,
convert(varchar,DATEADD(second, (SA.CREATION_TIME - 25200)/1000, '19700101'),120) as CREATION_TIME,
SA.STATUS,
convert(varchar,DATEADD(second, (SA.LAST_UPDATE_TIME - 25200)/1000, '19700101'),120) as LAST_UPDATE_TIME,
SA.LAST_SERVER_ID,
SA.LAST_SITE_ID,
SA.ATTRIBUTE_EXTENSION,
SA.FULL_NAME,
SA.EMAIL,
SA.JOB_TITLE,
SA.DEPARTMENT,
SA.EMPLOYEE_NUMBER,
SA.EMPLOYMENT_STATUS,
SA.OFFICE_PHONE,
SA.MOBILE_PHONE,
SA.HOME_PHONE,
SA.USN,
convert(varchar,DATEADD(second, (SA.TIME_STAMP - 25200)/1000, '19700101'),120) as TIME_STAMP,
SA.DELETED,
SA.PATTERN_IDX,
SA.AP_ONOFF,
SA.INFECTED,
CAST( case when (SA.AGENT_TYPE = '151' or SA.AGENT_TYPE = '300') then 'SNAC'
when (SA.AP_ONOFF in (0,1,3,4) and SA.FIREWALL_ONOFF in (0,1)) then 'ALL'
when (SA.AP_ONOFF in (0,1,3,4) and SA.FIREWALL_ONOFF not in (0,1)) then 'AV_ONLY'
when (SA.AP_ONOFF = 2) then 'FW_ONLY'
else 'NONE' end as VARCHAR) as PROTECTION_TECHNOLOGY,
SA.WORSTINFECTION_IDX,
convert(varchar,DATEADD(second, (SA.LAST_SCAN_TIME - 25200)/1000, '19700101'),120) as LAST_SCAN_TIME,
convert(varchar,DATEADD(second, (SA.LAST_VIRUS_TIME - 25200)/1000, '19700101'),120) as LAST_VIRUS_TIME,
SA.CONTENT_UPDATE,
SA.AVENGINE_ONOFF,
SA.TAMPER_ONOFF,
SA.CIDS_BROWSER_IE_ONOFF,
SA.CIDS_BROWSER_FF_ONOFF,
SA.ELAM_ONOFF,
SA.CIDS_DRV_ONOFF,
SA.CIDS_SILENT_MODE,
SA.DA_ONOFF,
SA.PTP_ONOFF,
SA.MAJOR_VERSION,
SA.MINOR_VERSION,
SA.REBOOT_REQUIRED,
SA.REBOOT_REASON,
SA.LICENSE_STATUS,
SA.LICENSE_EXPIRY,
SA.TIMEZONE,
SA.FIREWALL_ONOFF,
convert(varchar,DATEADD(second, (SA.LAST_DOWNLOAD_TIME - 25200)/1000, '19700101'),120) as LAST_DOWNLOAD_TIME,
I.COMPUTER_ID as COMPUTER_IDX,
I.HARDWARE_KEY as HARDWARE_KEY,
I.COMPUTER_NAME as COMPUTER,
I.COMPUTER_DOMAIN_NAME,
I.OS_LANG,
(I.DISK_TOTAL/1048576) as DISK_TOTAL,
(I.MEMORY/1048576) as MEMORY,
I.COMPUTER_DESCRIPTION,
I.OPERATION_SYSTEM,
I.SERVICE_PACK,
I.PROCESSOR_TYPE,
I.PROCESSOR_CLOCK,
I.PROCESSOR_NUM,
I.BIOS_VERSION,
I.TPM_DEVICE,
cast(I.IP_ADDR1_TEXT + ',' + I.IP_ADDR2_TEXT + ',' + I.IP_ADDR3_TEXT + ',' + I.IP_ADDR4_TEXT as varchar(128)) as IP_ADDRESSES,
cast(I.GATEWAY1_TEXT + ',' + I.GATEWAY2_TEXT + ',' + I.GATEWAY3_TEXT + ',' + I.GATEWAY4_TEXT as varchar(128)) as GATEWAYS,
cast(I.MAC_ADDR1 + ',' + I.MAC_ADDR2 + ',' + I.MAC_ADDR3 + ',' + I.MAC_ADDR4 as varchar(128)) as MAC_ADDRESSES,
cast(I.DNS_SERVER1_TEXT + ',' + I.DNS_SERVER2_TEXT + ',' + I.WINS_SERVER1_TEXT + ',' + I.WINS_SERVER2_TEXT as varchar(128)) as DNS_WINS,
I.DHCP_SERVER_TEXT as DHCP_SERVER_1,
(SA.FREE_MEM/1048576) as FREE_MEM,
(SA.FREE_DISK/1048576) as FREE_DISK,
convert(varchar,DATEADD(second, (SA.LAST_UPDATE_TIME - 25200)/1000, '19700101'),120) as LASTCHECKINTIME1,
left( convert (varchar, PAT.PATTERNDATE, 120), 10 ) as PATTERNDATE1,
PAT.SEQUENCE,
PAT.REVISION,
PAT.VERSION,
PAT.INSERTDATETIME,
SA.AGENT_VERSION,
P.NAME as PARENTSERVER,
Q.NAME as LASTSITE,
G.NAME as CLIENTGROUP,
S.NAME as SERVERGROUP,
I.CURRENT_LOGIN_USER as CLIENTUSER,
I.CURRENT_LOGIN_DOMAIN as CURRENTLOGINDOMAIN,
SA.AP_ONOFF as ONOFF,
SA.INFECTED as INFECTED,
SA.DEPLOY_STATUS as DEPLOY_STATUS
from V_AGENT_INCL_GROUP_ID as SA with (NOLOCK)
LEFT OUTER JOIN GROUP_HI_STATUS GHS ON GHS.GROUP_ID = SA.GROUP_ID
LEFT OUTER JOIN PATTERN PAT on SA.PATTERN_IDX=PAT.PATTERN_IDX
INNER JOIN V_GROUPS G on G.ID=SA.GROUP_ID
INNER JOIN V_SERVERS P on P.ID=SA.LAST_SERVER_ID
INNER JOIN V_DOMAINS S on S.ID=SA.DOMAIN_ID
INNER JOIN IDENTITY_MAP Q on Q.ID=SA.LAST_SITE_ID
INNER JOIN V_SEM_COMPUTER I on I.COMPUTER_ID=SA.COMPUTER_ID LEFT OUTER JOIN (SELECT SA2.AGENT_ID,PAT2.PATTERN_TYPE, MAX(PAT2.VERSION) as VERSION from V_AGENT_INCL_GROUP_ID SA2 with (NOLOCK)
INNER JOIN SEM_CONTENT CON2 with (NOLOCK) on CON2.AGENT_ID=SA2.AGENT_ID
INNER JOIN PATTERN PAT2 with (NOLOCK) on PAT2.PATTERN_IDX=CON2.PATTERN_IDX
where CON2.DELETED=0
and PAT2.PATTERN_TYPE='DEUCE_SIG'
group by SA2.AGENT_ID,PAT2.PATTERN_TYPE) PAT1 on PAT1.AGENT_ID=SA.AGENT_ID
where I.DELETED = 0 and (DATEADD(second, SA.LAST_UPDATE_TIME/1000, '19700101') >= cast({ts'2013-03-16 16:32:00'} as datetime) OR SA.LAST_UPDATE_TIME = 0) AND ((GHS.GROUP_ID IS NOT NULL) OR (Q.TYPE ='LegacyGroup')) and SA.DELETED='0' and (SA.IS_NPVDI_CLIENT = 0 OR SA.STATUS = 1)
order by SA.INFECTED desc , LAST_UPDATE_TIME DESC, SA.AGENT_ID DESC
EXCEPTION: exception 'com_exception' with message 'Source: Microsoft OLE DB Provider for ODBC Drivers
Description: [Microsoft][ODBC SQL Server Driver][SQL Server]Arithmetic overflow error converting expression to data type int.' in D:\Program Files\Symantec\Symantec Endpoint Protection Manager\Php\Include\Common\ado.php:515
Stack trace:
#0 D:\Program Files\Symantec\Symantec Endpoint Protection Manager\Php\Include\Common\ado.php(515): com->Execute(' select ...', -1)
#1 D:\Program Files\Symantec\Symantec Endpoint Protection Manager\Php\Include\Common\ado.php(275): ado_doPreparedStatement('select??? ...', Object(com))
#2 D:\Program Files\Symantec\Symantec Endpoint Protection Manager\Php\Include\Common\connectdb.php(209): ado_query('select??? ...', Object(com), false)
#3 D:\Program Files\Symantec\Symantec Endpoint Protection Manager\Inetpub\Reporting\Inventory\export_inventory.php(80): sav_query('select??? ...', Object(com))
#4 {main}Error message: Source: Microsoft OLE DB Provider for ODBC Drivers
Description: [Microsoft][ODBC SQL Server Driver][SQL Server]Arithmetic overflow error converting expression to data type int.
Error code: -2147352567
File and line: D:\Program Files\Symantec\Symantec Endpoint Protection Manager\Php\Include\Common\ado.php(515)
Trace: #0 D:\Program Files\Symantec\Symantec Endpoint Protection Manager\Php\Include\Common\ado.php(515): com->Execute(' select ...', -1)
#1 D:\Program Files\Symantec\Symantec Endpoint Protection Manager\Php\Include\Common\ado.php(275): ado_doPreparedStatement('select??? ...', Object(com))
#2 D:\Program Files\Symantec\Symantec Endpoint Protection Manager\Php\Include\Common\connectdb.php(209): ado_query('select??? ...', Object(com), false)
#3 D:\Program Files\Symantec\Symantec Endpoint Protection Manager\Inetpub\Reporting\Inventory\export_inventory.php(80): sav_query('select??? ...', Object(com))
#4 {main}