2013-04-16 10:32:35 INFO:no default set for reboot_schedule_settings in getHomepageConfigValue() 2013-04-16 10:32:35 INFO:no default set for reboot_prompt_message in getHomepageConfigValue() 2013-04-16 10:33:18 ERROR:
QUERY: select PAT1.VERSION as IPS_VERSION, SA.AGENT_ID, SA.AGENT_TYPE, SA.R_OS_TYPE, SA.COMPUTER_ID, SA.DOMAIN_ID, SA.GROUP_ID, SA.PROFILE_VERSION, SA.PROFILE_SERIAL_NO, SA.PROFILE_CHECKSUM, SA.IDS_VERSION, SA.IDS_SERIAL_NO, SA.IDS_CHECKSUM, SA.HI_STATUS, SA.HI_REASONCODE, SA.HI_REASONDESC, convert(varchar,DATEADD(second, (SA.CREATION_TIME - 25200)/1000, '19700101'),120) as CREATION_TIME, SA.STATUS, convert(varchar,DATEADD(second, (SA.LAST_UPDATE_TIME - 25200)/1000, '19700101'),120) as LAST_UPDATE_TIME, SA.LAST_SERVER_ID, SA.LAST_SITE_ID, SA.ATTRIBUTE_EXTENSION, SA.FULL_NAME, SA.EMAIL, SA.JOB_TITLE, SA.DEPARTMENT, SA.EMPLOYEE_NUMBER, SA.EMPLOYMENT_STATUS, SA.OFFICE_PHONE, SA.MOBILE_PHONE, SA.HOME_PHONE, SA.USN, convert(varchar,DATEADD(second, (SA.TIME_STAMP - 25200)/1000, '19700101'),120) as TIME_STAMP, SA.DELETED, SA.PATTERN_IDX, SA.AP_ONOFF, SA.INFECTED, CAST( case when (SA.AGENT_TYPE = '151' or SA.AGENT_TYPE = '300') then 'SNAC' when (SA.AP_ONOFF in (0,1,3,4) and SA.FIREWALL_ONOFF in (0,1)) then 'ALL' when (SA.AP_ONOFF in (0,1,3,4) and SA.FIREWALL_ONOFF not in (0,1)) then 'AV_ONLY' when (SA.AP_ONOFF = 2) then 'FW_ONLY' else 'NONE' end as VARCHAR) as PROTECTION_TECHNOLOGY, SA.WORSTINFECTION_IDX, convert(varchar,DATEADD(second, (SA.LAST_SCAN_TIME - 25200)/1000, '19700101'),120) as LAST_SCAN_TIME, convert(varchar,DATEADD(second, (SA.LAST_VIRUS_TIME - 25200)/1000, '19700101'),120) as LAST_VIRUS_TIME, SA.CONTENT_UPDATE, SA.AVENGINE_ONOFF, SA.TAMPER_ONOFF, SA.CIDS_BROWSER_IE_ONOFF, SA.CIDS_BROWSER_FF_ONOFF, SA.ELAM_ONOFF, SA.CIDS_DRV_ONOFF, SA.CIDS_SILENT_MODE, SA.DA_ONOFF, SA.PTP_ONOFF, SA.MAJOR_VERSION, SA.MINOR_VERSION, SA.REBOOT_REQUIRED, SA.REBOOT_REASON, SA.LICENSE_STATUS, SA.LICENSE_EXPIRY, SA.TIMEZONE, SA.FIREWALL_ONOFF, convert(varchar,DATEADD(second, (SA.LAST_DOWNLOAD_TIME - 25200)/1000, '19700101'),120) as LAST_DOWNLOAD_TIME, I.COMPUTER_ID as COMPUTER_IDX, I.HARDWARE_KEY as HARDWARE_KEY, I.COMPUTER_NAME as COMPUTER, I.COMPUTER_DOMAIN_NAME, I.OS_LANG, (I.DISK_TOTAL/1048576) as DISK_TOTAL, (I.MEMORY/1048576) as MEMORY, I.COMPUTER_DESCRIPTION, I.OPERATION_SYSTEM, I.SERVICE_PACK, I.PROCESSOR_TYPE, I.PROCESSOR_CLOCK, I.PROCESSOR_NUM, I.BIOS_VERSION, I.TPM_DEVICE, cast(I.IP_ADDR1_TEXT + ',' + I.IP_ADDR2_TEXT + ',' + I.IP_ADDR3_TEXT + ',' + I.IP_ADDR4_TEXT as varchar(128)) as IP_ADDRESSES, cast(I.GATEWAY1_TEXT + ',' + I.GATEWAY2_TEXT + ',' + I.GATEWAY3_TEXT + ',' + I.GATEWAY4_TEXT as varchar(128)) as GATEWAYS, cast(I.MAC_ADDR1 + ',' + I.MAC_ADDR2 + ',' + I.MAC_ADDR3 + ',' + I.MAC_ADDR4 as varchar(128)) as MAC_ADDRESSES, cast(I.DNS_SERVER1_TEXT + ',' + I.DNS_SERVER2_TEXT + ',' + I.WINS_SERVER1_TEXT + ',' + I.WINS_SERVER2_TEXT as varchar(128)) as DNS_WINS, I.DHCP_SERVER_TEXT as DHCP_SERVER_1, (SA.FREE_MEM/1048576) as FREE_MEM, (SA.FREE_DISK/1048576) as FREE_DISK, convert(varchar,DATEADD(second, (SA.LAST_UPDATE_TIME - 25200)/1000, '19700101'),120) as LASTCHECKINTIME1, left( convert (varchar, PAT.PATTERNDATE, 120), 10 ) as PATTERNDATE1, PAT.SEQUENCE, PAT.REVISION, PAT.VERSION, PAT.INSERTDATETIME, SA.AGENT_VERSION, P.NAME as PARENTSERVER, Q.NAME as LASTSITE, G.NAME as CLIENTGROUP, S.NAME as SERVERGROUP, I.CURRENT_LOGIN_USER as CLIENTUSER, I.CURRENT_LOGIN_DOMAIN as CURRENTLOGINDOMAIN, SA.AP_ONOFF as ONOFF, SA.INFECTED as INFECTED, SA.DEPLOY_STATUS as DEPLOY_STATUS from V_AGENT_INCL_GROUP_ID as SA with (NOLOCK) LEFT OUTER JOIN GROUP_HI_STATUS GHS ON GHS.GROUP_ID = SA.GROUP_ID LEFT OUTER JOIN PATTERN PAT on SA.PATTERN_IDX=PAT.PATTERN_IDX INNER JOIN V_GROUPS G on G.ID=SA.GROUP_ID INNER JOIN V_SERVERS P on P.ID=SA.LAST_SERVER_ID INNER JOIN V_DOMAINS S on S.ID=SA.DOMAIN_ID INNER JOIN IDENTITY_MAP Q on Q.ID=SA.LAST_SITE_ID INNER JOIN V_SEM_COMPUTER I on I.COMPUTER_ID=SA.COMPUTER_ID LEFT OUTER JOIN (SELECT SA2.AGENT_ID,PAT2.PATTERN_TYPE, MAX(PAT2.VERSION) as VERSION from V_AGENT_INCL_GROUP_ID SA2 with (NOLOCK) INNER JOIN SEM_CONTENT CON2 with (NOLOCK) on CON2.AGENT_ID=SA2.AGENT_ID INNER JOIN PATTERN PAT2 with (NOLOCK) on PAT2.PATTERN_IDX=CON2.PATTERN_IDX where CON2.DELETED=0 and PAT2.PATTERN_TYPE='DEUCE_SIG' group by SA2.AGENT_ID,PAT2.PATTERN_TYPE) PAT1 on PAT1.AGENT_ID=SA.AGENT_ID where I.DELETED = 0 and (DATEADD(second, SA.LAST_UPDATE_TIME/1000, '19700101') >= cast({ts'2013-03-16 16:32:00'} as datetime) OR SA.LAST_UPDATE_TIME = 0) AND ((GHS.GROUP_ID IS NOT NULL) OR (Q.TYPE ='LegacyGroup')) and SA.DELETED='0' and (SA.IS_NPVDI_CLIENT = 0 OR SA.STATUS = 1) order by SA.INFECTED desc , LAST_UPDATE_TIME DESC, SA.AGENT_ID DESC
EXCEPTION: exception 'com_exception' with message 'Source: Microsoft OLE DB Provider for ODBC Drivers
Description: [Microsoft][ODBC SQL Server Driver][SQL Server]Arithmetic overflow error converting expression to data type int.' in D:\Program Files\Symantec\Symantec Endpoint Protection Manager\Php\Include\Common\ado.php:515 Stack trace: #0 D:\Program Files\Symantec\Symantec Endpoint Protection Manager\Php\Include\Common\ado.php(515): com->Execute(' select ...', -1) #1 D:\Program Files\Symantec\Symantec Endpoint Protection Manager\Php\Include\Common\ado.php(275): ado_doPreparedStatement('select??? ...', Object(com)) #2 D:\Program Files\Symantec\Symantec Endpoint Protection Manager\Php\Include\Common\connectdb.php(209): ado_query('select??? ...', Object(com), false) #3 D:\Program Files\Symantec\Symantec Endpoint Protection Manager\Inetpub\Reporting\Inventory\export_inventory.php(80): sav_query('select??? ...', Object(com)) #4 {main}Error message: Source: Microsoft OLE DB Provider for ODBC Drivers
Description: [Microsoft][ODBC SQL Server Driver][SQL Server]Arithmetic overflow error converting expression to data type int.
Error code: -2147352567
File and line: D:\Program Files\Symantec\Symantec Endpoint Protection Manager\Php\Include\Common\ado.php(515)
Trace: #0 D:\Program Files\Symantec\Symantec Endpoint Protection Manager\Php\Include\Common\ado.php(515): com->Execute(' select ...', -1) #1 D:\Program Files\Symantec\Symantec Endpoint Protection Manager\Php\Include\Common\ado.php(275): ado_doPreparedStatement('select??? ...', Object(com)) #2 D:\Program Files\Symantec\Symantec Endpoint Protection Manager\Php\Include\Common\connectdb.php(209): ado_query('select??? ...', Object(com), false) #3 D:\Program Files\Symantec\Symantec Endpoint Protection Manager\Inetpub\Reporting\Inventory\export_inventory.php(80): sav_query('select??? ...', Object(com)) #4 {main}