Hi everyone,
May I know why Tamper Protection is not functioning as expected/normally in SEP client 14.3 RU7 (Dark Network Client Installation, delayed restart, feature set: Firewall, ADC control, Advanced Download Protection for Virus, Spyware and Basci Downoad Protection) in Windows 10, which the end user still managed to stop the cCSVcHst.exe process manually.
Workarounds that have been tried to resolve the issue:
- Repair the SEP clients
- Remove the SEP clients from the default group with the default policies since the end users have some of the customized policies.
However, the action of stopping the process has not been logged even though the Tamper Protection logging is enabled.
May I know if there are any workarounds that I can try to resolve the issue or maybe some insight that can help to resolve this issue would be appreciated.
Thank you for the help everyone!