End users may be prompted to allow or block administrative actions that originate from a central management tool after they install Windows AntiSpyware (Beta) on a computer that is managed by Systems Management Server 2003 (892375)
The information in this article applies to:
- Microsoft Systems Management Server 2003
- Microsoft Systems Management Server 2003 SP1
Beta InformationThis article discusses a Beta release of a Microsoft product. The information in this article is provided as-is and is subject to change without notice.
No formal product support is available from Microsoft for this Beta product. For information about how to obtain support for a Beta release, see the documentation that is included with the Beta product files, or check the Web location where you downloaded the release.SYMPTOMSEnd users might be prompted to allow or block a Systems Management Server (SMS) script that a domain administrator has scheduled to run against an end user's computer. This occurs after Microsoft Windows AntiSpyware (Beta) is installed on end-user computers in an enterprise-managed environment. CAUSEThere is a potential issue between Windows AntiSpyware (Beta) and computers that are managed in an enterprise. Windows AntiSpyware (Beta) might prompt the end user to make decisions whether to allow or block administrative actions that originate from a central management tool.
Microsoft is currently aware that a potential issue exists with Microsoft Systems Management Server (SMS). Other programs might be affected in similar ways by Windows AntiSpyware (Beta).WORKAROUNDIn an enterprise-managed environment, you can work around the problem by turning off the "Real-time spyware threat protection" feature in Windows AntiSpyware (Beta). To do this, follow these steps: - In the the notification area at the far right of the taskbar, right-click the Microsoft Windows AntiSpyware (beta1) icon, point to Security Agents Status, and then click Disable Real-Time Protection.
- Delete the following registry value:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks\{9EF34FF2-3396-4527-9D27-04C8C1C67806}
Modification Type: | Major | Last Reviewed: | 1/13/2005 |
---|
Keywords: | kbprb KB892375 kbAudDeveloper |
---|
|