Closed ghost closed 3 years ago
@manishgupta-qasource Please review
Reviewed & Assigned to @EricDavisX
@ferullo is this one for your group to research or you want the Agent side to poke it first? @ph I tried to get a quick second opinion on our 8.0 based Demo / Test env but it has a deploy problem so could not tell us anything - but even just days ago it was working fine to deploy to Win 2019 daily (I think last time I checked was before the 7.11 BC1 build)
Is test signing enabled or disabled on this machine?
Hi @ferullo
Test-Signing was enabled on both the server machines
thanks !!
Hi @karanbirsingh-qasource could you please try installing Endpoint without Agent so we can see log messages from when Endpoint tries to install. This is not a supported way to run Endpoint so please don't try to do further testing on Endpoint other than install (and if it happens to work, uninstall).
endpoint-security-8.0.0-SNAPSHOT-windows-x86_64.zip
.unzip endpoint-security-8.0.0-SNAPSHOT-windows-x86_64.zip
)cd endpoint-security-8.0.0-SNAPSHOT-windows-x86_64
)endpoint-security.exe install --resources endpoint-security-resources.zip --log stdout --log-level trace
)endpoint-security.exe uninstall --log stdout --log-level trace
)Thanks @ferullo for providing the detailed steps for only endpoint security installation .
we have followed the shared steps on the freshly created machines [ 2019 & 2012R2 Server Machine] .
Please find below complete details.
Build Details;
Platform: Staging
Version: 8.0.0-SNAPSHOT
Commit:a5cfc7fb4a7ce0363b73a118299e228e925814df
Build:39211
endpoint-security-8.0.0-SNAPSHOT-windows-x86_64.zip
2019 Server Machine
4. Enter the created subdirectory (`cd endpoint-security-8.0.0-SNAPSHOT-windows-x86_64`)
Install Endpoint and share the output back to us (
endpoint-security.exe install --resources endpoint-security-resources.zip --log stdout --log-level trace
) CMD logs:C:\Program Files\endpoint-security-8.0.0-SNAPSHOT-windows-x86_64>endpoint-security.exe install --resources endpoint-security-resources.zip --log stdout --log-level trace 2020-12-29 07:58:11: info: Main.cpp:228 Executing install (protected) 2020-12-29 07:58:11: info: InstallLib.cpp:181 Installing from endpoint-security-resources.zip 2020-12-29 07:58:11: info: Internal.cpp:188 Extracting installation artifacts 2020-12-29 07:58:12: info: Internal.cpp:353 Writing installation file C:\Program Files\Elastic\Endpoint\elastic-endpoint.yaml 2020-12-29 07:58:12: info: Internal.cpp:353 Writing installation file C:\Windows\System32\Drivers\elastic-endpoint-driver.sys 2020-12-29 07:58:12: info: Internal.cpp:353 Writing installation file C:\Windows\System32\Drivers\eelam.sys 2020-12-29 07:58:12: info: Internal.cpp:353 Writing installation file C:\Program Files\Elastic\Endpoint\SecurityProductInformation.ini 2020-12-29 07:58:12: info: Internal.cpp:353 Writing installation file C:\Program Files\Elastic\Endpoint\elastic-endpoint.exe 2020-12-29 07:58:12: info: Internal.cpp:353 Writing installation file C:\Program Files\Elastic\Endpoint\cache\artifacts\global-artifacts\endpointpe-v4-model 2020-12-29 07:58:12: info: Internal.cpp:353 Writing installation file C:\Program Files\Elastic\Endpoint\cache\artifacts\global-artifacts\endpointpe-v4-exceptionlist 2020-12-29 07:58:12: info: Internal.cpp:353 Writing installation file C:\Program Files\Elastic\Endpoint\cache\artifacts\global-artifacts\endpointpe-v4-blocklist 2020-12-29 07:58:12: info: Internal.cpp:353 Writing installation file C:\Program Files\Elastic\Endpoint\cache\artifacts\global-artifacts\diagnostic-ransomware-v1-windows 2020-12-29 07:58:12: info: Internal.cpp:353 Writing installation file C:\Program Files\Elastic\Endpoint\cache\artifacts\global-artifacts\global-exceptionlist-windows 2020-12-29 07:58:12: info: Internal.cpp:353 Writing installation file C:\Program Files\Elastic\Endpoint\cache\artifacts\global-artifacts\global-trustlist-windows-v1 2020-12-29 07:58:12: info: Internal.cpp:353 Writing installation file C:\Program Files\Elastic\Endpoint\cache\artifacts\global-artifacts\diagnostic-configuration-v1 2020-12-29 07:58:12: info: Internal.cpp:353 Writing installation file C:\Program Files\Elastic\Endpoint\cache\artifacts\global-artifacts\manifest.json 2020-12-29 07:58:12: info: Internal.cpp:353 Writing installation file C:\Program Files\Elastic\Endpoint\cache\artifacts\global-artifacts\manifest.sig 2020-12-29 07:58:12: info: Internal.cpp:353 Writing installation file C:\Program Files\Elastic\Endpoint\cache\resources\elastic-endpoint-security.png 2020-12-29 07:58:12: debug: Util.cpp:721 Creating service to start "C:\Program Files\Elastic\Endpoint\elastic-endpoint.exe" run 2020-12-29 07:58:12: info: Util.cpp:317 Endpoint restart settings [ElasticEndpoint] count=15 delay=15 reset=600 2020-12-29 07:58:12: debug: Service.cpp:803 PPL is supported 2020-12-29 07:58:12: info: Util.cpp:596 PPL is enabled 2020-12-29 07:58:12: debug: Util.cpp:246 Setting up minifilter registry keys successful.
If Endpoint installed, uninstall it (
endpoint-security.exe uninstall --log stdout --log-level trace
) No Endpoint entry reflect onSecurity/Administration/Endpoints
page
Endpoint Logs (location : C:\Users\zeus\Desktop\Endpoint\state\log) endpoint-000000-2019-Machine.zip
2012 R2 Server Machine
4. Enter the created subdirectory (`cd endpoint-security-8.0.0-SNAPSHOT-windows-x86_64`)
- Install Endpoint and share the output back to us (
endpoint-security.exe install --resources endpoint-security-resources.zip --log stdout --log-level trace
) CMD logs:C:\Windows\system32>cd C:\Program Files\endpoint-security-8.0.0-SNAPSHOT-windows -x86_64
C:\Program Files\endpoint-security-8.0.0-SNAPSHOT-windows-x86_64>endpoint-securi ty.exe install --resources endpoint-security-resources.zip --log stdout --log-le vel trace 2020-12-29 07:03:26: info: Main.cpp:228 Executing install (protected) 2020-12-29 07:03:26: info: InstallLib.cpp:181 Installing from endpoint-security- resources.zip 2020-12-29 07:03:26: info: Internal.cpp:188 Extracting installation artifacts 2020-12-29 07:03:26: info: Internal.cpp:353 Writing installation file C:\Program Files\Elastic\Endpoint\elastic-endpoint.yaml 2020-12-29 07:03:26: info: Internal.cpp:353 Writing installation file C:\Windows \System32\Drivers\elastic-endpoint-driver.sys 2020-12-29 07:03:26: info: Internal.cpp:353 Writing installation file C:\Windows \System32\Drivers\eelam.sys 2020-12-29 07:03:26: info: Internal.cpp:353 Writing installation file C:\Program Files\Elastic\Endpoint\SecurityProductInformation.ini 2020-12-29 07:03:26: info: Internal.cpp:353 Writing installation file C:\Program Files\Elastic\Endpoint\elastic-endpoint.exe 2020-12-29 07:03:27: info: Internal.cpp:353 Writing installation file C:\Program Files\Elastic\Endpoint\cache\artifacts\global-artifacts\endpointpe-v4-model 2020-12-29 07:03:27: info: Internal.cpp:353 Writing installation file C:\Program Files\Elastic\Endpoint\cache\artifacts\global-artifacts\endpointpe-v4-exception list 2020-12-29 07:03:27: info: Internal.cpp:353 Writing installation file C:\Program Files\Elastic\Endpoint\cache\artifacts\global-artifacts\endpointpe-v4-blocklist
2020-12-29 07:03:27: info: Internal.cpp:353 Writing installation file C:\Program Files\Elastic\Endpoint\cache\artifacts\global-artifacts\diagnostic-ransomware-v 1-windows 2020-12-29 07:03:27: info: Internal.cpp:353 Writing installation file C:\Program Files\Elastic\Endpoint\cache\artifacts\global-artifacts\global-exceptionlist-wi ndows 2020-12-29 07:03:27: info: Internal.cpp:353 Writing installation file C:\Program Files\Elastic\Endpoint\cache\artifacts\global-artifacts\global-trustlist-window s-v1 2020-12-29 07:03:27: info: Internal.cpp:353 Writing installation file C:\Program Files\Elastic\Endpoint\cache\artifacts\global-artifacts\diagnostic-configuratio n-v1 2020-12-29 07:03:27: info: Internal.cpp:353 Writing installation file C:\Program Files\Elastic\Endpoint\cache\artifacts\global-artifacts\manifest.json 2020-12-29 07:03:27: info: Internal.cpp:353 Writing installation file C:\Program Files\Elastic\Endpoint\cache\artifacts\global-artifacts\manifest.sig 2020-12-29 07:03:27: info: Internal.cpp:353 Writing installation file C:\Program Files\Elastic\Endpoint\cache\resources\elastic-endpoint-security.png 2020-12-29 07:03:27: debug: Util.cpp:721 Creating service to start "C:\Program F iles\Elastic\Endpoint\elastic-endpoint.exe" run 2020-12-29 07:03:27: info: Util.cpp:317 Endpoint restart settings [ElasticEndpoi nt] count=15 delay=15 reset=600 2020-12-29 07:03:27: debug: Service.cpp:803 PPL is supported 2020-12-29 07:03:27: info: Util.cpp:596 PPL is enabled 2020-12-29 07:03:27: debug: Util.cpp:246 Setting up minifilter registry keys suc cessful.
> 6. If Endpoint installed, uninstall it (`endpoint-security.exe uninstall --log stdout --log-level trace`)
No Endpoint entry reflect on `Security/Administration/Endpoints` page
![image](https://user-images.githubusercontent.com/59917825/103267682-10e2e180-49d8-11eb-97f2-d361bacf3077.png)
![image](https://user-images.githubusercontent.com/59917825/103268403-623fa080-49d9-11eb-9745-59e5d90bc18a.png)
>Endpoint Logs (location : C:\Users\zeus\Desktop\Endpoint\state\log) [endpoint-000000-2012-R2-Machine.zip](https://github.com/elastic/kibana/files/5749947/endpoint-000000-2012-R2-Machine.zip)
**Additional Observation:**
1. User is able to read endpoint files through file explorer on window server 2012 R2 . However "access denied" is thrown on reading endpoint files on window server 2019
![image](https://user-images.githubusercontent.com/59917825/103268129-fb21ec00-49d8-11eb-9649-a0d7c408a9df.png)
![image](https://user-images.githubusercontent.com/59917825/103268123-f6f5ce80-49d8-11eb-8c39-c442ea3fb3c4.png)
**Query:**
1. do we have to edit any yml ( eg : provide cloud id to specify the kibana location) in above shared installation method ( i.e only endpoint-security installation)
Please let us known if any other details required for this issue.
thanks !!
Thanks @karanbirsingh-qasource. Both Endpoint's installed properly. You need to run the uninstall command to uninstall them now.
I should have been clearer. You didn't see them reflected in Kibana because there is no Agent. Lots of things won't work, like Endpoint appearing in Kibana, without Agent. I asked you to install Endpoint manually without Agent to see what the install logs printed to the console were (thanks for posting them!) to see why it might be failing when Agent runs that command instead of you. The Endpoint install command worked though, so I'm not sure why it fails when Agent runs it.
Can you try installing Endpoint again via Agent following the correct, normal workflow and see what happens. If it still fails to install we'll need help from the Agent team to debug further.
Hi @ferullo
Thanks for providing update on our query.
Could you also please provide the update on below query if expected or not that is
User is able to read endpoint files through file explorer on window server 2012 R2 . However "access denied" is thrown on reading endpoint files on window server 2019
Normal installation for Endpoint that is Endpoint via Agent fleet mode is Blocked 🟣 due to Policy Token inaccessibility as Agent Tab is stuck under loading , will share the observation once this https://github.com/elastic/kibana/issues/86864 issue got fixed.
Please find below observation for uninstall command on windows server machine .
2019 Server machine
C:\Program Files\endpoint-security-8.0.0-SNAPSHOT-windows-x86_64>endpoint-security.exe install --resources endpoint-security-resources.zip --log stdout --log-level trace
2020-12-30 06:37:16: info: Main.cpp:228 Executing install (protected)
2020-12-30 06:37:16: info: InstallLib.cpp:181 Installing from endpoint-security-resources.zip
2020-12-30 06:37:16: info: Internal.cpp:188 Extracting installation artifacts
2020-12-30 06:37:16: info: Internal.cpp:353 Writing installation file C:\Program Files\Elastic\Endpoint\elastic-endpoint.yaml
2020-12-30 06:37:16: info: Internal.cpp:353 Writing installation file C:\Windows\System32\Drivers\elastic-endpoint-driver.sys
2020-12-30 06:37:16: info: Internal.cpp:353 Writing installation file C:\Windows\System32\Drivers\eelam.sys
2020-12-30 06:37:16: info: Internal.cpp:353 Writing installation file C:\Program Files\Elastic\Endpoint\SecurityProductInformation.ini
2020-12-30 06:37:16: info: Internal.cpp:353 Writing installation file C:\Program Files\Elastic\Endpoint\elastic-endpoint.exe
2020-12-30 06:37:16: info: Internal.cpp:353 Writing installation file C:\Program Files\Elastic\Endpoint\cache\artifacts\global-artifacts\endpointpe-v4-model
2020-12-30 06:37:16: info: Internal.cpp:353 Writing installation file C:\Program Files\Elastic\Endpoint\cache\artifacts\global-artifacts\endpointpe-v4-exceptionlist
2020-12-30 06:37:16: info: Internal.cpp:353 Writing installation file C:\Program Files\Elastic\Endpoint\cache\artifacts\global-artifacts\endpointpe-v4-blocklist
2020-12-30 06:37:16: info: Internal.cpp:353 Writing installation file C:\Program Files\Elastic\Endpoint\cache\artifacts\global-artifacts\diagnostic-ransomware-v1-windows
2020-12-30 06:37:16: info: Internal.cpp:353 Writing installation file C:\Program Files\Elastic\Endpoint\cache\artifacts\global-artifacts\global-exceptionlist-windows
2020-12-30 06:37:16: info: Internal.cpp:353 Writing installation file C:\Program Files\Elastic\Endpoint\cache\artifacts\global-artifacts\global-trustlist-windows-v1
2020-12-30 06:37:16: info: Internal.cpp:353 Writing installation file C:\Program Files\Elastic\Endpoint\cache\artifacts\global-artifacts\diagnostic-configuration-v1
2020-12-30 06:37:16: info: Internal.cpp:353 Writing installation file C:\Program Files\Elastic\Endpoint\cache\artifacts\global-artifacts\manifest.json
2020-12-30 06:37:16: info: Internal.cpp:353 Writing installation file C:\Program Files\Elastic\Endpoint\cache\artifacts\global-artifacts\manifest.sig
2020-12-30 06:37:16: info: Internal.cpp:353 Writing installation file C:\Program Files\Elastic\Endpoint\cache\resources\elastic-endpoint-security.png
2020-12-30 06:37:16: debug: Util.cpp:721 Creating service to start "C:\Program Files\Elastic\Endpoint\elastic-endpoint.exe" run
2020-12-30 06:37:16: info: Util.cpp:317 Endpoint restart settings [ElasticEndpoint] count=15 delay=15 reset=600
2020-12-30 06:37:17: debug: Service.cpp:803 PPL is supported
2020-12-30 06:37:17: info: Util.cpp:596 PPL is enabled
2020-12-30 06:37:17: debug: Util.cpp:246 Setting up minifilter registry keys successful.
endpoint-security.exe uninstall --log stdout --log-level trace
C:\Program Files\endpoint-security-8.0.0-SNAPSHOT-windows-x86_64>endpoint-security.exe uninstall --log stdout --log-level trace
2020-12-30 06:44:40: info: Main.cpp:241 Executing uninstall
2020-12-30 06:44:40: debug: Service.cpp:803 PPL is supported
2020-12-30 06:44:40: info: Util.cpp:491 Sending sevice command to facilitate uninstall
2020-12-30 06:44:40: info: Util.cpp:518 Service command to facilitate uninstall succeeded
2020-12-30 06:44:42: debug: File.cpp:471 Removing [C:\Windows\ELAMBKUP\eelam.sys]
2020-12-30 06:44:42: debug: File.cpp:471 Removing [C:\Program Files\Elastic\Endpoint\elastic-endpoint.yaml]
2020-12-30 06:44:42: debug: File.cpp:471 Removing [C:\Windows\System32\Drivers\elastic-endpoint-driver.sys]
2020-12-30 06:44:42: debug: File.cpp:471 Removing [C:\Windows\System32\Drivers\eelam.sys]
2020-12-30 06:44:42: debug: File.cpp:471 Removing [C:\Program Files\Elastic\Endpoint\SecurityProductInformation.ini]
2020-12-30 06:44:42: debug: File.cpp:471 Removing [C:\Program Files\Elastic\Endpoint\elastic-endpoint.exe]
2020-12-30 06:44:42: debug: File.cpp:471 Removing [C:\Program Files\Elastic\Endpoint\cache\artifacts\global-artifacts\endpointpe-v4-model]
2020-12-30 06:44:42: debug: File.cpp:471 Removing [C:\Program Files\Elastic\Endpoint\cache\artifacts\global-artifacts\endpointpe-v4-exceptionlist]
2020-12-30 06:44:42: debug: File.cpp:471 Removing [C:\Program Files\Elastic\Endpoint\cache\artifacts\global-artifacts\endpointpe-v4-blocklist]
2020-12-30 06:44:42: debug: File.cpp:471 Removing [C:\Program Files\Elastic\Endpoint\cache\artifacts\global-artifacts\diagnostic-ransomware-v1-windows]
2020-12-30 06:44:42: debug: File.cpp:471 Removing [C:\Program Files\Elastic\Endpoint\cache\artifacts\global-artifacts\global-exceptionlist-windows]
2020-12-30 06:44:42: debug: File.cpp:471 Removing [C:\Program Files\Elastic\Endpoint\cache\artifacts\global-artifacts\global-trustlist-windows-v1]
2020-12-30 06:44:42: debug: File.cpp:471 Removing [C:\Program Files\Elastic\Endpoint\cache\artifacts\global-artifacts\diagnostic-configuration-v1]
2020-12-30 06:44:42: debug: File.cpp:471 Removing [C:\Program Files\Elastic\Endpoint\cache\artifacts\global-artifacts\manifest.json]
2020-12-30 06:44:42: debug: File.cpp:471 Removing [C:\Program Files\Elastic\Endpoint\cache\artifacts\global-artifacts\manifest.sig]
2020-12-30 06:44:42: debug: File.cpp:471 Removing [C:\Program Files\Elastic\Endpoint\cache\resources\elastic-endpoint-security.png]
2020-12-30 06:44:42: debug: File.cpp:471 Removing [C:\Program Files\Elastic\Endpoint\state\\documents-0.cfg]
2020-12-30 06:44:42: debug: File.cpp:471 Removing [C:\Program Files\Elastic\Endpoint\state\\documents-1.cfg]
2020-12-30 06:44:42: debug: File.cpp:471 Removing [C:\Program Files\Elastic\Endpoint\state\\documents-2020-12-30T013841.log]
2020-12-30 06:44:42: debug: File.cpp:471 Removing [C:\Program Files\Elastic\Endpoint\state\\documents-2020-12-30T014217.log]
2020-12-30 06:44:42: debug: File.cpp:471 Removing [C:\Program Files\Elastic\Endpoint\state\\log\endpoint-000000.log]
2020-12-30 06:44:42: trace: File.cpp:343 Function returned error status (Failure in an external software component)
2020-12-30 06:44:42: trace: File.cpp:343 Function returned error status (Failure in an external software component)
2020-12-30 06:44:42: info: InstallLib.cpp:247 Uninstall completed
2012 R2 Server machine
endpoint-security.exe install --resources endpoint-security-resources.zip --log stdout --log-level trace
C:\Program Files\endpoint-security-8.0.0-SNAPSHOT-windows-x86_64>endpoint-security.exe install --resources endpoint-security-resources.zip --log stdout --l
og-level trace
2020-12-30 05:57:48: info: Main.cpp:228 Executing install (protected)
2020-12-30 05:57:48: info: InstallLib.cpp:181 Installing from endpoint-security-resources.zip
2020-12-30 05:57:48: info: Internal.cpp:188 Extracting installation artifacts
2020-12-30 05:57:48: info: Internal.cpp:353 Writing installation file C:\Program Files\Elastic\Endpoint\elastic-endpoint.yaml
2020-12-30 05:57:48: info: Internal.cpp:353 Writing installation file C:\Windows\System32\Drivers\elastic-endpoint-driver.sys
2020-12-30 05:57:48: info: Internal.cpp:353 Writing installation file C:\Windows\System32\Drivers\eelam.sys
2020-12-30 05:57:48: info: Internal.cpp:353 Writing installation file C:\Program Files\Elastic\Endpoint\SecurityProductInformation.ini
2020-12-30 05:57:48: info: Internal.cpp:353 Writing installation file C:\Program Files\Elastic\Endpoint\elastic-endpoint.exe
2020-12-30 05:57:49: info: Internal.cpp:353 Writing installation file C:\Program Files\Elastic\Endpoint\cache\artifacts\global-artifacts\endpointpe-v4-mode
l
2020-12-30 05:57:49: info: Internal.cpp:353 Writing installation file C:\Program Files\Elastic\Endpoint\cache\artifacts\global-artifacts\endpointpe-v4-exce
ptionlist
2020-12-30 05:57:49: info: Internal.cpp:353 Writing installation file C:\Program Files\Elastic\Endpoint\cache\artifacts\global-artifacts\endpointpe-v4-bloc
klist
2020-12-30 05:57:49: info: Internal.cpp:353 Writing installation file C:\Program Files\Elastic\Endpoint\cache\artifacts\global-artifacts\diagnostic-ransomw
are-v1-windows
2020-12-30 05:57:49: info: Internal.cpp:353 Writing installation file C:\Program Files\Elastic\Endpoint\cache\artifacts\global-artifacts\global-exceptionli
st-windows
2020-12-30 05:57:49: info: Internal.cpp:353 Writing installation file C:\Program Files\Elastic\Endpoint\cache\artifacts\global-artifacts\global-trustlist-w
indows-v1
2020-12-30 05:57:49: info: Internal.cpp:353 Writing installation file C:\Program Files\Elastic\Endpoint\cache\artifacts\global-artifacts\diagnostic-configu
ration-v1
2020-12-30 05:57:49: info: Internal.cpp:353 Writing installation file C:\Program Files\Elastic\Endpoint\cache\artifacts\global-artifacts\manifest.json
2020-12-30 05:57:49: info: Internal.cpp:353 Writing installation file C:\Program Files\Elastic\Endpoint\cache\artifacts\global-artifacts\manifest.sig
2020-12-30 05:57:49: info: Internal.cpp:353 Writing installation file C:\Program Files\Elastic\Endpoint\cache\resources\elastic-endpoint-security.png
2020-12-30 05:57:49: debug: Util.cpp:721 Creating service to start "C:\Program Files\Elastic\Endpoint\elastic-endpoint.exe" run
2020-12-30 05:57:49: info: Util.cpp:317 Endpoint restart settings [ElasticEndpoint] count=15 delay=15 reset=600
2020-12-30 05:57:49: debug: Service.cpp:803 PPL is supported
2020-12-30 05:57:49: info: Util.cpp:596 PPL is enabled
2020-12-30 05:57:49: debug: Util.cpp:246 Setting up minifilter registry keys successful.
C:\Program Files\endpoint-security-8.0.0-SNAPSHOT-windows-x86_64>
2. endpoint-security.exe uninstall --log stdout --log-level trace
C:\Program Files\endpoint-security-8.0.0-SNAPSHOT-windows-x86_64>endpoint-security.exe uninstall --log stdout --log-level trace 2020-12-30 06:06:36: info: Main.cpp:241 Executing uninstall 2020-12-30 06:06:36: debug: Service.cpp:803 PPL is supported 2020-12-30 06:06:36: info: Util.cpp:491 Sending sevice command to facilitate uninstall 2020-12-30 06:06:36: error: Util.cpp:513 Failure sending DisablePPL message to allow our service to stop. Send status: Success. Command Status: Failure in an external software component 2020-12-30 06:06:36: trace: Util.cpp:515 Function returned error status (Failure in an external software component) 2020-12-30 06:06:36: warning: Util.cpp:869 Error encountered while unprotecting service for unintall 2020-12-30 06:06:38: debug: File.cpp:471 Removing [C:\Windows\ELAMBKUP\eelam.sys] 2020-12-30 06:06:38: debug: File.cpp:471 Removing [C:\Program Files\Elastic\Endpoint\elastic-endpoint.yaml] 2020-12-30 06:06:38: debug: File.cpp:471 Removing [C:\Windows\System32\Drivers\elastic-endpoint-driver.sys] 2020-12-30 06:06:38: debug: File.cpp:471 Removing [C:\Windows\System32\Drivers\eelam.sys] 2020-12-30 06:06:38: debug: File.cpp:471 Removing [C:\Program Files\Elastic\Endpoint\SecurityProductInformation.ini] 2020-12-30 06:06:38: debug: File.cpp:471 Removing [C:\Program Files\Elastic\Endpoint\elastic-endpoint.exe] 2020-12-30 06:06:38: trace: File.cpp:478 Function returned error status (I/O error) because of system status (5/Access is denied.) 2020-12-30 06:06:39: debug: File.cpp:471 Removing [C:\Program Files\Elastic\Endpoint\elastic-endpoint.exe] 2020-12-30 06:06:39: debug: File.cpp:471 Removing [C:\Program Files\Elastic\Endpoint\cache\artifacts\global-artifacts\endpointpe-v4-model] 2020-12-30 06:06:39: debug: File.cpp:471 Removing [C:\Program Files\Elastic\Endpoint\cache\artifacts\global-artifacts\endpointpe-v4-exceptionlist] 2020-12-30 06:06:39: debug: File.cpp:471 Removing [C:\Program Files\Elastic\Endpoint\cache\artifacts\global-artifacts\endpointpe-v4-blocklist] 2020-12-30 06:06:39: debug: File.cpp:471 Removing [C:\Program Files\Elastic\Endpoint\cache\artifacts\global-artifacts\diagnostic-ransomware-v1-windows] 2020-12-30 06:06:39: debug: File.cpp:471 Removing [C:\Program Files\Elastic\Endpoint\cache\artifacts\global-artifacts\global-exceptionlist-windows] 2020-12-30 06:06:39: debug: File.cpp:471 Removing [C:\Program Files\Elastic\Endpoint\cache\artifacts\global-artifacts\global-trustlist-windows-v1] 2020-12-30 06:06:39: debug: File.cpp:471 Removing [C:\Program Files\Elastic\Endpoint\cache\artifacts\global-artifacts\diagnostic-configuration-v1] 2020-12-30 06:06:39: debug: File.cpp:471 Removing [C:\Program Files\Elastic\Endpoint\cache\artifacts\global-artifacts\manifest.json] 2020-12-30 06:06:39: debug: File.cpp:471 Removing [C:\Program Files\Elastic\Endpoint\cache\artifacts\global-artifacts\manifest.sig] 2020-12-30 06:06:39: debug: File.cpp:471 Removing [C:\Program Files\Elastic\Endpoint\cache\resources\elastic-endpoint-security.png] 2020-12-30 06:06:39: debug: File.cpp:471 Removing [C:\Program Files\Elastic\Endpoint\cache\artifacts\global-artifacts\manifest.etag] 2020-12-30 06:06:39: debug: File.cpp:471 Removing [C:\Program Files\Elastic\Endpoint\state\documents-0.cfg] 2020-12-30 06:06:39: debug: File.cpp:471 Removing [C:\Program Files\Elastic\Endpoint\state\documents-1.cfg] 2020-12-30 06:06:39: debug: File.cpp:471 Removing [C:\Program Files\Elastic\Endpoint\state\documents-2020-12-30T010139.log] 2020-12-30 06:06:39: debug: File.cpp:471 Removing [C:\Program Files\Elastic\Endpoint\state\documents-2020-12-30T010528.log] 2020-12-30 06:06:39: debug: File.cpp:471 Removing [C:\Program Files\Elastic\Endpoint\state\log\endpoint-000000.log] 2020-12-30 06:06:40: trace: File.cpp:343 Function returned error status (Failure in an external software component) 2020-12-30 06:06:40: trace: File.cpp:343 Function returned error status (Failure in an external software component) 2020-12-30 06:06:40: trace: File.cpp:343 Function returned error status (Failure in an external software component) 2020-12-30 06:06:40: info: InstallLib.cpp:247 Uninstall completed
C:\Program Files\endpoint-security-8.0.0-SNAPSHOT-windows-x86_64>
**Logs:**
1. 2019 machine:[endpoint-000000-2019-machine.log](https://github.com/elastic/kibana/files/5753182/endpoint-000000-2019-machine.log)
2. 2012R2 machine:[endpoint-000000-2012-R2-machine.log](https://github.com/elastic/kibana/files/5753183/endpoint-000000-2012-R2-machine.log)
Please let us known if any other details required .
thanks !!
Receiving "Access is Denied" on 2019 is expected. This is Endpoint self-protection stopping File Explorer from being able to read it's files. You can still access Endpoint files using an Administrator cmd.exe
window.
It's surprising you could browse into Endpoint's directory on 2021 R2. @bjmcnic do you have a way to try to replicate this? It would be good to understand and document if needed.
I've reproduced the failure on a Win 8.1 VM (8.1 ˜= 2012 R2).
{"@timestamp":"2020-12-30T14:36:18.2084793Z","agent":{"id":"","type":"endpoint"},"ecs":{"version":"1.5.0"},"log":{"level":"error","origin":{"file":{"line":301,"name":"File.cpp"}}},"message":"File.cpp:301 SetNamedSecurityInfoW() failed: 5","process":{"pid":4540,"thread":{"id":4552}}}
{"@timestamp":"2020-12-30T14:36:18.2084793Z","agent":{"id":"","type":"endpoint"},"ecs":{"version":"1.5.0"},"log":{"level":"error","origin":{"file":{"line":1034,"name":"Util.cpp"}}},"message":"Util.cpp:1034 Apply process trust label for: C:\\Program Files\\Elastic\\Endpoint\\ failed with: Failure in an external software component","process":{"pid":4540,"thread":{"id":4552}}}
Looks like we're getting ERROR_ACCESS_DENIED applying the process trust label SACL. We are running as a protected process though, so I'm not yet sure why we failed. Digging into this.
@karanbirsingh-qasource did you try installing via Agent again to see what happens? It seems like both Server 2012R2 and Server 2019 will work, with the exception of part of self protection not turning on for Server 2012R2.
@karanbirsingh-qasource did you try installing via Agent again to see what happens? It seems like both Server 2012R2 and Server 2019 will work, with the exception of part of self protection not turning on for Server 2012R2.
Normal installation for Endpoint that is Endpoint via Agent fleet mode is Blocked 🟣 due to Policy Token inaccessibility as Agent Tab is stuck under loading , will share the observation once this #86864 issue got fixed.
Hi @ferullo
Please find addition observation for the Agent and Endpoint Security installation status on 7.11.0 & 8.0.0 SNAPSHOT and 7.11.0 BC1.
Platform | Version | Commit | Build | Test-Signing ON | Test-Signing ON | Test-Signing OFF | Test-Signing OFF | Remark |
---|---|---|---|---|---|---|---|---|
Agent Only installation | Agent + Endpoint installation | Agent Only installation | Agent + Endpoint installation | |||||
Staging | 8.0.0-SNAPSHOT | a5cfc7fb4a7ce0363b73a118299e228e925814df |
39211 |
Blocked 🟣 | Blocked 🟣 | N/A | N/A | https://github.com/elastic/kibana/issues/86864 |
Staging | 7.11.0-SNAPSHOT | 876e859238cdc8ec487ca2608aacb1aa7faaa958 |
37480 |
Unhealthy Agent🔴 | No Endpoint Reflect under admin tab🔴 | N/A | N/A | https://github.com/elastic/kibana/issues/86097 |
Production | 7.11.0 BC1 | f3abc08ac648f8b302733c5c22a39048314a027c |
37399 |
Unhealthy Agent ( keeps in unhealthy through out )🔴 | Endpoint not installed🔴 | Unhealthy Agent ( keeps in unhealthy through out )🔴 | Endpoint not installed🔴 | https://github.com/elastic/beats/issues/23332 |
while looking into agent/endpoint installation on 7.11.0 BC1 we have found a way by which we get Healthy Agent + Endpoint Installed under Admin Tab. Please find below complete details for the same.
Steps:
[elastic_agent][error] failed to load markeropen C:\Program Files\Elastic\Agent\data\.update-marker: The system cannot find the file specified.
[elastic_agent][error] Elastic Agent status changed to: 'error'
Condition for above steps is : Endpoint Security should not be added after agent installation . If we create a policy with both integration (security + endpoint security ) first and then install agent then agent stuck in unhealthy state and no endpoint reflect under admin tab .
Success steps video: https://user-images.githubusercontent.com/59917825/103409255-f3ef0f80-4b8b-11eb-83b0-258268f63df0.mp4
Failure steps video: https://user-images.githubusercontent.com/59917825/103409259-f8b3c380-4b8b-11eb-9bd6-2dcc21ee216e.mp4
7.11.0-SNAPSHOT
7.11.0 BC1 Note: Tested with both signing state as BC1 elastic-agent was not singed (details here )
Agent Endpoint
14:46:55.473
elastic_agent
[elastic_agent][error] failed to dispatch actions, error: operator: failed to execute step sc-run, error: operation 'Exec' failed: : operation 'Exec' failed:
14:47:02.502
elastic_agent
[elastic_agent][error] failed to dispatch actions, error: operator: failed to execute step sc-run, error: operation 'Exec' failed: : operation 'Exec' failed:
4:08:44.963
elastic_agent
[elastic_agent][error] failed to load markeropen C:\Program Files\Elastic\Agent\data\.update-marker: The system cannot find the file specified.
14:15:57.363
elastic_agent
[elastic_agent][error] Could not communicate with Checking API will retry, error: Status code: 503, Kibana returned an error: Service Unavailable, message: socket hang up
14:27:37.705
elastic_agent
[elastic_agent][error] Could not communicate with Checking API will retry, error: Status code: 503, Kibana returned an error: Service Unavailable, message: socket hang up
[elastic_agent][error] failed to load markeropen C:\Program Files\Elastic\Agent\data\.update-marker: The system cannot find the file specified.
[elastic_agent][error] failed to dispatch actions, error: operator: failed to execute step sc-run, error: operation 'Exec' failed: : operation 'Exec' failed:
[elastic_agent][error] Could not communicate with Checking API will retry, error: Status code: 503, Kibana returned an error: Service Unavailable, message: socket hang up
[elastic_agent][error] 2020-12-31T05:52:00-05:00: type: 'ERROR': sub_type: 'FAILED' message: Application: endpoint-security--7.11.0[1e08dca0-4b56-11eb-8e3c-b37ff8759758]: State changed to FAILED: operation 'Exec' failed:
C.C @EricDavisX @kevinlog
@ph @EricDavisX based on @karanbirsingh-qasource 's last comment, it sounds like this is the same unhealthy Agent issue that the Agent team is already aware of. Do you agree?
HI @EricDavisX @ferullo
We have re-tested this issue on latest commit of 8.0.0-SNAPSHOT build and found that now this issue has been fixed. Now agents are successfully installing on server machines.
Platform: Staging
Version: 8.0.0
Commit : 52f6c7cf5c1eb4d8d68c726af6ac91583cabe453
Build : 39299
Hence we are closing this issue.
thanks !!
Describe the bug Endpoint Security installation fails on windows server machines
Build Details:
8.0.0-Artifact Page 7.10.1-Artifact PAge
Browser Details All
OS
Preconditions
Steps to Reproduce
Fleet / Policies
page and add "endpoint-security" integration under default policy`Note: issue is also occurring on 7.10.1'
Test data N/A
Impacted Test case(s) N/A
Actual Result Endpoint Security installation fails on windows server machines
Expected Result Endpoint Security should successfully install on windows server machines
What's Working
What's not Working
Screenshots
7.10.1
8.0.0
Logs
Logs:
Error: Application: endpoint-security--7.10.1[2ae6a386-df1c-4c96-932c-9065eda984da]: State changed to FAILED: operation 'Exec' failed:
No Logs found of endpoint under "C:\Program Files\Elastic" directory[elastic_agent][error] 2020-12-22T03:29:02-08:00: type: 'ERROR': sub_type: 'FAILED' message: Application: endpoint-security--8.0.0-SNAPSHOT[faa9faf0-4448-11eb-91a4-1519394f9514]: State changed to FAILED: operation 'Exec' failed:
Empty Log file found for endpoint under "C:\Program Files\Elastic\Endpoint\state\log" directory endpoint-000000.zip