Article ID: 870901 - View products that this article applies to.
Important This article contains information that shows you how to help lower security settings or how to turn off security features on a computer. You can make these changes to work around a specific problem. Before you make these changes, we recommend that you evaluate the risks that are associated with implementing this workaround in your particular environment. If you implement this workaround, take any appropriate additional steps to help protect your system.
When you try to use the Computer Associates eTrust Antivirus Remote Install utility to install the eTrust Antivirus 7.0 client on a computer that is running Microsoft Windows XP Service Pack 2 (SP2), the installation does not succeed. When you click Install to Targets, you receive the following error message:
Installation failed: Access is denied. (5)
This behavior occurs because of changes to the Remote Procedure Call service in Windows XP SP2. By default, the RestrictRemoteClients registry entry is turned on in Windows XP SP2. This registry entry restricts access to all remote procedure call interfaces.
Important This section, method, or task contains steps that tell you how to modify the registry. However, serious problems might occur if you modify the registry incorrectly. Therefore, make sure that you follow these steps carefully. For added protection, back up the registry before you modify it. Then, you can restore the registry if a problem occurs. For more information about how to back up and restore the registry, click the following article number to view the article in the Microsoft Knowledge Base:
(http://support.microsoft.com/kb/322756/ )How to back up and restore the registry in Windows
To work around this behavior, install the eTrust Antivirus client locally. If you cannot install the eTrust Antivirus client locally, you can modify the registry to turn off the RestrictRemoteClients registry entry. To do this, follow these steps.
Warning This workaround may make your computer or your network more vulnerable to attack by malicious users or by malicious software such as viruses. We do not recommend this workaround but are providing this information so that you can implement this workaround at your own discretion. Use this workaround at your own risk.
For information about how to contact Computer Associates, visit the following Computer Associates Web site:
http://www.ca.comMicrosoft provides third-party contact information to help you find technical support. This contact information may change without notice. Microsoft does not guarantee the accuracy of this third-party contact information.
For additional information about the RPC Interface Restriction feature in Windows XP SP2, and also for a description of the RestrictRemoteClients registry entry and its possible values, visit the following Microsoft Web site:
http://technet.microsoft.com/en-us/library/bb457156.aspxThe third-party products that this article discusses are manufactured by companies that are independent of Microsoft. Microsoft makes no warranty, implied or otherwise, regarding the performance or reliability of these products.