The attached .bat file is designed to collect information that may assist the support team in diagnosing and resolving issues with the Protect application.
This batch file will collect trace log files, event logs, registry entries, config files, and other information that can provide great information to support for diagnosing problems.
This .bat can prove useful on any system where you are currently having issues with the Protect console or a Protect agent.
This file is intended only to obtain information for support purposes. It is not an officially supported tool and has not gone through QA/Testing. The user assumes any risks of running the attached file(s).
1) Download the attached Get_Protect_Info.bat.zip.
2) Extract the Get_Protect_Info.bat to the desktop of the Protect console system or agent system where you wish to obtain files for support.
3) Right click the Get_Protect_Info.bat, choose 'Run as Administrator'. For older operating systems such as XP or 2003 this will not be necessary - just run the file.
Note: If you do not run as administrator the batch file may not be able to obtain all information.
4) Allow the .bat to run through everything. It may take some time.
When the operation is complete you will see the text of commandline turn green and the following text displayed:
Press any key to continue...
Note: If you do not see this you need to either run as administrator or wait until the operations are complete.
5) A folder titled 'ProtectLogs' will be created at the root of C:\, containing all the files collected by the .bat.
6) Please create a compressed file of this folder. It is suggested to use 7zip for compression. 7zip will compress to a smaller file size than the built in Windows compression, and it allows for creation of an encrypted 7z or zip file. You can download 7zip here: http://7-zip.org/download.html
7) Send the 7z or zip file of the ProtectLogs folder to support.
8) The folder C:\ProtectLogs can be deleted after this.
This .bat file may retrieve some files containing sensitive system or network information. Make sure you review the files that are collected prior to sending if you believe this poses any security risk for you. This is why it is also highly recommended to place the files within an encrypted or password protected zip or 7z file before sending.