Precheck for installation of AIQUM on windows server
Applies to
- Active IQ Unified Manager(AIQUM) 9.x
- Microsoft Windows server
Answer
- Confirm user is part of local administrator group or ask user to log on to windows server as "
admin
". - Make sure no Anti-virus scan software running until we are done with the install or we exclude the MySQL and other AIQUM directories beforehand.
- Make sure we have no firewall running on windows server for example from windows command prompt windows "
netsh firewall show state
". - disable UAC (user access control) -
- Open the Registry Editor.
- Expand HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System.
- Set to 0, which means that UAC is disabled.
- The file we need to change EnableLUA (Enable-Local-User-Access) to zero (0)
- Change the value to the desired value, click OK,
- Close the Registry Editor, and reboot the system.
-
IMPORTANT STEP [Uninstall and remove any "residue" of previous attempts of installing AIQUM server. Make sure check the windows registry for any leftover / residues from previous attempts.
- Check to see if "deny access to network drive" is not turned on for local administrator and domain admin groups, use "
gpedit.msc
" and look for this information. - Once all the above are checked and corrected, then it is time to run the installer again.
- Before running the AIQUM installer go to windows temp directory and keep that directory open on a side, the temp directory path can be found by running the following command in windows CLI "
%temp%
- Open command prompt windows with run as admin. Run the AIQUM installer, try to use simple password for MySQL and admin user like "
P@ssw0rd1234
" for testing purposes. - When you see the error again collect the following:
- Collect the latest logs and folder created under windows
temp
directory like AIQUM installer logs. - Logs under windows "
Program Data
" directory, see if we have any logs for "OCIE/OCUM"
created. - Lastly, grab the windows event logs like
"system|application|security"
event logscheck if they dont have any local group policy enable that deny admin accesslastly, we have seen in the past if windows user profile begins with ! mark .