Enzoic for Active Directory v3.3
You can use the following checks to verify the installation completed as expected.
- Check windows\system32 and confirm the presence of EnzoicFilter.dll
- Check the registry HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa for the presence of Enzoic in the notifications packages value
- Check the Event viewer system logs after reboot to confirm there are no errors about indicating a failure to load the EnzoicFilter.dll
- Check the product logs at ..\ProgramData\Enzoic\Enzoic. Log files should typically be retrieved from the DC configured as the Delegate Server. You can check which server is the Delegate from the Enzoic Console | Monitoring Settings | Continuous Password Protection area.
If emails notifications aren’t being received, add enzoic.com to your approved senders. If your spam filter requires you to whitelist the Enzoic SMTP servers by IP address, you can determine the current IP address list with the following commands:
C:>nslookup -type=TXT amazonses.com | find "v=spf1"
$ dig TXT amazonses.com +short| grep 'v=spf1'
This will return the SPF record in use, which will change over time. Example:
"v=spf1 ip4:188.8.131.52/22 ip4:184.108.40.206/22 ip4:220.127.116.11/18 ~all"
Enzoic for Active Directory uses a local port for communications between the password filter and its service. The default port is 6164. If necessary, the port can be changed using a registry setting:
Registry Key: "HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Enzoic\Enzoic for Active Directory"
Value Name: ServicePort
Value Type: DWORD
Value: (new port to use)
Some heuristics based antivirus software may trip on Enzoic. To ensure smooth operation, we recommend whitelisting the Enzoic processes and files under:
C:\Program Files\Enzoic for Active Directory