GroupReady HomeFree TrialProductsSupportContact

 
Access Denied Errors in GroupReady when running Norton Anti-Virus on Windows 2000/XP

Situation:
There is a known issue when running Norton Anti-Virus on a Windows 2000/ XP workstation computer that can affect any application attempting to access shared database files across a network. The issue is a result of a default setting configured in the Windows 2000/XP operating system known as "Opportunistic Locking". When a GroupReady workstation attempts to access shared database files located on another Windows 2000/XP computer, the Windows 2000/XP operating system will attempt to increase performance by locking the files and caching information locally. When this occurs, Norton Anti-Virus is unable to properly conduct its network scanning function, which results in an "Access Denied Reading" error message displayed during various GroupReady operations.

In addition, according to Microsoft, opportunistic locking can increase the risk of database corruption when a file is shared by two or more clients on a network file server.

Solution:
Disable Opportunistic Locking on the Workstation or Server computers to avoid "Access Denied" error messages and possible corruption in the GroupReady database files.

Summary Information about Opportunistic Locking on Windows NT/2000/XP

  1. Opportunistic locking, if enabled, can corrupt ANY database shared over a network from a server running Windows NT, 2000, or XP. This includes GroupReady, ACT, Microsoft Access, Borland Paradox, Omnis, Lotus Domino and many others.

  2. Opportunistic locking is enabled, by default, when Windows NT, 2000, or XP is installed.

  3. Opportunistic locking is re-enabled whenever a Service Pack is applied to Windows NT, 2000, or XP.

For more detailed information regarding Opportunistic Locking, please see the following Microsoft Knowledgebase articles:

Opportunistic Locking on Windows NT
http://support.microsoft.com/support/kb/articles/q129/2/02.asp

Opportunistic Locking on Windows 2000/XP
http://support.microsoft.com/support/kb/articles/q296/2/64.asp

Disabling Opportunistic Locking on Windows NT/2000/XP:
Opportunistic locking can be disabled either by downloading and installing the REG utilities listed below, or manually entering the below registry entries into the workstation or server computers.

IMPORTANT: This article contains information about modifying the registry. Before you modify the registry, make sure to back it up and make sure that you understand how to restore the registry if a problem occurs. For information about how to back up, restore, and edit the registry, click the following article number to view the article in the Microsoft Knowledge Base:

256986 Description of the Microsoft Windows Registry

Disclaimer: Telexis makes no warranties for the instructions given in the Microsoft Knowledgebase article referenced above, or for the utilities and registry entries reproduced on this web page. You agree to make all registry changes at your own risk.

To disable Opportunistic Locking by downloading and installing the Windows 2000/XP registry utility:

1. Click on the desired REG file listed below to begin downloading the file:

Workstation Registry Utility
Oplocks.reg

Server Registry Utility
Oplocks server.reg

2. Store the file to a temporary folder on the desired workstation or server computer.

3. Once downloaded, double-click on the file to add the entry to the Windows registry.

4. Re-boot the computer.

5. Perform the above steps on all Windows 2000/XP computers.

To disable Opportunistic Locking manually on a Windows 2000/XP Workstation computer:

1. Enter the OplocksDisabled entry into the below registry key:

HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\MRXSmb\Parameters\

    OplocksDisabled REG_DWORD 0 or 1
    Default: 0 (not disabled)

2. Set the value to 1 to disable Oplocks

3. Reboot the workstation computer.

NOTE: The OplocksDisabled registry value configures Windows clients to either request or not request opportunistic locks on a remote file.

To disable Opportunistic Locking manually on a Windows 2000/XP Server computer:

1. Enter the EnableOplocks entry into the below registry key:

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\LanmanServer\Parameters

    EnableOplocks REG_DWORD 0 or 1
    Default: 1 (Enabled by Default)

2. Set the value to 0 to disable Oplocks.

3. Reboot the server computer.

NOTE: The EnableOplocks value configures Windows-based servers (including Workstations sharing files) to allow or deny opportunistic locks on local files.

To disable Opportunistic Locking manually on a Windows NT Server or Workstation computer:

Follow the instructions listed in the below Microsoft Knowledge Base article.
http://support.microsoft.com/support/kb/articles/q129/2/02.asp

NOTE: This information is provided for your convenience. The inclusion of such links does not imply that Telexis endorses, recommends, or accepts any responsibility for the content of such sites. Telexis does not provide warranty support for Microsoft or Symantec products.

Should you have any questions regarding this issue, please do not hesitate in contacting our toll-free support number at 1-520-884-8698 or e-mail us at support@telexis.com

 

© 2004, Telexis Inc. GroupReady is a trademark of Telexis. All other trademarks are the property of their respective holders