{"id":6119,"date":"2023-06-05T14:51:35","date_gmt":"2023-06-05T18:51:35","guid":{"rendered":"https:\/\/batchpatch.com\/?p=6119"},"modified":"2023-06-05T14:59:27","modified_gmt":"2023-06-05T18:59:27","slug":"batchpatch-error-16115-failure","status":"publish","type":"post","link":"https:\/\/batchpatch.com\/batchpatch-error-16115-failure","title":{"rendered":"BatchPatch Error 1611:5. Failure"},"content":{"rendered":"<p>99% of the time if you see <em>1611:5. Failure<\/em> appear in BatchPatch, it&#8217;s due to PsExec getting blocked by your anti-virus\/security software.  Sophos seems to be the primary culprit for when we get reports of this failure\/error.<\/p>\n<p><a href=\"\/wp-content\/uploads\/2023\/06\/unnamed.png\"><img loading=\"lazy\" decoding=\"async\" src=\"\/wp-content\/uploads\/2023\/06\/unnamed.png\" alt=\"\" width=\"254\" height=\"140\" class=\"aligncenter size-full wp-image-6120\" \/><\/a><\/p>\n<p>To resolve this, generally you&#8217;ll just need to add an exclusion in your AV\/Security app for PsExec.exe that runs on the BatchPatch computer and\/or PsExeSvc.exe that runs on the target computer.  Please check in your BatchPatch under <em>Tools > Settings > Remote Execution<\/em> for the correct filenames and filepaths that will need to be excluded or allow-listed in your anti-virus server.<\/p>\n<p><a href=\"\/wp-content\/uploads\/2023\/06\/2023-06-05-14_38_34-4.png\"><img loading=\"lazy\" decoding=\"async\" src=\"\/wp-content\/uploads\/2023\/06\/2023-06-05-14_38_34-4.png\" alt=\"\" width=\"486\" height=\"638\" class=\"aligncenter size-full wp-image-6126\" srcset=\"https:\/\/batchpatch.com\/wp-content\/uploads\/2023\/06\/2023-06-05-14_38_34-4.png 486w, https:\/\/batchpatch.com\/wp-content\/uploads\/2023\/06\/2023-06-05-14_38_34-4-229x300.png 229w\" sizes=\"auto, (max-width: 486px) 100vw, 486px\" \/><\/a><\/p>\n<p>Take note of the two filepaths outlined in the screenshot above.  The first one is the path where PsExec.exe is running on the BatchPatch computer.  The second one is the remote service name of the PsExec service that runs on the target computer.  Also note the checkbox that I have ticked for <em>Append source computer name to remote service name<\/em>.  This means that when the remote service runs on target computers, it will run as <strong><em>BatchPatchExeSvc-BPSourceComputerNameGoesHere.exe<\/em><\/strong><\/p>\n<p>That said, since my BatchPatch computer is named BPSERVER, and since my remote service name is set to BatchPatchExeSvc with the checkbox ticked for <em>Append source computer name to remote service name<\/em>, on the target computers it will run as <strong><em>C:\\Windows\\BatchPatchExeSvc-BPSERVER.exe<\/em><\/strong>.  So if I were encountering <strong><em>1611:5. Failure<\/em><\/strong>, I would make exclusions in my Sophos server for <em>C:\\Windows\\System32\\PsExec_2.4.exe<\/em> for the BatchPatch computer, and also for <em>C:\\Windows\\BatchPatchExeSvc-BPSERVER.exe<\/em> for the target computer(s).<\/p>\n","protected":false},"excerpt":{"rendered":"<p>99% of the time if you see 1611:5. Failure appear in BatchPatch, it&#8217;s due to PsExec getting blocked by your anti-virus\/security software. Sophos seems to be the primary culprit for when we get reports of this failure\/error. To resolve this, generally you&#8217;ll just need to add an exclusion in your AV\/Security app for PsExec.exe that [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1,17,3],"tags":[505],"class_list":["post-6119","post","type-post","status-publish","format-standard","hentry","category-blog","category-general","category-tutorials","tag-16115-failure"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/batchpatch.com\/wp-json\/wp\/v2\/posts\/6119","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/batchpatch.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/batchpatch.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/batchpatch.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/batchpatch.com\/wp-json\/wp\/v2\/comments?post=6119"}],"version-history":[{"count":6,"href":"https:\/\/batchpatch.com\/wp-json\/wp\/v2\/posts\/6119\/revisions"}],"predecessor-version":[{"id":6131,"href":"https:\/\/batchpatch.com\/wp-json\/wp\/v2\/posts\/6119\/revisions\/6131"}],"wp:attachment":[{"href":"https:\/\/batchpatch.com\/wp-json\/wp\/v2\/media?parent=6119"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/batchpatch.com\/wp-json\/wp\/v2\/categories?post=6119"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/batchpatch.com\/wp-json\/wp\/v2\/tags?post=6119"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}