Skip to main content

EPP Server Migration & Upgrade Guide

Document Version: 2.0
Last Updated: April 2026
Applies To: Endpoint Protector Server versions 5.7.0.0 → 5.9.4.2 → 2510 base image → 2602 (latest)


🚨 Action Required — Support Ended 14 February 2026

Support for Endpoint Protector Server version 5.9.4.2 and all older versions has been discontinued as of 14 February 2026. Customers still running any 5.x version are no longer receiving security patches, bug fixes, or technical support.

Migration to the new image-based platform (2510 with latest patch 2602) must be completed immediately.

For the full support lifecycle and version status, see: Netwrix Endpoint Protector Server Supportability


Overview

Endpoint Protector's new server platform runs on Ubuntu 22.04 LTS and requires a full image migration — not a simple patch. Two base images are available as starting points:

  • 2509 — The original release. No longer available for download. Customers already running 2509 don't need to switch to 2510 unless they require a larger initial storage disk size.
  • 2510 — Recommended for new deployments. Includes improvements to disk sizing and DHCP/DNS configuration.

Both images can be upgraded directly to the current patch version (2602). Upgrade the base image to 2602 before importing the configuration backup.

The complete migration process follows this sequence:

EPP Server Migration — end-to-end process diagram

warning

Backups from versions other than 5.9.4.2 will not be accepted. The intermediate upgrade step to 5.9.4.2 is mandatory — skipping it will result in a failed restoration.

warning

The license must be imported on the fresh 2510 image before applying patches. Without an active ELS for PHP license, the server can't receive OS and patch updates.


Understanding the Migration Architecture

Why 5.9.4.2 Is a Required Stepping Stone

The 2510 base image (and any patch version built on top of it, such as 2602) accepts configuration backups exclusively from version 5.9.4.2. This is because:

  • The internal database schema at 5.9.4.2 is the last known-compatible schema for import into the new image platform.
  • The reworked backend OS (Ubuntu 22.04) introduced breaking changes to service configurations and file paths.
  • The migration process validates the backup format and version checksum before restoring.
note

The backup should be restored after the 2510 image has been fully patched to 2602. The 5.9.4.2 backup format remains compatible across all patch versions of the new image (2510, 2511, …, 2602).

Version compatibility matrix:

Backup Source VersionCan Be Restored to 2602
Older than 5.7.0.0❌ Step-by-step upgrade path required first
5.7.0.0 – 5.9.4.1❌ Must reach 5.9.4.2 first via cumulative patch
5.9.4.2Yes — the only accepted source version from historical image appliances
2509, 2510, 2601, 2602Yes - Possible
warning

Only backups created on exactly version 5.9.4.2 are accepted. Always verify your source server version before creating the migration backup.

In-Place Upgrade vs. Migration Upgrade

AspectIn-Place UpgradeMigration Upgrade
What it doesUpdates EPP app on existing OSMoves config to a new clean VM
OS updated?❌ No✅ Yes
Event logs migrated?✅ Yes❌ No (config only)
Risk levelMediumLow (old VM preserved)
Required for 2510?Not applicable✅ Required for 2510
Rollback optionVM snapshotKeep old VM alive
tip

Netwrix recommends the migration upgrade path to the 2510 image with 2602 patch for any environment still on legacy 5.x versions. Use in-place upgrades within the 5.x series only as an intermediate step to reach 5.9.4.2.


Pre-Migration Prerequisites and Checklist

warning

Support for 5.9.4.2 and all older versions ended 14 February 2026. If you are reading this guide on a 5.x server, your environment is running without security coverage. Schedule your migration maintenance window as soon as possible.

Complete all items in this checklist before beginning any upgrade or migration activity.

License Verification

Version 2510 requires an updated license format that includes a php_els field.

How to verify your license:

  1. Open your current EPP Server console.
  2. Navigate to System Configuration → System Licensing.
  3. Download or view the license file content.
  4. Verify that the license file contains a field ending with: "php_els":"your-unique-value"

System Configuration → System Licensing — license details and ELS status

If the php_els field is missing:

  • Licenses issued after January 1, 2025 typically include it.
  • Contact Netwrix Support or your account team to request a refreshed license before proceeding.
warning

Without a valid php_els license, the new server's underlying OS components will not receive updates after migration. Don't proceed without confirming this field exists.

You can validate php_els component status in Appliance -> Server Information tab Appliance → Server Information — license

Hypervisor Compatibility Check

Verified compatible hypervisors:

  • VMware vSphere 6.7+
  • VMware ESXi 7.0+
  • Microsoft Hyper-V (Windows Server 2016+)
  • Proxmox VE (note: IP/network configuration requires manual attention — see Section 10)
  • AWS, Azure, GCP (cloud deployments — snapshot behavior differs per provider)
warning

The 2510 VM image is not compatible with VMware vSphere 6.5. If your environment runs vSphere 6.5, you must upgrade the hypervisor before deploying the new EPP image.

tip

Confirm hypervisor version compatibility before scheduling a migration maintenance window.

note

The hypervisor recommendations above reflect the best available guidance based on the EPP image format and known compatibility. However, hypervisor provisioning, configuration, and ongoing maintenance fall outside the scope of Netwrix support. Netwrix can't assist with hypervisor-side issues — customers are responsible for their own virtualisation infrastructure.

System Resource Assessment

Before any upgrade, assess the health of the current appliance. For upgrades from 5.7.0.0 to 5.9.2 ensure disk space and allocation for DB is sufficient. For migration from 5.9.4.2, note that migration transfers the configuration only — EPP logs data remain on the source server.

In the EPP Console:

  1. Go to Appliance → Server Information.
  2. Note and screenshot the following values:
    • Current server version
    • Disk Space EPP Server (database partition utilization)
    • Database Disk Space occupied (current DB size)
    • RAM and CPU allocation

You can verify disk space, current server versions in Appliance -> Server Information section. Appliance → Server Information — system health: version, disk usage, database size, CPU/RAM

Minimum resource requirements before proceeding:

For authoritative CPU, RAM, and disk minimum recommendations, refer to the official User Manual: Netwrix Endpoint Protector — Server Requirements

tip

If disk space is below 30%, perform database shrinking via System Maintenance → Audit Log Backups before proceeding. Exporting old logs to an external SIEM or repository reduces DB size significantly. If not possible, consider expanding the associated disk space. To export logs, see Audit Log Backup.

Maintenance Window Planning

Plan a maintenance window that accounts for the following:

  • Patch upload and installation time: 15–60 minutes for the 5.9.4.2 cumulative patch
  • Backup creation time: varies by configuration size
  • New VM deployment: 30–60 minutes
  • Backup restoration: 15–45 minutes
  • Post-migration verification: 30–60 minutes
  • Client package uploads: 10–20 minutes

These times are based on laboratory test results and may vary in your environment depending on a number of factors, including hardware assigned to the appliance.

During the upgrade window, the following will be unavailable:

  • EPP/EE client communication with the server
  • Email alerts and SIEM integrations
  • File Shadow and log generation
tip

EPP clients continue logging events locally during server downtime. All queued events are delivered to the server once communication is restored. No endpoint data is lost.

tip

In large enterprise environments with a high number of active EPP clients, Netwrix recommends temporarily disabling client communications before starting the upgrade. This prevents clients from sending EPP logs to the server during the process, allowing the server to focus on the upgrade and ensuring no logs are left unprocessed in the queue. Client communications can be disabled in several ways:

  • Blocking the EPP communication port on the perimeter or host-based firewall
  • Blocking the port at the virtual machine network stack level (vSwitch port group policy, NSX rule, or equivalent)

Re-enable communications after the upgraded server has been verified and is ready to accept traffic.

VM Snapshot and Backup

This step is non-negotiable. Don't proceed without completing both.

note

VM backup and snapshot management is the full responsibility of the customer's administrators. Netwrix doesn't manage, verify, or maintain hypervisor-level snapshots. However, Netwrix considers a valid VM snapshot an obligatory prerequisite before starting any upgrade or migration activity. Proceeding without a snapshot means there is no rollback path — if there is a failure, recovery may be impossible without one, and Netwrix Support will be unable to assist with restoring the environment.

Step 1 — Create a VM snapshot on your hypervisor (VMware, Hyper-V, ESXi, AWS, Azure, etc.).

warning

In AWS, snapshots are queued and not taken instantly. Verify the snapshot is in "completed" status before proceeding.

tip

Keep the VM snapshot active until you have fully validated the new 2510 environment and are ready to decommission the old server. This is your rollback path.

Step 2 — Create a System Configuration Backup (in the EPP Console):

  1. Log in to Endpoint Protector Console.
  2. Navigate to System Maintenance → System Backup.
  3. Click Create, enter a name and description (include the date and version, e.g., pre-upgrade-5942-2026-04-20), click Save.
  4. Save the System Backup Key displayed in the prompt — you need this key for restoration and cannot recover it if lost.
  5. Wait for the status to show "Ready to download", then download the backup file.

System Maintenance → System Backup — backup creation wizard

System Backup Key prompt modal

System Backup list — Ready to download status after creation

danger

Store backup files in a secure repository with limited access. The backup contains full server configuration including policies, users, groups, and device rules.

Step 3 — Export logs and file shadows separately (optional but recommended):

The System Configuration Backup does not include logs and file shadows. If you need historical logs for compliance or forensics:

  • Use System Maintenance → Audit Log Backups to export logs to an external location. See Audit Log Backup for export steps.
  • Retain the old server VM after migration for log access.
tip

If your organization has compliance requirements for data retention (e.g., GDPR, HIPAA, SOX), never decommission the old server until you have confirmed that log retention requirements are met by an alternative solution (SIEM, external export).

Pre-Migration Checklist Summary

#TaskStatus
1License contains php_els field
2VM snapshot created and confirmed
3System backup created and key saved
4Backup file downloaded to secure location
5Disk space ≥ 30% free on current server
6Server resource counters noted (baseline)
7Maintenance window communicated
8Appliance → Server Information screenshot taken
9Updated license file obtained (with php_els)
10EPP Client 5.9.4.3 (for customers not migrated yet) or latest packages downloaded
11EE Client 2509+ packages downloaded (if applicable)

Phase 1 — Upgrade to 5.9.4.2 via Cumulative Patch

This phase applies to environments running any version from 5.7.0.0 through 5.9.4.1. The cumulative patch upgrades your server directly to 5.9.4.2 in a single operation, incorporating all fixes and features introduced across every intermediate version.

Downloading the Cumulative Patch

The 5.9.4.2 cumulative patch is available from the Netwrix Community portal. Contact your Netwrix account team or Customer Support to obtain the patch file if you don't have direct access.

tip

📹 Community Portal: A video walkthrough of the cumulative patch process is available at the Netwrix Community: 5.9.4.2 Cumulative Upgrade Patch for Endpoint Protector Server 5.7.0.0–5.9.4.1

The patch includes:

  • All updates, fixes, and features from 5.7.0.0 through 5.9.4.2
  • Latest Enforced Encryption Client
  • A separate offline client patch is also available (Windows and macOS direct installers provided)

Applying the Offline Cumulative Patch

  1. Download the patch file to the machine you will use to access the EPP console.
  2. Log in to the Endpoint Protector Server Console.
  3. Navigate to Dashboard → Live Update.
  4. Click Offline Patch Uploader.

Dashboard → Live Update — Offline Patch Uploader button

  1. In the wizard, select the downloaded patch file and click Upload Patch.

Offline Patch Uploader wizard — file selection and Upload button

  1. After the file is uploaded, click Back when prompted.
  2. The progress notification will appear in the Software Update section.

Software Update — active upgrade progress status

Monitoring Patch Progress

The patch installation typically takes 15–60 minutes depending on server performance. You can monitor progress by staying on the Dashboard → Live Update page and watching the status bar.

Post-Patch Verification

After the installation completes:

  1. The console will display "Last updates applied successfully" status.
  2. Refresh your browser and log back in.
  3. Navigate to Appliance → Server Information and confirm the version shows 5.9.4.2.
  4. Verify the update history: Dashboard → Live Update → View all applied updates.

After the patch applies successfully, don't perform any further upgrades or major configuration changes for at least 24 hours. Although the UI confirms the patch as complete, a set of critical background processes continues running after the visible upgrade finishes. These include:

  • Database schema migration — aligns internal table structures and indexes to the new version format
  • Log reindexing — rebuilds search indexes across stored audit and event logs
  • Service reconfiguration — updates internal service dependencies, daemon configurations, and file path mappings introduced by the patch
  • Nightly cron maintenance — runs at 9:00 PM and performs integrity checks, cache rebuilds, and housekeeping tasks that finalize the upgrade state

These tasks run silently in the background and don't produce visible progress in the console. Performing another upgrade, restoring a backup, or making significant configuration changes before these processes complete can impact stability or, in edge cases, corrupt the database or leave the server in an inconsistent state that is difficult to recover.

Create Final Backup at 5.9.4.2

After confirming the upgrade to 5.9.4.2 is stable (wait for the 24-hour background task window), create a new System Configuration Backup specifically for use in the 2510 migration:

  1. Navigate to System Maintenance → System Backup.
  2. Click Create and name it clearly: migration-to-2510-YYYY-MM-DD.
  3. Save the backup key securely.
  4. Download the backup file once status shows "Ready to download".
tip

This backup at 5.9.4.2 is the only backup that will work on the 2510 platform. Label it clearly and store it separately from previous backups to avoid any confusion during the restoration step.


Phase 2 — Deploy 2510 Base Image and Migrate to 2602

Choosing Your IP/FQDN Strategy

Before deploying the new VM, decide whether the new 2510 server will use the same or a different IP address/FQDN as the current server. This decision has significant security and operational implications.

AspectDetail
Certificate trustPreserved — no changes required on endpoints
Enforced Encryption (EE)No user action required — drives remain encrypted
DPI / CAP functionalityWorks immediately after migration
Client reconnectionAutomatic — endpoints find server at same address
Recommended forAll environments, especially EE deployments

Procedure:

  • Shut down or isolate the old 5.9.4.2 server before starting the new one.
  • Assign the old IP address to the new 2510 VM.
  • DNS records remain unchanged.
tip

Always use the same IP/FQDN option. The operational complexity and user impact of changing the IP/FQDN — especially in environments using Enforced Encryption — is very high. Consider a different IP/FQDN only when technically unavoidable.

RiskImpact
DPI certificate trust brokenContent Aware Protection and DPI will fail until certificates regenerated
CAP policy disruptionAll Content Aware Protection rules break
EE drives lockedUsers must manually decrypt and re-encrypt every protected drive
Root CA redistributionNew root CA must be pushed to all endpoints via GPO/MDM
High server loadCertificate regeneration for all endpoints creates a burst load spike

⚠️ Warning: If using Enforced Encryption and you change the IP/FQDN, every user with an EE-protected drive must decrypt their drive and re-encrypt it after reconnecting to the new server. This can be a major operational disruption in large organizations. This is strongly discouraged.

Deploying the 2510 Base Image

tip

Both the 2509 and 2510 base images can be upgraded directly to 2602. The 2510 image is recommended for new deployments — it includes improvements to disk sizing (320 GB) and resolves DHCP/DNS configuration issues present in 2509. If you already have a 2509 image available, it is fully supported and reaches 2602 without any intermediate image migration.

  1. Download the Endpoint Protector 2510 VM image from the Netwrix portal or as provided by your account team.
  2. Deploy the VM in your hypervisor environment.
  3. Configure the VM network settings:
    • Assign IP address (same as old server if using Option A)
    • Configure DNS
note

⚠️ Known Issue: IP network settings may not save correctly if only one DNS field is filled. Workaround: Fill both DNS fields. Use for example Google's public DNS (8.8.8.8 and 8.8.4.4) as a secondary if you don't have a second internal DNS server.

2510 Network Configuration — IP, subnet, gateway, both DNS fields filled

  1. Power on the new VM and access the console at https://<new-ip-or-fqdn>:443.

Temporarily Disabling Client Communications

Immediately after the new VM is provisioned and reachable, disable client communications before performing any further configuration. This prevents endpoints from discovering and connecting to the new server while it is still being prepared.

  1. Log in to the new server console.
  2. Navigate to System Configuration → System Settings.
  3. Disable client communication.
tip

Disabling client communications prevents endpoints from registering with an incomplete server configuration. Re-enable only after the full restoration and verification is complete.

Import License on the Fresh 2510 Image

warning

The license must be imported before applying any patches. Without an active ELS for PHP license, the server can't receive OS updates, and the patch process will fail or be incomplete.

  1. Navigate to System Configuration → System Licensing → Import License.
  2. Upload the license file that contains the php_els field.
  3. After import, go to Appliance → Server Information.
  4. Confirm that "ELS for PHP = Active" is displayed before continuing.

If license has been properly imported you should be able to see: Appliance → Server Information — ELS for PHP = Active after license import

in case of errors: Appliance → Server Information — ELS for PHP = Error after license import

danger

If ELS for PHP is not Active, stop and resolve this before proceeding. The server can't receive patches without it, and the subsequent upgrade step will not complete successfully.

Upgrade the 2510 Image to the Latest Version (2602)

With the license active, upgrade the fresh 2510 image to the current latest patch version. At time of writing this is 2602, but always apply all available updates.

  1. Navigate to System Configuration → Server Update.
  2. Use the Offline Patch Uploader if the server has no internet access:
    • Navigate to Dashboard → Live Update → Offline Patch Uploader.
    • Upload the patch file for each version in sequence until reaching 2602.

System Configuration → Software Update — patch upload and version progression

tip

For air-gapped environments, request all interim patch files (2510 → 2511 → … → 2602) from Netwrix Support before the maintenance window.

  1. After each patch, refresh browser and verify the version in Appliance → Server Information before applying the next.
  2. Once on 2602, confirm the server is stable and all services are running before proceeding to the backup restore.

Appliance → Server Information — version 2602 after patching

Restoring the 5.9.4.2 Backup onto 2602

The 5.9.4.2 backup is restored onto the fully patched 2602 server. The backup format is compatible with all versions in the new image series (2510 through 2602 and later).

  1. Log in to the 2602 server console.
  2. Navigate to System Maintenance → System Backup v2.
  3. Click Import and Restore (Migrate).

System Maintenance → System Backup v2 — Import and Restore (Migrate) button

  1. In the wizard, select the 5.9.4.2 backup file you created in Phase 1.
  2. Enter the System Backup Key saved during backup creation.
  3. Click Import.

Import and Restore wizard — file selection, key entry, and Import button

  1. Monitor the restore progress: the status will show "Generating" while restoring.
    • Click Reload above the status column to refresh progress.
    • If the console becomes unresponsive, refresh the browser — this is normal during application restart.

System Backup list — Generating status during active restore

  1. Once complete, the status changes to "Ready to download".

System Backup list — Ready to download status confirming successful restore

tip

Restoration can take several minutes depending on backup size. Don't interrupt the process or close the browser. If the console appears frozen, wait at least 5 minutes before refreshing.

warning

Large backups on under-resourced VMs can cause server unresponsiveness or a 500 error during import. If you receive a 500 error:

  1. Don't retry immediately — check server logs via SSH first.
  2. Verify at least 2 GB free disk space on the VM.
  3. Verify the backup file isn't corrupted (re-download from the source server if needed).
  4. Contact Netwrix Support if the error persists.

Phase 3 - Uploading EPP & EE Client Packages

The new 2509/2510 server and further EPP Server patches don't include client packages by default. You must upload them manually.

If you are using an external tool to manage your packages, you can ignore this section unless you are a Netwrix Enforced Encryption (EasyLock) customer — in that case, you need to follow the instructions below.

Certificate Bridge and Upgrade Path

Understanding the required package set requires knowing why a direct upgrade from older 5.x clients to 2602 isn't possible.

Netwrix acquired CoSoSys (the original developer of Endpoint Protector) and transitioned all code signing certificates from CoSoSys signatures to Netwrix signatures. This transition affects how endpoint clients verify server-pushed updates:

Client VersionTrusted SignaturesNotes
5.9.4.1 and olderCoSoSys onlyCan't verify Netwrix-signed packages
5.9.4.3Both CoSoSys AND Netwrix✅ The required bridge version
2511 and newerNetwrix onlyCan't be pushed to 5.9.4.1 clients directly

Clients on 5.9.4.1 or older can't upgrade directly to 2602. They must first upgrade to 5.9.4.3 (which trusts both signature types), then proceed to 2602:

EPP Server Migration — end-to-end process diagram

Required Packages

The packages you need to upload depend on your current EPP client population and whether you use Enforced Encryption.

PackageNotes
EPP Client 2602 (Windows)Latest — primary target for all endpoints
EPP Client 2602 (macOS)Latest — primary target for all endpoints
EPP Client 5.9.4.3 Hotfix 1 (Windows)Bridge client — required only for endpoints still below 5.9.4.3
EPP Client 5.9.4.3 Hotfix 1 (macOS)Bridge client — required only for endpoints still below 5.9.4.3
Checksum file for each clientRequired for integrity verification
EE Client 2602 (Windows)Latest — required if Enforced Encryption is in use
EE Client 2602 (macOS)Latest — required if Enforced Encryption is in use

Upload Procedure

The client update mechanism controls how EPP clients are distributed and updated from the server. For a full description of available settings and options, see Client Update Mechanism.

  1. Navigate to System Configuration → Client Software.
  2. Use the upload function to add each client package and its corresponding checksum file.

System Configuration → Client Software — uploaded client versions

warning

Upload both EE clients for Windows and macOS if both operating systems are in use in your organization. Missing even one platform's EE client can break encryption enforcement on that platform.


Post-Migration Verification

Complete all items in this checklist after the migration is finished.

Server Health Check

CheckHow to Verify
Server version shows latest 2602.0.x.x versionAppliance → Server Information
ELS for PHP = ActiveAppliance → Server Information
Server responds to browser accesshttps://<server>:443 loads normally
License imported successfullySystem Configuration → System Licensing

Appliance → Server Information on 2510 — version, ELS status, system health

Re-Enabling Client Communications

After the restore is verified and client packages are uploaded:

  1. Navigate to System Configuration → System Settings.
  2. Re-enable client communications.
  3. Monitor Device Control → Computers — endpoints should begin checking in within their configured communication interval.

Endpoint Communication Check

  1. Navigate to Device Control → Computers.
  2. Sort by Last Seen column.
  3. Verify that endpoints are checking in with recent timestamps (within expected communication interval).
  4. Check for any endpoints stuck on old client versions.

Device Control → Computers — sorted by Last Seen, recent endpoint check-ins

Policy and Functionality Check

Verify each active module:

ModuleWhere to Check
Device ControlDevice Control → Dashboard
Content Aware ProtectionContent Aware Protection → Dashboard
eDiscoveryeDiscovery → Dashboard
Enforced EncryptionCheck that EE-protected drives are accessible
Reports & AnalyticsReports and Analytics → relevant sub-service
AlertsCheck that configured alerts are firing
tip

Generate deliberate test events on a known test machine for each active module. For example: plug in a USB drive (Device Control), transfer a file with sensitive content (CAP), run an eDiscovery scan. Confirm the events appear in the console before declaring the migration complete.

DPI / CAP Functionality Verification

If using Deep Packet Inspection or Content Aware Protection:

  1. Verify the root CA certificate is trusted on endpoints.
  2. Test a known-blocked transfer to confirm CAP policy is active.
  3. If endpoints don't trust the certificates, and you used a different IP/FQDN, you may need to push the new root CA via GPO or MDM.

Backup Creation Verification

  1. Navigate to System Maintenance → System Backup.
  2. Verify that backups are configured and active.
  3. Run a test backup and confirm "Ready to download" status.

Third-Party Integration Reconfiguration

After migration, manually re-import and reconfigure all 3rd-party integrations. While the backup includes configuration data, it doesn't always fully restore credentials and connection secrets, and integration endpoints may require re-registration against the new server.

Re-import and reconfigure each active integration before proceeding to verification:

IntegrationWhere to Reconfigure
SMTP / Email alertsSystem Configuration → System Settings → Email Configuration
AD / LDAPSystem Configuration → Active Directory / LDAP
Entra ID / SSO / SCIMSystem Configuration → SSO / Single Sign-On
SIEM / SyslogSystem Configuration → SIEM Settings
AWS / S3 / File ShadowsSystem Configuration → File Shadow Repository

Post-Migration Integration Verification

Once reconfigured, verify each integration is functioning:

IntegrationHow to Verify
SMTP / Email alertsUse the built-in test email function; confirm delivery
AD / LDAPClick Test Connection; trigger a manual sync; check object counts
Entra ID / SSOPerform a test SSO login in an incognito browser window
SIEM / SyslogGenerate a test event; confirm it appears in the SIEM receiver
AWS / S3 / File ShadowsGenerate a file shadow; confirm it reaches the S3 bucket

Troubleshooting Failed Integrations

If an integration fails verification, use the steps below:

SMTP / Email alerts not firing:

  1. Navigate to System Configuration → System Settings → Email Configuration.
  2. Re-enter SMTP credentials — passwords aren't always restored from backup.
  3. Use the test email function and check server logs if delivery fails.
  4. Verify firewall allows outbound on the configured SMTP port (25, 465, or 587).

AD / LDAP sync broken:

  1. Navigate to System Configuration → Active Directory / LDAP.
  2. Click Test Connection — if it fails, re-enter the bind DN and password.
  3. Trigger a manual sync and monitor for completion.
warning

AD Sync may appear to complete successfully but only import a partial set of users or groups. Always cross-check the imported object count against your directory — don't rely solely on the "success" status message.

Entra ID / SSO / SCIM not working:

  1. Navigate to System Configuration → SSO / Single Sign-On.
  2. Re-enter tenant ID, client ID, and client secret — these aren't restored from backup.
  3. Verify the redirect URI registered in Azure AD matches the new server address.
  4. Perform a test SSO login in an incognito window.
  5. If SCIM provisioning is broken, re-generate the SCIM token in the EPP console and update it in Entra ID.

SIEM / Syslog events not forwarding:

  1. Reconfigure the SIEM destination IP, port, and protocol.
  2. Generate a test event and confirm it reaches the SIEM receiver.
  3. If events still don't appear, contact Netwrix Support — a server-side script may be required to restart the syslog forwarding service.

AWS / S3 file shadows unreachable:

  1. Navigate to System Configuration → File Shadow Repository.
  2. Re-enter the S3 bucket name, region, access key, and secret key.
  3. Run a test file shadow and confirm the file appears in the bucket.

Audit Log Backup Verification

warning

After migration to 2510/2601, the Audit Log Backup job can enter a state where it runs continuously and never completes. Always verify that jobs finish within a reasonable timeframe.

After migration, verify:

  1. Navigate to System Maintenance → Audit Log Backups.
  2. Check that any running audit backup jobs have a defined end time and aren't stuck in an active state.
  3. If a job has been running for more than 4 hours with no progress, stop it and contact Netwrix Support.
tip

Don't start Audit Log Backup jobs immediately after migration. Allow the server to stabilize for 24 hours, then start a test backup and monitor its completion before scheduling recurring jobs.

Performance Baseline Comparison

Compare current resource utilization with the baseline captured in the prerequisites:

  • CPU and RAM usage should be similar or lower than before migration.
  • After initial policy recalibration (which may cause a brief CPU spike), utilization should normalize.
  • Monitor for 48 hours post-migration before drawing conclusions.

Deploying Client Upgrades

For a full overview of the Client Software Upgrade feature, including version management and deployment settings, see Client Software Upgrade.

tip

Use your organization's existing software deployment infrastructure (Microsoft Intune, SCCM, Jamf, or equivalent) for client upgrades rather than relying solely on EPP's built-in upgrade function. Enterprise deployment tools provide better visibility, rollback capability, and bandwidth management.

If using EPP's built-in upgrade:

  1. Navigate to System Configuration → Client Software Upgrade.
  2. Select the target OS and agent version, click Next.
  3. Select target computers carefully.

⚠️ Warning: EPP's built-in upgrade is rate-limited to 50 machines per hour. For large deployments, plan accordingly or use external deployment tools.

tip

Always upgrade a small pilot group (10–20 endpoints across diverse hardware/OS configurations) before mass rollout. Validate behavior, policies, and communication for 24–48 hours before proceeding with the full fleet.