McAfee Endpoint Security update impaired Windows logging: how to deal with the problem?

The update to the McAfee Endpoint Security (ENS) antivirus program, released yesterday, brought much headaches to system administrators around the world.

The problem was that after installing the update, users could not log in on their computers.

The first complaints about impaired Windows login appeared on the Reddit site. The corresponding branch reported that UK Power Networks employees could not log in to the system on their computers due to “mcafee system update”.

“McAfee changed something overnight in the amcore or exploit prevention content and users can no longer log on. No network connectivity, can only log on via safe mode”, — complains Therez1976 user.

Soon victims discovered that the root of the problem lay in updating the McAfee ENS Exploit Prevention component designed to combat exploits. It conflicted with the old version of ENS.

McAfee has published its own statement about this, stating that the problem is observed with the version of Exploit Prevent 9418. The developers quickly released an update to Exploit Prevent version 9419, in which this bug was fixed.

To fix the login problem manually, you will need to complete the following steps:

  • Make sure Exploit Prevention is disabled.
  • Boot the system in safe mode.
  • Open the following registry key: HKEY_LOCAL_MACHINE\SOFTWARE\McAfee\Endpoint\Common\BusinessObjectRegistry\BO Set the value to “0”.
  • Reboot the system.
Sending
User Review
0 (0 votes)
Comments Rating 0 (0 reviews)

About the author

Brendan Smith

Cybersecurity analyst with 15+ years digging into malware and threats, from early days reverse-engineering trojans to leading incident responses for mid-sized firms.

At Gridinsoft, I handle peer-reviewed breakdowns of stuff like AsyncRAT ransomware—last year, my guides helped flag 200+ variants in real scans, cutting cleanup time by 40% for users. Outside, I write hands-on tutorials on howtofix.guide, like step-by-step takedowns of pop-up adware using Wireshark and custom scripts (one post on VT alternatives got 5k reads in a month).

Certified CISSP and CEH, I’ve run webinars for 300+ pros on AI-boosted stealers—always pushing for simple fixes that stick, because nobody has time for 50-page manuals. Tools of the trade: Splunk for hunting, Ansible for automation, and a healthy dose of coffee to outlast the night shifts.

Leave a Reply

Sending