<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Possible reason for BSOD (Blue screen of death) in Endpoint</title>
    <link>https://community.checkpoint.com/t5/Endpoint/Possible-reason-for-BSOD-Blue-screen-of-death/m-p/173622#M6654</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;SPAN&gt;andrey_s, did you find what the issue is in your case? I am having exactly the same problem on four Windows 2019 servers datacenter version. I uninstalled the Checkpoint on one of them, so will see.&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Sun, 05 Mar 2023 21:29:50 GMT</pubDate>
    <dc:creator>martasfly</dc:creator>
    <dc:date>2023-03-05T21:29:50Z</dc:date>
    <item>
      <title>Possible reason for BSOD (Blue screen of death)</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Possible-reason-for-BSOD-Blue-screen-of-death/m-p/149716#M5698</link>
      <description>&lt;P&gt;Hello! We have bsod problem on one of the virtual servers. And I thought maybe it's related to the Endpoint Security client installed on the server. If anybody faced the similar issue and have the fix or clue? Below the dump log. Thanks guys!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Microsoft (R) Windows Debugger Version 10.0.25111.1000 AMD64&lt;BR /&gt;Copyright (c) Microsoft Corporation. All rights reserved.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Loading Dump File [C:\Source\021222-58046-01.dmp]&lt;BR /&gt;Mini Kernel Dump File: Only registers and stack trace are available&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;************* Path validation summary **************&lt;BR /&gt;Response Time (ms) Location&lt;BR /&gt;Deferred srv*&lt;BR /&gt;Symbol search path is: srv*&lt;BR /&gt;Executable search path is:&lt;BR /&gt;Windows 8.1 Kernel Version 9600 MP (12 procs) Free x64&lt;BR /&gt;Product: Server, suite: TerminalServer SingleUserTS&lt;BR /&gt;Edition build lab: 9600.20237.amd64fre.winblue_ltsb_escrow.211215-1033&lt;BR /&gt;Machine Name:&lt;BR /&gt;Kernel base = 0xfffff802`92c8b000 PsLoadedModuleList = 0xfffff802`92f4e5f0&lt;BR /&gt;Debug session time: Sat Feb 12 14:59:54.479 2022 (UTC + 3:00)&lt;BR /&gt;System Uptime: 13 days 10:02:32.531&lt;BR /&gt;Loading Kernel Symbols&lt;BR /&gt;...............................................................&lt;BR /&gt;................................................................&lt;BR /&gt;..........................................&lt;BR /&gt;Loading User Symbols&lt;BR /&gt;Loading unloaded module list&lt;BR /&gt;......&lt;BR /&gt;For analysis of this file, run !analyze -v&lt;BR /&gt;nt!KeBugCheckEx:&lt;BR /&gt;fffff802`92dca1c0 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffd000`203fcbc0=000000000000001e&lt;BR /&gt;3: kd&amp;gt; !analyze -v&lt;BR /&gt;*******************************************************************************&lt;BR /&gt;* *&lt;BR /&gt;* Bugcheck Analysis *&lt;BR /&gt;* *&lt;BR /&gt;*******************************************************************************&lt;/P&gt;&lt;P&gt;KMODE_EXCEPTION_NOT_HANDLED (1e)&lt;BR /&gt;This is a very common BugCheck. Usually the exception address pinpoints&lt;BR /&gt;the driver/function that caused the problem. Always note this address&lt;BR /&gt;as well as the link date of the driver/image that contains this address.&lt;BR /&gt;Arguments:&lt;BR /&gt;Arg1: ffffffffc0000005, The exception code that was not handled&lt;BR /&gt;Arg2: fffff800eeae6529, The address that the exception occurred at&lt;BR /&gt;Arg3: ffffd000203fdbc8, Parameter 0 of the exception&lt;BR /&gt;Arg4: ffffd000203fd3e0, Parameter 1 of the exception&lt;/P&gt;&lt;P&gt;Debugging Details:&lt;BR /&gt;------------------&lt;/P&gt;&lt;P&gt;*************************************************************************&lt;BR /&gt;*** ***&lt;BR /&gt;*** ***&lt;BR /&gt;*** Either you specified an unqualified symbol, or your debugger ***&lt;BR /&gt;*** doesn't have full symbol information. Unqualified symbol ***&lt;BR /&gt;*** resolution is turned off by default. Please either specify a ***&lt;BR /&gt;*** fully qualified symbol module!symbolname, or enable resolution ***&lt;BR /&gt;*** of unqualified symbols by typing ".symopt- 100". Note that ***&lt;BR /&gt;*** enabling unqualified symbol resolution with network symbol ***&lt;BR /&gt;*** server shares in the symbol path may cause the debugger to ***&lt;BR /&gt;*** appear to hang for long periods of time when an incorrect ***&lt;BR /&gt;*** symbol name is typed or the network symbol server is down. ***&lt;BR /&gt;*** ***&lt;BR /&gt;*** For some commands to work properly, your symbol path ***&lt;BR /&gt;*** must point to .pdb files that have full type information. ***&lt;BR /&gt;*** ***&lt;BR /&gt;*** Certain .pdb files (such as the public OS symbols) do not ***&lt;BR /&gt;*** contain the required information. Contact the group that ***&lt;BR /&gt;*** provided you with these symbols if you need this command to ***&lt;BR /&gt;*** work. ***&lt;BR /&gt;*** ***&lt;BR /&gt;*** Type referenced: ExceptionRecord ***&lt;BR /&gt;*** ***&lt;BR /&gt;*************************************************************************&lt;BR /&gt;*************************************************************************&lt;BR /&gt;*** ***&lt;BR /&gt;*** ***&lt;BR /&gt;*** Either you specified an unqualified symbol, or your debugger ***&lt;BR /&gt;*** doesn't have full symbol information. Unqualified symbol ***&lt;BR /&gt;*** resolution is turned off by default. Please either specify a ***&lt;BR /&gt;*** fully qualified symbol module!symbolname, or enable resolution ***&lt;BR /&gt;*** of unqualified symbols by typing ".symopt- 100". Note that ***&lt;BR /&gt;*** enabling unqualified symbol resolution with network symbol ***&lt;BR /&gt;*** server shares in the symbol path may cause the debugger to ***&lt;BR /&gt;*** appear to hang for long periods of time when an incorrect ***&lt;BR /&gt;*** symbol name is typed or the network symbol server is down. ***&lt;BR /&gt;*** ***&lt;BR /&gt;*** For some commands to work properly, your symbol path ***&lt;BR /&gt;*** must point to .pdb files that have full type information. ***&lt;BR /&gt;*** ***&lt;BR /&gt;*** Certain .pdb files (such as the public OS symbols) do not ***&lt;BR /&gt;*** contain the required information. Contact the group that ***&lt;BR /&gt;*** provided you with these symbols if you need this command to ***&lt;BR /&gt;*** work. ***&lt;BR /&gt;*** ***&lt;BR /&gt;*** Type referenced: ContextRecord ***&lt;BR /&gt;*** ***&lt;BR /&gt;*************************************************************************&lt;BR /&gt;*************************************************************************&lt;BR /&gt;*** ***&lt;BR /&gt;*** ***&lt;BR /&gt;*** Either you specified an unqualified symbol, or your debugger ***&lt;BR /&gt;*** doesn't have full symbol information. Unqualified symbol ***&lt;BR /&gt;*** resolution is turned off by default. Please either specify a ***&lt;BR /&gt;*** fully qualified symbol module!symbolname, or enable resolution ***&lt;BR /&gt;*** of unqualified symbols by typing ".symopt- 100". Note that ***&lt;BR /&gt;*** enabling unqualified symbol resolution with network symbol ***&lt;BR /&gt;*** server shares in the symbol path may cause the debugger to ***&lt;BR /&gt;*** appear to hang for long periods of time when an incorrect ***&lt;BR /&gt;*** symbol name is typed or the network symbol server is down. ***&lt;BR /&gt;*** ***&lt;BR /&gt;*** For some commands to work properly, your symbol path ***&lt;BR /&gt;*** must point to .pdb files that have full type information. ***&lt;BR /&gt;*** ***&lt;BR /&gt;*** Certain .pdb files (such as the public OS symbols) do not ***&lt;BR /&gt;*** contain the required information. Contact the group that ***&lt;BR /&gt;*** provided you with these symbols if you need this command to ***&lt;BR /&gt;*** work. ***&lt;BR /&gt;*** ***&lt;BR /&gt;*** Type referenced: ExceptionRecord ***&lt;BR /&gt;*** ***&lt;BR /&gt;*************************************************************************&lt;BR /&gt;*************************************************************************&lt;BR /&gt;*** ***&lt;BR /&gt;*** ***&lt;BR /&gt;*** Either you specified an unqualified symbol, or your debugger ***&lt;BR /&gt;*** doesn't have full symbol information. Unqualified symbol ***&lt;BR /&gt;*** resolution is turned off by default. Please either specify a ***&lt;BR /&gt;*** fully qualified symbol module!symbolname, or enable resolution ***&lt;BR /&gt;*** of unqualified symbols by typing ".symopt- 100". Note that ***&lt;BR /&gt;*** enabling unqualified symbol resolution with network symbol ***&lt;BR /&gt;*** server shares in the symbol path may cause the debugger to ***&lt;BR /&gt;*** appear to hang for long periods of time when an incorrect ***&lt;BR /&gt;*** symbol name is typed or the network symbol server is down. ***&lt;BR /&gt;*** ***&lt;BR /&gt;*** For some commands to work properly, your symbol path ***&lt;BR /&gt;*** must point to .pdb files that have full type information. ***&lt;BR /&gt;*** ***&lt;BR /&gt;*** Certain .pdb files (such as the public OS symbols) do not ***&lt;BR /&gt;*** contain the required information. Contact the group that ***&lt;BR /&gt;*** provided you with these symbols if you need this command to ***&lt;BR /&gt;*** work. ***&lt;BR /&gt;*** ***&lt;BR /&gt;*** Type referenced: ContextRecord ***&lt;BR /&gt;*** ***&lt;BR /&gt;*************************************************************************&lt;BR /&gt;GetUlongPtrFromAddress: unable to read from fffff80292fd8308&lt;/P&gt;&lt;P&gt;KEY_VALUES_STRING: 1&lt;/P&gt;&lt;P&gt;Key : Analysis.CPU.mSec&lt;BR /&gt;Value: 3156&lt;/P&gt;&lt;P&gt;Key : Analysis.DebugAnalysisManager&lt;BR /&gt;Value: Create&lt;/P&gt;&lt;P&gt;Key : Analysis.Elapsed.mSec&lt;BR /&gt;Value: 10513&lt;/P&gt;&lt;P&gt;Key : Analysis.Init.CPU.mSec&lt;BR /&gt;Value: 890&lt;/P&gt;&lt;P&gt;Key : Analysis.Init.Elapsed.mSec&lt;BR /&gt;Value: 7605&lt;/P&gt;&lt;P&gt;Key : Analysis.Memory.CommitPeak.Mb&lt;BR /&gt;Value: 84&lt;/P&gt;&lt;P&gt;Key : WER.OS.Branch&lt;BR /&gt;Value: winblue_ltsb_escrow&lt;/P&gt;&lt;P&gt;Key : WER.OS.Timestamp&lt;BR /&gt;Value: 2021-12-15T10:33:00Z&lt;/P&gt;&lt;P&gt;Key : WER.OS.Version&lt;BR /&gt;Value: 8.1.9600.20237&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;FILE_IN_CAB: 021222-58046-01.dmp&lt;/P&gt;&lt;P&gt;VIRTUAL_MACHINE: VMware&lt;/P&gt;&lt;P&gt;BUGCHECK_CODE: 1e&lt;/P&gt;&lt;P&gt;BUGCHECK_P1: ffffffffc0000005&lt;/P&gt;&lt;P&gt;BUGCHECK_P2: fffff800eeae6529&lt;/P&gt;&lt;P&gt;BUGCHECK_P3: ffffd000203fdbc8&lt;/P&gt;&lt;P&gt;BUGCHECK_P4: ffffd000203fd3e0&lt;/P&gt;&lt;P&gt;EXCEPTION_PARAMETER1: ffffd000203fdbc8&lt;/P&gt;&lt;P&gt;EXCEPTION_PARAMETER2: ffffd000203fd3e0&lt;/P&gt;&lt;P&gt;WRITE_ADDRESS: GetUlongPtrFromAddress: unable to read from fffff80292fd82a8&lt;BR /&gt;GetUlongPtrFromAddress: unable to read from fffff80292fd8530&lt;BR /&gt;ffffd000203fd3e0&lt;/P&gt;&lt;P&gt;CUSTOMER_CRASH_COUNT: 1&lt;/P&gt;&lt;P&gt;PROCESS_NAME: System&lt;/P&gt;&lt;P&gt;STACK_TEXT:&lt;BR /&gt;ffffd000`203fcbb8 fffff802`92e3d363 : 00000000`0000001e ffffffff`c0000005 fffff800`eeae6529 ffffd000`203fdbc8 : nt!KeBugCheckEx&lt;BR /&gt;ffffd000`203fcbc0 fffff802`92ddf836 : fffff800`f0acecc0 ffffe001`fc22ffaa ffffd000`203fcd30 ffffd000`203fcf70 : nt!KiFatalFilter+0x1f&lt;BR /&gt;ffffd000`203fcc00 fffff802`92db91c6 : ffffe001`fc22ffcc fffff800`f0b04880 00000000`00010001 00000000`00000801 : nt! ?? ::FNODOBFM::`string'+0x8e6&lt;BR /&gt;ffffd000`203fcc40 fffff802`92dd2d6d : 00000000`00000000 ffffd000`203fcde0 ffffd000`203fdbc8 ffffd000`203fcde0 : nt!_C_specific_handler+0x86&lt;BR /&gt;ffffd000`203fccb0 fffff802`92d15ba5 : 00000000`00000001 fffff802`92c8b000 ffffd000`203fdb00 00000000`00000000 : nt!RtlpExecuteHandlerForException+0xd&lt;BR /&gt;ffffd000`203fcce0 fffff802`92d63639 : ffffd000`203fdbc8 ffffd000`203fd8e0 ffffd000`203fdbc8 ffffe002`03a24ac0 : nt!RtlDispatchException+0x1a5&lt;BR /&gt;ffffd000`203fd3b0 fffff802`92dda542 : ffffe001`e509c040 ffffe001`d617f650 00000000`00000000 00000000`000005b4 : nt!KiDispatchException+0x18d&lt;BR /&gt;ffffd000`203fda90 fffff802`92dd756c : fffff780`00000008 ffffe001`d73ab1e0 00000000`000005b4 ffffe001`d6325480 : nt!KiExceptionDispatch+0xc2&lt;BR /&gt;ffffd000`203fdc70 fffff800`eeae6529 : 00020dc0`bc0c0000 00000000`00000155 ffffe001`d5975270 ffffd000`203fde70 : nt!KiGeneralProtectionFault+0x2ec&lt;BR /&gt;ffffd000`203fde00 fffff800`eead7ea6 : 00000000`00000000 00000000`00000000 ffffd000`203fdec8 00000000`00000000 : NDIS!NdisFReturnNetBufferLists+0x199&lt;BR /&gt;ffffd000`203fde80 fffff800`eead80fd : 00000000`00000002 00000000`00000001 00000000`00000001 00000000`00000003 : NDIS!ndisInvokeNextReceiveCompleteHandler+0x146&lt;BR /&gt;ffffd000`203fdf10 fffff800`eead81c2 : ffffe001`d69b71a0 00000000`00000001 ffffe002`03a24ac0 ffffe001`d79818c0 : NDIS!ndisReturnNetBufferListsInternal+0x12d&lt;BR /&gt;ffffd000`203fdf70 fffff800`efc82376 : ffffe001`eae47ae0 00000000`00000001 00000000`00000000 00000000`00000000 : NDIS!NdisReturnNetBufferLists+0x72&lt;BR /&gt;ffffd000`203fdfd0 fffff800`eea01193 : 00000000`00000000 fffff800`00000004 00000000`00000004 00000000`00000000 : tcpip+0x6b376&lt;BR /&gt;ffffd000`203fe020 fffff800`efd4d533 : 346dc5d6`3886594b ffffe001`d73ab101 ffffe001`d7982010 ffffe002`03a24ac0 : NETIO!NetioDereferenceNetBufferListChain+0xd3&lt;BR /&gt;ffffd000`203fe0c0 fffff800`efc7fe9b : 00000000`d427bc46 00000000`0000bc46 0624bc0c`00000000 00000000`00000000 : tcpip+0x136533&lt;BR /&gt;ffffd000`203fe0f0 fffff800`efc5a86c : ffffdff0`00000003 00000000`06e90826 00000000`00000000 00000000`00000000 : tcpip+0x68e9b&lt;BR /&gt;ffffd000`203fe190 fffff800`efc8a80a : ffffe001`d5d90480 ffffd000`203fe408 ffffd000`203f0dc0 00000000`00000006 : tcpip+0x4386c&lt;BR /&gt;ffffd000`203fe290 fffff800`efc8630b : ffffd640`d5b195db 00000000`0000e6a4 0000b022`00000640 00000000`00000001 : tcpip+0x7380a&lt;BR /&gt;ffffd000`203fe350 fffff800`efc84762 : 00000000`00000000 ffffd000`203fe469 00000000`00000006 0000e664`0000a8c0 : tcpip+0x6f30b&lt;BR /&gt;ffffd000`203fe3b0 fffff800`efc82b40 : ffffe001`f750bc70 ffffe001`eae47980 ffffe001`d5d51000 ffffe001`d5d51000 : tcpip+0x6d762&lt;BR /&gt;ffffd000`203fe4d0 fffff800`efc81862 : ffffe001`d797fc20 00000000`00000000 ffffd000`203fe801 00000000`00000000 : tcpip+0x6bb40&lt;BR /&gt;ffffd000`203fe850 fffff800`efc82285 : ffffe001`d7980002 00000000`00000000 fffff800`efc822d0 00000000`00000101 : tcpip+0x6a862&lt;BR /&gt;ffffd000`203fe930 fffff802`92d12e09 : 00000000`00000000 ffffe001`d5d9f8a0 ffffe001`d5a44e10 ffffd000`203f0580 : tcpip+0x6b285&lt;BR /&gt;ffffd000`203fea60 fffff800`efc82476 : fffff800`efc82130 ffffd000`203feb70 00000000`00000000 00000000`00000000 : nt!KeExpandKernelStackAndCalloutInternal+0x2d9&lt;BR /&gt;ffffd000`203feb40 fffff800`eead6a53 : 00000000`00000000 ffffd000`203fec21 00000000`00000004 00000000`06e90700 : tcpip+0x6b476&lt;BR /&gt;ffffd000`203febc0 fffff800`eead6e7f : 00000000`00000001 fffff800`f0aa0008 ffffe001`00000000 00000000`00000004 : NDIS!ndisMIndicateNetBufferListsToOpen+0x123&lt;BR /&gt;ffffd000`203fec80 fffff800`eead76b2 : ffffe001`d69b71a0 fffff800`eeae3501 fffff800`eeae3560 ffffe001`fc22fc70 : NDIS!ndisMTopReceiveNetBufferLists+0x22f&lt;BR /&gt;ffffd000`203fed10 fffff800`f0d87d56 : 00000000`00000001 ffffd000`000005dc ffffe001`000001ff 00000000`00000040 : NDIS!NdisMIndicateReceiveNetBufferLists+0x732&lt;BR /&gt;ffffd000`203fef00 00000000`00000001 : ffffd000`000005dc ffffe001`000001ff 00000000`00000040 ffffd000`00000301 : vmxnet3+0xcd56&lt;BR /&gt;ffffd000`203fef08 ffffd000`000005dc : ffffe001`000001ff 00000000`00000040 ffffd000`00000301 ffffd000`203fef88 : 0x1&lt;BR /&gt;ffffd000`203fef10 ffffe001`000001ff : 00000000`00000040 ffffd000`00000301 ffffd000`203fef88 ffffd000`203fef74 : 0xffffd000`000005dc&lt;BR /&gt;ffffd000`203fef18 00000000`00000040 : ffffd000`00000301 ffffd000`203fef88 ffffd000`203fef74 00000000`00000000 : 0xffffe001`000001ff&lt;BR /&gt;ffffd000`203fef20 ffffd000`00000301 : ffffd000`203fef88 ffffd000`203fef74 00000000`00000000 ffffe001`fc220001 : 0x40&lt;BR /&gt;ffffd000`203fef28 ffffd000`203fef88 : ffffd000`203fef74 00000000`00000000 ffffe001`fc220001 00000000`00000028 : 0xffffd000`00000301&lt;BR /&gt;ffffd000`203fef30 ffffd000`203fef74 : 00000000`00000000 ffffe001`fc220001 00000000`00000028 00000001`00000000 : 0xffffd000`203fef88&lt;BR /&gt;ffffd000`203fef38 00000000`00000000 : ffffe001`fc220001 00000000`00000028 00000001`00000000 00000030`00000040 : 0xffffd000`203fef74&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;SYMBOL_NAME: NETIO!NetioDereferenceNetBufferListChain+d3&lt;/P&gt;&lt;P&gt;MODULE_NAME: NETIO&lt;/P&gt;&lt;P&gt;IMAGE_NAME: NETIO.SYS&lt;/P&gt;&lt;P&gt;IMAGE_VERSION: 6.3.9600.19535&lt;/P&gt;&lt;P&gt;STACK_COMMAND: .cxr; .ecxr ; kb&lt;/P&gt;&lt;P&gt;BUCKET_ID_FUNC_OFFSET: d3&lt;/P&gt;&lt;P&gt;FAILURE_BUCKET_ID: AV_NETIO!NetioDereferenceNetBufferListChain&lt;/P&gt;&lt;P&gt;OS_VERSION: 8.1.9600.20237&lt;/P&gt;&lt;P&gt;BUILDLAB_STR: winblue_ltsb_escrow&lt;/P&gt;&lt;P&gt;OSPLATFORM_TYPE: x64&lt;/P&gt;&lt;P&gt;OSNAME: Windows 8.1&lt;/P&gt;&lt;P&gt;FAILURE_ID_HASH: {b14cf127-5933-4e45-71a8-f23e2243d43b}&lt;/P&gt;&lt;P&gt;Followup: MachineOwner&lt;BR /&gt;---------&lt;/P&gt;&lt;P&gt;3: kd&amp;gt; lmvm NETIO&lt;BR /&gt;Browse full module list&lt;BR /&gt;start end module name&lt;BR /&gt;fffff800`eea00000 fffff800`eea77000 NETIO (pdb symbols) C:\ProgramData\Dbg\sym\netio.pdb\D96A9FA2591E4510BA7B74EEE9A606D82\netio.pdb&lt;BR /&gt;Loaded symbol image file: NETIO.SYS&lt;BR /&gt;Mapped memory image file: C:\ProgramData\Dbg\sym\NETIO.SYS\5D9DE44D77000\NETIO.SYS&lt;BR /&gt;Image path: \SystemRoot\system32\DRIVERS\NETIO.SYS&lt;BR /&gt;Image name: NETIO.SYS&lt;BR /&gt;Browse all global symbols functions data&lt;BR /&gt;Timestamp: Wed Oct 9 16:44:45 2019 (5D9DE44D)&lt;BR /&gt;CheckSum: 0007D8A3&lt;BR /&gt;ImageSize: 00077000&lt;BR /&gt;File version: 6.3.9600.19535&lt;BR /&gt;Product version: 6.3.9600.19535&lt;BR /&gt;File flags: 0 (Mask 3F)&lt;BR /&gt;File OS: 40004 NT Win32&lt;BR /&gt;File type: 3.6 Driver&lt;BR /&gt;File date: 00000000.00000000&lt;BR /&gt;Translations: 0409.04b0&lt;BR /&gt;Information from resource tables:&lt;BR /&gt;CompanyName: Microsoft Corporation&lt;BR /&gt;ProductName: Microsoft® Windows® Operating System&lt;BR /&gt;InternalName: netio.sys&lt;BR /&gt;OriginalFilename: netio.sys&lt;BR /&gt;ProductVersion: 6.3.9600.19535&lt;BR /&gt;FileVersion: 6.3.9600.19535 (winblue_ltsb.191009-0600)&lt;BR /&gt;FileDescription: Network I/O Subsystem&lt;BR /&gt;LegalCopyright: © Microsoft Corporation. All rights reserved.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 30 May 2022 12:32:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Possible-reason-for-BSOD-Blue-screen-of-death/m-p/149716#M5698</guid>
      <dc:creator>andrey_s</dc:creator>
      <dc:date>2022-05-30T12:32:39Z</dc:date>
    </item>
    <item>
      <title>Re: Possible reason for BSOD (Blue screen of death)</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Possible-reason-for-BSOD-Blue-screen-of-death/m-p/173622#M6654</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;SPAN&gt;andrey_s, did you find what the issue is in your case? I am having exactly the same problem on four Windows 2019 servers datacenter version. I uninstalled the Checkpoint on one of them, so will see.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 05 Mar 2023 21:29:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Possible-reason-for-BSOD-Blue-screen-of-death/m-p/173622#M6654</guid>
      <dc:creator>martasfly</dc:creator>
      <dc:date>2023-03-05T21:29:50Z</dc:date>
    </item>
    <item>
      <title>Re: Possible reason for BSOD (Blue screen of death)</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Possible-reason-for-BSOD-Blue-screen-of-death/m-p/173940#M6672</link>
      <description>&lt;P&gt;Which version of the Endpoint client is used, and are you investigating the issue with help from TAC?&lt;/P&gt;
&lt;P&gt;Is it a VMware virtual machine with up to date drivers installed?&lt;/P&gt;</description>
      <pubDate>Tue, 07 Mar 2023 23:14:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Possible-reason-for-BSOD-Blue-screen-of-death/m-p/173940#M6672</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2023-03-07T23:14:26Z</dc:date>
    </item>
  </channel>
</rss>

