2017/03/10 14:37:42.319 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (12) Info AW.Meg.Queue.Service.DeviceStateChangedHandler.Office365DeviceStateChangedBatchHandler.DoProcessBatch Payload batch processing finished. MEMConfigId: 30, BatchContextId: e2466118-1c6b-4a04-9a33-42799e9c2ea0. 2017/03/10 14:38:31.131 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (19) Debug AW.Meg.Queue.Service.Util.EndpointQueueManager.Process A message is added to the queue for endpoint 'https://mail-mem13.ssdevrd.com/powershell-.-mem13\svcPSTest', for MemConfig Id: '30'. 2017/03/10 14:38:31.131 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (18) Debug AW.Meg.Queue.Service.Util.EndpointQueueManager._SplitByType Received 'DeviceStateChangePayload' message. MemConfig Id: '30', Device Id: '', StateChangeType: 'PolicyPublish' 2017/03/10 14:38:31.131 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (18) Info AW.Meg.Queue.Service.DeviceStateChangedHandler.DeviceStateChangedFactory._LoadSecureEmailSettings Mobile Email Settings for MemConfig: '30', Type: 'Exchange', Bypass Mode: 'False' 2017/03/10 14:38:31.131 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (18) Debug AW.Meg.Queue.Service.DeviceStateChangedHandler.DeviceStateChangedFactory.GetHandler Using Office365DeviceStateChangedHandler. MemConfig: '30' 2017/03/10 14:38:31.131 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (18) Debug AW.Meg.Queue.Service.Util.EndpointQueueManager._ReceiveDeviceStateChangePayload Updating device state. MemConfig Id '30', Device Id: '' 2017/03/10 14:38:31.131 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (18) Debug AW.Meg.Queue.Service.Processors.Office365DeviceStateChangedProcessor.DoProcess Processing 'PolicyPublish' event for LG '627', Device Id: '', MEM Config Id: '30' 2017/03/10 14:38:31.162 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (18) Debug AirWatch.Data.AsyncStateProvider.Put OnGet 60 2017/03/10 14:38:31.162 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (18) Debug AirWatch.Data.AsyncStateProvider.Put DoGetFromCache 60 2017/03/10 14:38:31.162 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (18) Debug AirWatch.Data.AsyncStateProvider.Put DoGet 60 2017/03/10 14:38:31.209 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (18) Debug AirWatch.Security.CodeSigning.ValidatePublisherEvidence Assembly Dapper, Version=1.50.2.0, Culture=neutral, PublicKeyToken=null has publisher subject CN=AirWatch Code Signing cd330b04-6e9d-420e-bc6b-6a1365a8fd6b 2017/03/10 14:38:31.209 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (18) Debug AirWatch.Security.CodeSigning.ValidatePublisherEvidence Assembly Dapper, Version=1.50.2.0, Culture=neutral, PublicKeyToken=null publisher is trusted 2017/03/10 14:38:31.443 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (18) Debug WanderingWiFi.AirWatch.BusinessImpl.EnterpriseConfigurationProvider.LoadExchangeServiceConfiguration Loading exchange settings. MEMConfig: 30 2017/03/10 14:38:31.443 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (18) Debug AirWatch.Security.Cryptography.DataEncryption ++Decrypt 2017/03/10 14:38:31.443 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (18) Debug AirWatch.Security.Cryptography.KeyManagement.MasterKeyHelper.GetMasterKey keyVersion is not defined or equals the default key version. 2017/03/10 14:38:31.443 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (18) Debug AirWatch.Security.Cryptography.DataEncryption Retrieved master key kv0 for decryption. 2017/03/10 14:38:31.443 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (18) Debug AirWatch.Security.Cryptography.DataEncryption Passphrase object retrieved. Key version: kv0, salt: s@1tValue 2017/03/10 14:38:31.443 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (18) Debug AirWatch.Security.Cryptography.AESEncryption.CryptoPrimitives Crypto awev2 is used. 2017/03/10 14:38:31.443 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (18) Debug AirWatch.Security.Cryptography.AESEncryption.Decryptor Key retrieved from cache with key: Key:awev2:kv0 2017/03/10 14:38:31.443 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (18) Debug AirWatch.Security.Cryptography.DataEncryption --Decrypt 2017/03/10 14:38:31.443 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (18) Debug WanderingWiFi.AirWatch.BusinessImpl.EnterpriseConfigurationProvider.LoadExchangeServiceConfiguration Getting service relay configuration. ACC location group overridden by MEM configuration: False. Location group:'627' 2017/03/10 14:38:31.458 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (18) Debug WanderingWiFi.AirWatch.BusinessImpl.EnterpriseConfigurationProvider.LoadExchangeServiceConfiguration Loaded exchange settings. MEMConfig: 30 2017/03/10 14:38:31.458 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (18) Debug WanderingWiFi.AirWatch.BusinessImpl.EnterpriseIntegrationHelper.TestExchangeConnection Load Exchange service configuration for location group 627 2017/03/10 14:38:31.490 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (18) Debug AirWatch.CloudConnector.Common.PowerShell.PowerShellSessionManager.Runspace Runspace is null. Initializing. 2017/03/10 14:38:31.490 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (18) Debug AirWatch.CloudConnector.Common.PowerShell.SessionHelper.InitializeRunspace Creating PowerShell runspace for Microsoft.Exchange @ PowerShell endpoint https://mail-mem13.ssdevrd.com/powershell using Authentication type: Basic, User: mem13\svcPSTest, using service credentials: False, ViewEntireForest enabled: False 2017/03/10 14:38:31.599 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (18) Debug AirWatch.CloudConnector.Common.PowerShell.SessionHelper.RegisterCustomFunctions Registering PowerShell functions for Microsoft.Exchange @ PowerShell endpoint https://mail-mem13.ssdevrd.com/powershell using Authentication type: Basic, User: mem13\svcPSTest, using service credentials: False, ViewEntireForest enabled: False 2017/03/10 14:38:31.614 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (18) Debug AirWatch.CloudConnector.Common.PowerShell.SessionHelper.RegisterCustomFunctions PowerShell functions added for Microsoft.Exchange @ PowerShell endpoint https://mail-mem13.ssdevrd.com/powershell using Authentication type: Basic, User: mem13\svcPSTest, using service credentials: False, ViewEntireForest enabled: False 2017/03/10 14:38:31.614 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (18) Debug AirWatch.CloudConnector.Common.PowerShell.SessionHelper.InitializeSession Initializing PowerShell session for Microsoft.Exchange @ PowerShell endpoint https://mail-mem13.ssdevrd.com/powershell using Authentication type: Basic, User: mem13\svcPSTest, using service credentials: False, ViewEntireForest enabled: False 2017/03/10 14:38:31.614 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (18) Debug AirWatch.CloudConnector.Common.PowerShell.SessionHelper.InitializeSession Creating session for Microsoft.Exchange @ PowerShell endpoint https://mail-mem13.ssdevrd.com/powershell using Authentication type: Basic, User: mem13\svcPSTest, using service credentials: False, ViewEntireForest enabled: False 2017/03/10 14:38:31.614 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (18) Debug AirWatch.CloudConnector.Common.PowerShell.SessionHelper.InitializeSession Authentication mechanism for the session: Basic. 2017/03/10 14:38:31.630 MEMCON 01af7c40-f800-0000-fd83-f61db992d201 [0000000-0000000] (12) Debug PowerShell.AW-Start-Session Authentication mechanism: Basic 2017/03/10 14:38:32.426 MEMCON 01af7c40-f800-0000-0084-f61db992d201 [0000000-0000000] (12) Debug PowerShell.AW-Start-Session Importing commands: Get-CASMailbox,Set-CASMailbox,Get-ActiveSyncDevice,Clear-ActiveSyncDevice,Get-ActiveSyncMailboxPolicy,Set-ActiveSyncMailboxPolicy,New-ActiveSyncMailboxPolicy,Remove-ActiveSyncMailboxPolicy,Get-OrganizationalUnit,Get-ActiveSyncOrganizationSettings,Remove-ActiveSyncDevice,Remove-MobileDevice,Get-MobileDevice,Get-Group 2017/03/10 14:38:32.488 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (7) Debug AW.Meg.Queue.Service.Monitors.DiagnosticModeMonitor.ProcessDiagnosticModeAutoShutOff SEG diagnostics mode auto shutoff check executing. 2017/03/10 14:38:33.736 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (18) Debug AirWatch.CloudConnector.Common.PowerShell.SessionHelper.InitializeSession Import of remote commands complete for Microsoft.Exchange @ PowerShell endpoint https://mail-mem13.ssdevrd.com/powershell using Authentication type: Basic, User: mem13\svcPSTest, using service credentials: False, ViewEntireForest enabled: False 2017/03/10 14:38:33.736 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (18) Debug AirWatch.CloudConnector.Common.PowerShell.SessionHelper.InitializeSession PowerShell session successfully initialized for Microsoft.Exchange @ PowerShell endpoint https://mail-mem13.ssdevrd.com/powershell using Authentication type: Basic, User: mem13\svcPSTest, using service credentials: False, ViewEntireForest enabled: False 2017/03/10 14:38:33.736 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (18) Debug AirWatch.CloudConnector.Common.PowerShell.SessionHelper.RemoveSession Removing session for Microsoft.Exchange @ PowerShell endpoint https://mail-mem13.ssdevrd.com/powershell using Authentication type: Basic, User: mem13\svcPSTest, using service credentials: False, ViewEntireForest enabled: False 2017/03/10 14:38:33.845 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (18) Debug AirWatch.CloudConnector.Common.PowerShell.SessionHelper.RemoveSession Session removed for Microsoft.Exchange @ PowerShell endpoint https://mail-mem13.ssdevrd.com/powershell using Authentication type: Basic, User: mem13\svcPSTest, using service credentials: False, ViewEntireForest enabled: False 2017/03/10 14:38:33.845 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (18) Debug AirWatch.CloudConnector.Common.PowerShell.PowerShellSessionManager.Dispose Disposing runspace for SessionManager instance; key 'SingleDeviceActionWithNormalPriority_mem13\svcPSTest@Microsoft.Exchange@https://mail-mem13.ssdevrd.com/powershell' 2017/03/10 14:38:33.845 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (18) Debug AirWatch.CloudConnector.Common.PowerShell.PowerShellSessionManager.Dispose Removing SessionManager from instance collection; key 'SingleDeviceActionWithNormalPriority_mem13\svcPSTest@Microsoft.Exchange@https://mail-mem13.ssdevrd.com/powershell' 2017/03/10 14:38:33.845 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (18) Debug AirWatch.CloudConnector.Common.PowerShell.PowerShellSessionManager.ReleaseInstanceLock Key 'SingleDeviceActionWithNormalPriority_mem13\svcPSTest@Microsoft.Exchange@https://mail-mem13.ssdevrd.com/powershell' Thread '18' exiting semaphore. 2017/03/10 14:38:33.845 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (18) Info AW.Meg.Queue.Service.Util.SyncAllMailboxesTask.PerformTask Run compliance task will initiate for MEMConfig '30'. 2017/03/10 14:38:33.861 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (18) Info AW.Meg.Queue.Service.Util.SyncAllMailboxesTask._MonitorMemConfig Polling for MEMConfig '30' begins. 2017/03/10 14:38:34.001 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (13) Debug AW.Meg.Queue.Service.Util.RunComplianceTask.ProcessUpdateDevicePolicies ++ProcessUpdateDevicePolicies 2017/03/10 14:38:34.001 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (13) Debug AW.Meg.Queue.Service.Util.RunComplianceTask.ProcessUpdateDevicePolicies Run Compliance for MEMConfig: 30, LocationGroup: 627 2017/03/10 14:38:34.142 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (13) Debug WanderingWiFi.AirWatch.ProviderImpl.MobileEmail.MobileEmailDataHandler.LoadMemDevicePolicyByMemConfigId ++LoadMemDevicePolicyByMemConfigId 2017/03/10 14:38:34.142 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (13) Debug WanderingWiFi.AirWatch.ProviderImpl.MobileEmail.MobileEmailDataHandler.LoadMemDevicePolicyByMemConfigId MemConfigId:30, OnlyManaged:False 2017/03/10 14:38:34.188 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (13) Debug WanderingWiFi.AirWatch.ProviderImpl.MobileEmail.MobileEmailDataHandler.LoadMemDevicePolicyByMemConfigId --LoadMemDevicePolicyByMemConfigId 2017/03/10 14:38:34.188 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (13) Debug AW.Meg.Queue.Service.Util.RunComplianceTask.ProcessUpdateDevicePolicies Total 1 policies retrieved from database for the process. 2017/03/10 14:38:34.204 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (13) Debug AW.Meg.Queue.Service.Util.RunComplianceTask.ProcessUpdateDevicePolicies Total 1 mailboxes were found with known devices. 2017/03/10 14:38:34.204 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (13) Debug WanderingWiFi.AirWatch.BusinessImpl.MobileEmail.MobileEmailBusiness.UpdateManagedMEMDevicePolicyViolations Loading Device Details. DeviceId:19 2017/03/10 14:38:34.204 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (13) Debug WanderingWiFi.AirWatch.ProviderImpl.DeviceDataHandler.GetSessionFromCache Attempting to build cache key with parameters 19 and Device_DeviceSession 2017/03/10 14:38:34.204 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (13) Debug WanderingWiFi.AirWatch.CustomCache.CustomCacheManager`1.BuildCacheKey The built cache key in this context is 19:Device_DeviceSession 2017/03/10 14:38:34.204 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (13) Debug WanderingWiFi.AirWatch.CustomCache.CustomCacheManager`1.Get Attempting to get the value for key 19:Device_DeviceSession from cache 2017/03/10 14:38:34.204 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (13) Debug WanderingWiFi.AirWatch.ProviderImpl.DeviceDataHandler.LoadCurrentDeviceSession Fetching current device session for device 19 from database. 2017/03/10 14:38:34.204 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (13) Debug WanderingWiFi.AirWatch.ProviderImpl.DeviceDataHandler.UpdateCacheWithSessionForDevice Attempting to build cache key with parameters 19 and Device_DeviceSession 2017/03/10 14:38:34.204 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (13) Warn WanderingWiFi.AirWatch.ProviderImpl.DeviceDataHandler.GetConfiguredCacheTimeForDeviceSession Unable to parse device session cache value from app settings. Setting to default. 2017/03/10 14:38:34.204 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (13) Debug WanderingWiFi.AirWatch.CustomCache.CustomCacheManager`1.BuildCacheKey The built cache key in this context is 19:Device_DeviceSession 2017/03/10 14:38:34.204 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (13) Debug WanderingWiFi.AirWatch.CustomCache.CustomCacheManager`1.SaveDataToCache Attempting to add key 19:Device_DeviceSession to cache 2017/03/10 14:38:34.220 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (13) Debug WanderingWiFi.AirWatch.BusinessImpl.MobileEmail.MobileEmailBusiness.UpdateManagedMEMDevicePolicyViolations Verifying Model Compliance for the MEMDevice. DeviceId:19 2017/03/10 14:38:34.220 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (13) Debug WanderingWiFi.AirWatch.BusinessImpl.MobileEmail.MobileEmailBusiness.UpdateManagedMEMDevicePolicyViolations Verifying OS Compliance for the MEMDevice. DeviceId:19 2017/03/10 14:38:34.220 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (13) Debug WanderingWiFi.AirWatch.BusinessImpl.MobileEmail.Util.PolicyManager.IsDeviceOsCompliant No matching rule found for OSpolicy for device type Apple 2017/03/10 14:38:34.220 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (13) Debug WanderingWiFi.AirWatch.BusinessImpl.MobileEmail.MobileEmailBusiness.UpdateManagedMEMDevicePolicyViolations Verifying General Managed Device Compliance for the MEMDevice. DeviceId:19 2017/03/10 14:38:34.220 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (13) Debug AW.Meg.Queue.Service.Util.RunComplianceTask.ProcessUpdateDevicePolicies Known Policy: EasDeviceIdentifier 0EANTNG9L56LL8FLD1SFVFNK64, MemDeviceId: 5614, Allowed: False, MailboxIdentity: , LastCommand: Mail Server Update, DeviceAccessStateReason: , LastMailAccessAllowed: True 2017/03/10 14:38:34.220 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (13) Debug AW.Meg.Queue.Service.Util.RunComplianceTask.ProcessUpdateDevicePolicies Evaluated device. DeviceId: '19', EasDeviceIdentifier: '0EANTNG9L56LL8FLD1SFVFNK64', Allowed: 'False', Reason(s): Account user mem2 is blocked 2017/03/10 14:38:34.220 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (13) Debug WanderingWiFi.AirWatch.BusinessImpl.EnterpriseIntegrationHelper.SetBulkEasDeviceAccess BulkDeviceRequest - MemConfigId: 30, IsRunCompliance: True. 2017/03/10 14:38:34.220 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (13) Debug WanderingWiFi.AirWatch.BusinessImpl.EnterpriseIntegrationHelper.DoSetBulkEasDeviceAccess Loading Exchange settings for MEMConfig: 30 2017/03/10 14:38:34.220 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (13) Debug WanderingWiFi.AirWatch.BusinessImpl.EnterpriseConfigurationProvider.LoadExchangeServiceConfiguration Loading exchange settings. MEMConfig: 30 2017/03/10 14:38:34.220 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (13) Debug AirWatch.Security.Cryptography.DataEncryption ++Decrypt 2017/03/10 14:38:34.220 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (13) Debug AirWatch.Security.Cryptography.KeyManagement.MasterKeyHelper.GetMasterKey keyVersion is not defined or equals the default key version. 2017/03/10 14:38:34.220 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (13) Debug AirWatch.Security.Cryptography.DataEncryption Retrieved master key kv0 for decryption. 2017/03/10 14:38:34.220 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (13) Debug AirWatch.Security.Cryptography.DataEncryption Passphrase object retrieved. Key version: kv0, salt: s@1tValue 2017/03/10 14:38:34.220 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (13) Debug AirWatch.Security.Cryptography.AESEncryption.CryptoPrimitives Crypto awev2 is used. 2017/03/10 14:38:34.220 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (13) Debug AirWatch.Security.Cryptography.AESEncryption.Decryptor Key retrieved from cache with key: Key:awev2:kv0 2017/03/10 14:38:34.220 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (13) Debug AirWatch.Security.Cryptography.DataEncryption --Decrypt 2017/03/10 14:38:34.220 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (13) Debug WanderingWiFi.AirWatch.BusinessImpl.EnterpriseConfigurationProvider.LoadExchangeServiceConfiguration Getting service relay configuration. ACC location group overridden by MEM configuration: False. Location group:'627' 2017/03/10 14:38:34.235 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (13) Debug WanderingWiFi.AirWatch.BusinessImpl.EnterpriseConfigurationProvider.LoadExchangeServiceConfiguration Loaded exchange settings. MEMConfig: 30 2017/03/10 14:38:34.251 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (13) Debug AirWatch.CloudConnector.Common.PowerShell.PowerShellSessionManager.GetInstaceByActionType Key 'BulkDeviceAction_mem13\svcPSTest@Microsoft.Exchange@https://mail-mem13.ssdevrd.com/powershell' Thread '13' waiting for semaphore. 2017/03/10 14:38:34.251 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (13) Debug AirWatch.CloudConnector.Common.PowerShell.PowerShellSessionManager.GetInstaceByActionType Key 'BulkDeviceAction_mem13\svcPSTest@Microsoft.Exchange@https://mail-mem13.ssdevrd.com/powershell' Thread '13' entered semaphore. 2017/03/10 14:38:34.251 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (13) Debug AirWatch.CloudConnector.Common.PowerShell.PowerShellSessionManager.GetInstaceByActionType Creating new SessionManager instance for key 'BulkDeviceAction_mem13\svcPSTest@Microsoft.Exchange@https://mail-mem13.ssdevrd.com/powershell' 2017/03/10 14:38:34.251 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (13) Debug AirWatch.CloudConnector.Common.PowerShell.CommandHelper.SetBulkDeviceAccessBatch Processing SetBulkDeviceAccessBatch for MailboxIdentity mem2@mem13.ssdevrd.com and 1 devices. 2017/03/10 14:38:34.251 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (13) Debug AirWatch.CloudConnector.Common.PowerShell.CommandHelper.SetActiveSyncDeviceIds Invoking command Set-CASMailbox -Identity 'mem2@mem13.ssdevrd.com' -ActiveSyncBlockedDeviceIDs @{Add='0EANTNG9L56LL8FLD1SFVFNK64'} against the endpoint: BulkDeviceAction_mem13\svcPSTest@Microsoft.Exchange@https://mail-mem13.ssdevrd.com/powershell 2017/03/10 14:38:34.251 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (13) Debug AirWatch.CloudConnector.Common.PowerShell.PowerShellSessionManager.Runspace Runspace is null. Initializing. 2017/03/10 14:38:34.251 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (13) Debug AirWatch.CloudConnector.Common.PowerShell.SessionHelper.InitializeRunspace Creating PowerShell runspace for Microsoft.Exchange @ PowerShell endpoint https://mail-mem13.ssdevrd.com/powershell using Authentication type: Basic, User: mem13\svcPSTest, using service credentials: False, ViewEntireForest enabled: False 2017/03/10 14:38:34.469 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (13) Debug AirWatch.CloudConnector.Common.PowerShell.SessionHelper.RegisterCustomFunctions Registering PowerShell functions for Microsoft.Exchange @ PowerShell endpoint https://mail-mem13.ssdevrd.com/powershell using Authentication type: Basic, User: mem13\svcPSTest, using service credentials: False, ViewEntireForest enabled: False 2017/03/10 14:38:34.485 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (13) Debug AirWatch.CloudConnector.Common.PowerShell.SessionHelper.RegisterCustomFunctions PowerShell functions added for Microsoft.Exchange @ PowerShell endpoint https://mail-mem13.ssdevrd.com/powershell using Authentication type: Basic, User: mem13\svcPSTest, using service credentials: False, ViewEntireForest enabled: False 2017/03/10 14:38:34.485 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (13) Debug AirWatch.CloudConnector.Common.PowerShell.SessionHelper.InitializeSession Initializing PowerShell session for Microsoft.Exchange @ PowerShell endpoint https://mail-mem13.ssdevrd.com/powershell using Authentication type: Basic, User: mem13\svcPSTest, using service credentials: False, ViewEntireForest enabled: False 2017/03/10 14:38:34.485 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (13) Debug AirWatch.CloudConnector.Common.PowerShell.SessionHelper.InitializeSession Creating session for Microsoft.Exchange @ PowerShell endpoint https://mail-mem13.ssdevrd.com/powershell using Authentication type: Basic, User: mem13\svcPSTest, using service credentials: False, ViewEntireForest enabled: False 2017/03/10 14:38:34.500 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (13) Debug AirWatch.CloudConnector.Common.PowerShell.SessionHelper.InitializeSession Authentication mechanism for the session: Basic. 2017/03/10 14:38:34.500 MEMCON 01af7c48-f800-0001-6f79-f61db992d201 [0000000-0000000] (36) Debug PowerShell.AW-Start-Session Authentication mechanism: Basic 2017/03/10 14:38:35.156 MEMCON 01af7c48-f800-0001-7279-f61db992d201 [0000000-0000000] (36) Debug PowerShell.AW-Start-Session Importing commands: Get-CASMailbox,Set-CASMailbox,Get-ActiveSyncDevice,Clear-ActiveSyncDevice,Get-ActiveSyncMailboxPolicy,Set-ActiveSyncMailboxPolicy,New-ActiveSyncMailboxPolicy,Remove-ActiveSyncMailboxPolicy,Get-OrganizationalUnit,Get-ActiveSyncOrganizationSettings,Remove-ActiveSyncDevice,Remove-MobileDevice,Get-MobileDevice,Get-Group 2017/03/10 14:38:36.887 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (13) Debug AirWatch.CloudConnector.Common.PowerShell.SessionHelper.InitializeSession Import of remote commands complete for Microsoft.Exchange @ PowerShell endpoint https://mail-mem13.ssdevrd.com/powershell using Authentication type: Basic, User: mem13\svcPSTest, using service credentials: False, ViewEntireForest enabled: False 2017/03/10 14:38:36.887 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (13) Debug AirWatch.CloudConnector.Common.PowerShell.SessionHelper.InitializeSession PowerShell session successfully initialized for Microsoft.Exchange @ PowerShell endpoint https://mail-mem13.ssdevrd.com/powershell using Authentication type: Basic, User: mem13\svcPSTest, using service credentials: False, ViewEntireForest enabled: False 2017/03/10 14:38:37.277 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (13) Debug AirWatch.CloudConnector.Common.PowerShell.SessionHelper.RemoveSession Removing session for Microsoft.Exchange @ PowerShell endpoint https://mail-mem13.ssdevrd.com/powershell using Authentication type: Basic, User: mem13\svcPSTest, using service credentials: False, ViewEntireForest enabled: False 2017/03/10 14:38:37.355 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (13) Debug AirWatch.CloudConnector.Common.PowerShell.SessionHelper.RemoveSession Session removed for Microsoft.Exchange @ PowerShell endpoint https://mail-mem13.ssdevrd.com/powershell using Authentication type: Basic, User: mem13\svcPSTest, using service credentials: False, ViewEntireForest enabled: False 2017/03/10 14:38:37.355 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (13) Debug AirWatch.CloudConnector.Common.PowerShell.PowerShellSessionManager.Dispose Disposing runspace for SessionManager instance; key 'BulkDeviceAction_mem13\svcPSTest@Microsoft.Exchange@https://mail-mem13.ssdevrd.com/powershell' 2017/03/10 14:38:37.355 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (13) Debug AirWatch.CloudConnector.Common.PowerShell.PowerShellSessionManager.Dispose Removing SessionManager from instance collection; key 'BulkDeviceAction_mem13\svcPSTest@Microsoft.Exchange@https://mail-mem13.ssdevrd.com/powershell' 2017/03/10 14:38:37.355 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (13) Debug AirWatch.CloudConnector.Common.PowerShell.PowerShellSessionManager.ReleaseInstanceLock Key 'BulkDeviceAction_mem13\svcPSTest@Microsoft.Exchange@https://mail-mem13.ssdevrd.com/powershell' Thread '13' exiting semaphore. 2017/03/10 14:38:37.355 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (13) Debug WanderingWiFi.AirWatch.BusinessImpl.MobileEmail.MobileEmailBusiness.UpdateMemDeviceActivitiesForPSRunCompliance ++UpdateMemDeviceActivitiesForPSRunCompliance 2017/03/10 14:38:37.355 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (13) Debug WanderingWiFi.AirWatch.BusinessImpl.MobileEmail.MobileEmailBusiness.UpdateMemDeviceActivitiesForPSRunCompliance Total 1 MEMDeviceActivity records will be updated. 2017/03/10 14:38:37.355 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (13) Debug WanderingWiFi.AirWatch.ProviderImpl.MobileEmail.MobileEmailDataHandler.SaveMemDeviceActivitiesForPSRunCompliance() ++SaveMemDeviceActivitiesForPSRunCompliance 2017/03/10 14:38:37.386 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (13) Debug WanderingWiFi.AirWatch.ProviderImpl.MobileEmail.MobileEmailDataHandler.SaveMemDeviceActivitiesForPSRunCompliance() MEM Device Activity Saved Successfully... 1 2017/03/10 14:38:37.386 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (13) Debug WanderingWiFi.AirWatch.ProviderImpl.MobileEmail.MobileEmailDataHandler.SaveMemDeviceActivitiesForPSRunCompliance() --SaveMemDeviceActivitiesForPSRunCompliance 2017/03/10 14:38:37.386 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (13) Debug WanderingWiFi.AirWatch.BusinessImpl.MobileEmail.MobileEmailBusiness.UpdateMemDeviceActivitiesForPSRunCompliance --UpdateMemDeviceActivitiesForPSRunCompliance 2017/03/10 14:38:37.386 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (13) Debug AW.Meg.Queue.Service.Util.RunComplianceTask.ProcessUpdateDevicePolicies --ProcessUpdateDevicePolicies 2017/03/10 14:38:37.386 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (18) Info AW.Meg.Queue.Service.Util.SyncAllMailboxesTask._MonitorMemConfig Polling for MEMConfig '30' ends. 2017/03/10 14:38:37.386 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (18) Info AW.Meg.Queue.Service.Util.SyncAllMailboxesTask.PerformTask Run compliance task finished for MEMConfig '30'. 2017/03/10 14:38:37.386 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (18) Debug AirWatch.Data.AsyncStateProvider.Remove OnRemove 60 2017/03/10 14:38:37.386 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (18) Debug AirWatch.Data.AsyncStateProvider.Remove DoRemove 60 2017/03/10 14:38:37.402 MEMCON 148be4fa-4054-4149-8472-0eb56c1e06c6 [0000000-0000000] (18) Debug AirWatch.Data.AsyncStateProvider.Remove DoRemoveFromCache 60 2017/03/10 14:39:03.017 MEMCON 23ead046-743e-461e-89cb-35ead9709462 [0000000-0000000] (16) Debug WanderingWiFi.AirWatch.SystemCodeService.SystemCodeConfigurationProvider.GetSetting Getting system code of type 'System.Int32'. Name='Diagnostics_Logging.MegQueueService' Run Compliance event received: MEG Queue receives Run Compliance event for processing from webconsole. Run Compliance operation is initiated. Debug AW.Meg.Queue.Service.Util.EndpointQueueManager.Process A message is added to the queue for endpoint 'https://mail-mem13.ssdevrd.com/powershell-.-mem13\svcPSTest', for MemConfig Id: '30'. Debug AW.Meg.Queue.Service.Util.EndpointQueueManager._SplitByType Received 'DeviceStateChangePayload' message. MemConfig Id: '30', Device Id: '', StateChangeType: 'PolicyPublish' Debug AW.Meg.Queue.Service.Processors.Office365DeviceStateChangedProcessor.DoProcess Processing 'PolicyPublish' event for LG '627', Device Id: '', MEM Config Id: '30' Powershell Admin details: MEG Queue loads Powershell admin account details. It also loads ACC details if any. Debug WanderingWiFi.AirWatch.BusinessImpl.EnterpriseConfigurationProvider.LoadExchangeServiceConfiguration Getting service relay configuration. ACC location group overridden by MEM configuration: False. Location group:'627' Debug WanderingWiFi.AirWatch.BusinessImpl.EnterpriseConfigurationProvider.LoadExchangeServiceConfiguration Loaded exchange settings. MEMConfig: 30 Debug WanderingWiFi.AirWatch.BusinessImpl.EnterpriseIntegrationHelper.TestExchangeConnection Load Exchange service configuration for location group 627 Policy Evaluation: MEG Que evaluates policy and determine all devices that needs access state change (allow or block). Below log shows example of device evaluated to be blocked by user policy. Debug AW.Meg.Queue.Service.Util.RunComplianceTask.ProcessUpdateDevicePolicies Total 1 policies retrieved from database for the process. Debug AW.Meg.Queue.Service.Util.RunComplianceTask.ProcessUpdateDevicePolicies Total 1 mailboxes were found with known devices. Debug AW.Meg.Queue.Service.Util.RunComplianceTask.ProcessUpdateDevicePolicies Known Policy: EasDeviceIdentifier 0EANTNG9L56LL8FLD1SFVFNK64, MemDeviceId: 5614, Allowed: False, MailboxIdentity: , LastCommand: Mail Server Update, DeviceAccessStateReason: , LastMailAccessAllowed: True Debug AW.Meg.Queue.Service.Util.RunComplianceTask.ProcessUpdateDevicePolicies Evaluated device. DeviceId: '19', EasDeviceIdentifier: '0EANTNG9L56LL8FLD1SFVFNK64', Allowed: 'False', Reason(s): Account user mem2 is blocked Powershell Session creation: MEG Queue creates powershell session to execute powershell command. Debug AirWatch.CloudConnector.Common.PowerShell.SessionHelper.InitializeSession Initializing PowerShell session for Microsoft.Exchange @ PowerShell endpoint https://mail-mem13.ssdevrd.com/powershell using Authentication type: Basic, User: mem13\svcPSTest, using service credentials: False, ViewEntireForest enabled: False Debug AirWatch.CloudConnector.Common.PowerShell.SessionHelper.InitializeSession PowerShell session successfully initialized for Microsoft.Exchange @ PowerShell endpoint https://mail-mem13.ssdevrd.com/powershell using Authentication type: Basic, User: mem13\svcPSTest, using service credentials: False, ViewEntireForest enabled: False Blacklisting device: MEQ Queue sends powershell block command to exchange so that email requests will be blocked. Debug AirWatch.CloudConnector.Common.PowerShell.CommandHelper.SetActiveSyncDeviceIds Invoking command Set-CASMailbox -Identity 'mem2@mem13.ssdevrd.com' -ActiveSyncBlockedDeviceIDs @{Add='0EANTNG9L56LL8FLD1SFVFNK64'} against the endpoint: BulkDeviceAction_mem13\svcPSTest@Microsoft.Exchange@https://mail-mem13.ssdevrd.com/powershell Powershell Session removal: MEG Queue removes powershell session from memory. Debug AirWatch.CloudConnector.Common.PowerShell.SessionHelper.RemoveSession Removing session for Microsoft.Exchange @ PowerShell endpoint https://mail-mem13.ssdevrd.com/powershell using Authentication type: Basic, User: mem13\svcPSTest, using service credentials: False, ViewEntireForest enabled: False Debug AirWatch.CloudConnector.Common.PowerShell.SessionHelper.RemoveSession Session removed for Microsoft.Exchange @ PowerShell endpoint https://mail-mem13.ssdevrd.com/powershell using Authentication type: Basic, User: mem13\svcPSTest, using service credentials: False, ViewEntireForest enabled: False Updating AirWatch Database: After successfully blocking device, AirWatch database is updated with current status. Debug WanderingWiFi.AirWatch.BusinessImpl.MobileEmail.MobileEmailBusiness.UpdateMemDeviceActivitiesForPSRunCompliance ++UpdateMemDeviceActivitiesForPSRunCompliance Debug WanderingWiFi.AirWatch.BusinessImpl.MobileEmail.MobileEmailBusiness.UpdateMemDeviceActivitiesForPSRunCompliance Total 1 MEMDeviceActivity records will be updated. Debug WanderingWiFi.AirWatch.ProviderImpl.MobileEmail.MobileEmailDataHandler.SaveMemDeviceActivitiesForPSRunCompliance() ++SaveMemDeviceActivitiesForPSRunCompliance Debug WanderingWiFi.AirWatch.ProviderImpl.MobileEmail.MobileEmailDataHandler.SaveMemDeviceActivitiesForPSRunCompliance() MEM Device Activity Saved Successfully... 1 Debug WanderingWiFi.AirWatch.ProviderImpl.MobileEmail.MobileEmailDataHandler.SaveMemDeviceActivitiesForPSRunCompliance() --SaveMemDeviceActivitiesForPSRunCompliance Debug WanderingWiFi.AirWatch.BusinessImpl.MobileEmail.MobileEmailBusiness.UpdateMemDeviceActivitiesForPSRunCompliance --UpdateMemDeviceActivitiesForPSRunCompliance Finished: Info AW.Meg.Queue.Service.Util.SyncAllMailboxesTask.PerformTask Run compliance task finished for MEMConfig '30'.