Quantcast
Channel: Symantec Connect - Articles
Browsing all 1863 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

How to find out where a package was downloaded from?

This article includes the evolution of a report, by merging two queries together.DISCLAIMER:  The machine names, IP Addresses and Domain names are ficticious lab values that no longer exist. The...

View Article


'How to run ITMS 7.5 on HTTPS' feature card

This article provides information about how to configure your IT Management Suite (ITMS) 7.5 environment to enable access using HTTPS (HTTP over SSL). The instructions in this document are valid for...

View Article


Forcing the AMAgent to send data faster by modifying an aspx file

The Application Metering UI only allows you to configure the AMAgent to send data either daily or weekly.If you are looking at Application Metering in a lab or demonstarting it in a POC, you may wish...

View Article

Image may be NSFW.
Clik here to view.

How to add the SMP site code as an ITA report filter?

If your ITA Server is configured to use its Multi-CMDB functionality, you may wish to have the ability to run ITA reports that can display data for a single or multiple SMP's instead of just all of...

View Article

Image may be NSFW.
Clik here to view.

Network Monitor Implementation

Network Monitor :Network Monitor accurately detects confidential information across configured network protocols and content types before it leaves the network. Real-time monitoring and reporting...

View Article


Image may be NSFW.
Clik here to view.

Configuring and running SharePoint server scans & How to set up Scans of...

Scans of SharePoint Servers : The Network Discover Server locates a wide range of exposed confidential data on SharePoint servers. It communicates with the Enforce Server to obtain information about...

View Article

Image may be NSFW.
Clik here to view.

セキュリティパッチ適用で入口対策を万全に!

止まらないサイバー攻撃による被害閲覧したWebサイトでの感染や、メールの添付ファイルを開いた際にマルウェアが仕込まれてしまう等、サイバー攻撃による被害が後を絶ちません。被害を受けた結果、大切なお客様情報が漏洩したり、企業イメージが低下する等、様々な経営リスクが発生している状況はご存知の通りです。...

View Article

Multicasting white paper

Ever wondered how multicasting works? This document is an in-depth guide to how multicasting is implemented in the SMP.ContentExecutive Summary...

View Article


Image may be NSFW.
Clik here to view.

How to add custom data to existing processes like Incident Management, Change...

Step1. Create an Integration Library with User Defined Type with DB Mapping (ORM).  Step2. Add Process Data Class to the IMExtendedDemoORM Step3. Add Properties as needed. For this example I have added...

View Article


How to Protect PXE Boot Menu for Redeployment (Managed) Computer in...

How to protect with password PXE boot menu for Redeployment (Managed) Computer in  Deployment 7.5.Create PXE Linux Preboot environment with name  “LinuxPXEWinPE”.Create  PXE Windows PE Preboot...

View Article

Image may be NSFW.
Clik here to view.

Imaging Windows Embedded standard and Windows 7 Embedded through Altiris 7.1

Why this Document?             Altiris 7.x are not supporting imaging for“Windows Embedded standard and Windows 7 Embedded”(http://www.symantec.com/business/support/index?page=content&id=HOWTO9965)...

View Article

Image may be NSFW.
Clik here to view.

Collect Agent Information from SCSP Management Console

On SCSP agent, there is a script named getagentinfo.bat under the installation folder. The end-user can use this script to collect the information that needed by support to troubleshoot SCSP agent...

View Article

Image may be NSFW.
Clik here to view.

Corporate Regulation and Email Retention

Corporate Regulation and Email Retention I was reading a document (http://www.umiacs.umd.edu/~oard/teaching/708x/spring09/t1.pdf) That can really assist in our infinite quest for knowledge about “How...

View Article


Email Journaling vs. Email Mailbox Collection

Email Journaling vs. Email Mailbox CollectionMany questions have appeared over the last few months regarding the differences between Mailbox collection and Journaling.. So What are the differences and...

View Article

Image may be NSFW.
Clik here to view.

Windows PE 4.0, PXE and Ghost

After performing the steps in this walk through you will have a working PXE and TFTP set up delivering a Win PE 4.0 package with the latest Ghost executables and 2 optional default Win PE 2.0 Ghost...

View Article


Windows Operating System Key Inventory

The following article will guide you through the steps of creating a Windows Operating System Key Inventory, Importing Operating System Key Data, Creating SQL Tables and  Creating Compliance Reports....

View Article

aila2: Version 1 Full Package with Installation and Execution Scripts

Introduction:The aila2 collection of tools comes with quite a few articles and downloads (see references [1-6]. But how can we benefit from this tool without having to read the full documentation? In...

View Article


Killing Conficker: How to Eradicate W32.Downadup for Good

IntroductionThis is the fifth of an informal series on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec Endpoint Protection (and the OS upon which it...

View Article

Image may be NSFW.
Clik here to view.

Displaying the Organizational View Structure via SQL

When you go to "Manage > Organizational Views and Groups" and select either a Org View or an Org Group, if one or more Org Groups contain resources, the Organizational Group column will display the...

View Article

Automated Software Management

I recently had these questions posed to me, and I thought I would share my ideas on the topic.Question 1:Can a deployment database be tied into Altiris which would enable software to be delivered or...

View Article
Browsing all 1863 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>