How to find out where a package was downloaded from?
This article includes the evolution of a report, by merging two queries together.DISCLAIMER: The machine names, IP Addresses and Domain names are ficticious lab values that no longer exist. The...
View Article'How to run ITMS 7.5 on HTTPS' feature card
This article provides information about how to configure your IT Management Suite (ITMS) 7.5 environment to enable access using HTTPS (HTTP over SSL). The instructions in this document are valid for...
View ArticleForcing the AMAgent to send data faster by modifying an aspx file
The Application Metering UI only allows you to configure the AMAgent to send data either daily or weekly.If you are looking at Application Metering in a lab or demonstarting it in a POC, you may wish...
View ArticleHow to add the SMP site code as an ITA report filter?
If your ITA Server is configured to use its Multi-CMDB functionality, you may wish to have the ability to run ITA reports that can display data for a single or multiple SMP's instead of just all of...
View ArticleNetwork Monitor Implementation
Network Monitor :Network Monitor accurately detects confidential information across configured network protocols and content types before it leaves the network. Real-time monitoring and reporting...
View ArticleConfiguring and running SharePoint server scans & How to set up Scans of...
Scans of SharePoint Servers : The Network Discover Server locates a wide range of exposed confidential data on SharePoint servers. It communicates with the Enforce Server to obtain information about...
View Articleセキュリティパッチ適用で入口対策を万全に!
止まらないサイバー攻撃による被害閲覧したWebサイトでの感染や、メールの添付ファイルを開いた際にマルウェアが仕込まれてしまう等、サイバー攻撃による被害が後を絶ちません。被害を受けた結果、大切なお客様情報が漏洩したり、企業イメージが低下する等、様々な経営リスクが発生している状況はご存知の通りです。...
View ArticleMulticasting white paper
Ever wondered how multicasting works? This document is an in-depth guide to how multicasting is implemented in the SMP.ContentExecutive Summary...
View ArticleHow to add custom data to existing processes like Incident Management, Change...
Step1. Create an Integration Library with User Defined Type with DB Mapping (ORM). Step2. Add Process Data Class to the IMExtendedDemoORM Step3. Add Properties as needed. For this example I have added...
View ArticleHow to Protect PXE Boot Menu for Redeployment (Managed) Computer in...
How to protect with password PXE boot menu for Redeployment (Managed) Computer in Deployment 7.5.Create PXE Linux Preboot environment with name “LinuxPXEWinPE”.Create PXE Windows PE Preboot...
View ArticleImaging Windows Embedded standard and Windows 7 Embedded through Altiris 7.1
Why this Document? Altiris 7.x are not supporting imaging for“Windows Embedded standard and Windows 7 Embedded”(http://www.symantec.com/business/support/index?page=content&id=HOWTO9965)...
View ArticleCollect Agent Information from SCSP Management Console
On SCSP agent, there is a script named getagentinfo.bat under the installation folder. The end-user can use this script to collect the information that needed by support to troubleshoot SCSP agent...
View ArticleCorporate Regulation and Email Retention
Corporate Regulation and Email Retention I was reading a document (http://www.umiacs.umd.edu/~oard/teaching/708x/spring09/t1.pdf) That can really assist in our infinite quest for knowledge about “How...
View ArticleEmail Journaling vs. Email Mailbox Collection
Email Journaling vs. Email Mailbox CollectionMany questions have appeared over the last few months regarding the differences between Mailbox collection and Journaling.. So What are the differences and...
View ArticleWindows PE 4.0, PXE and Ghost
After performing the steps in this walk through you will have a working PXE and TFTP set up delivering a Win PE 4.0 package with the latest Ghost executables and 2 optional default Win PE 2.0 Ghost...
View ArticleWindows Operating System Key Inventory
The following article will guide you through the steps of creating a Windows Operating System Key Inventory, Importing Operating System Key Data, Creating SQL Tables and Creating Compliance Reports....
View Articleaila2: Version 1 Full Package with Installation and Execution Scripts
Introduction:The aila2 collection of tools comes with quite a few articles and downloads (see references [1-6]. But how can we benefit from this tool without having to read the full documentation? In...
View ArticleKilling Conficker: How to Eradicate W32.Downadup for Good
IntroductionThis is the fifth of an informal series on how to keep your enterprise environment secure using often-overlooked capabilities of Symantec Endpoint Protection (and the OS upon which it...
View ArticleDisplaying the Organizational View Structure via SQL
When you go to "Manage > Organizational Views and Groups" and select either a Org View or an Org Group, if one or more Org Groups contain resources, the Organizational Group column will display the...
View ArticleAutomated Software Management
I recently had these questions posed to me, and I thought I would share my ideas on the topic.Question 1:Can a deployment database be tied into Altiris which would enable software to be delivered or...
View Article