How to send attachment in the Automation Policy e-mail?
In IT Management Suite 7.6, you can add an attachment to the Automation Policy e-mail. Note that no UI changes are introduced and it is just a way to define attachment in the existing UI.You can use...
View ArticleVBScript to Wrap a Windows Firewall Dump through Netsh
When documenting our server installations, one of the time-consuming documentation line-items is the Windows Firewall. For our service development flexibility and speed, our Windows firewall management...
View ArticleDeploy Internet Explorer 11 with Prerequisite Patches - SWD or Task
All, I have only recently been able to have the time and sit down to script this all out for my organization We have no issues (crossed fingers) with this script after deploying to over 20K endpoints...
View ArticleNew Features\Changes in DA in 11 SP1 release.
To Support IMAP and SMTP Feature, there were few changes made in Discovery accelerator and compliance accelerator for EV 11 SP1. There is no major changes in the functionality as such .Below is the...
View ArticleQuick sample: Using vbscript to post data to the SMP
I have used a very short vbscript for the last few month in order to get some data out of the SMP agent interfaces, or to ascert certain (misbehaving) features.Today it proved itself to be very handy...
View ArticleHow-To: Add PGP WDE Drivers to MDT & SCCM WinPE Boot Media
Symantec has a lot of great documentation for creating WinPE boot media with the PGP drivers baked in for one-off situations. Unfortunately those instructions don't speak to organizations with MDT...
View Article5 Must-Haves for an Enterprise Mobility Management (EMM) Solution
The Challenge: Enabling Mobility While Protecting the EnterpriseWith the rise of mobile devices in the workplace, businesses face a conundrum. Eager to reap the benefits of mobility, yet justifiably...
View ArticleMobile Apps in the Workplace: Balancing Freedom with Protection
Apps are everywhere today, in life and in work. In 2013, there were 100 billion app downloads. Finding and downloading apps is now the third most popular activity among mobile users, just behind...
View ArticleSecuring Mobile App Data - Comparing Containers and App Wrappers
The realities of BY OD create significant challenges when it comes to securing the corporate data residing on your users' mobile devices. Mobile users want to use the latest technology with easy access...
View ArticleEmbracing Android in the Enterprise
The challenges of being an enterprise pioneer in the “Wild West” The increasing significance of Android for the enterprise becomes more apparent every day. On the plus side, Android's open source...
View Articleoptimization rate for shadow copy component backup
For shadow copy component backup with accelerator enabled, Maybe you would find that no matter whether to change data on disk volume, the shadow copy components backup job will send all data to...
View ArticleNBU 7.6 Blueprint Security Feb 2015
The Technical Services team for Backup and Recovery have produced a number of documents we call "Blueprints".These Blueprints are designed to show backup and recovery challenges around specific...
View ArticleHow to restore files with specific extension using NetBackup commandline tools.
Often customer does face the situation where Backup Operator does need to restore specific set of files and B&R GUI is not a sollution.Nowadays such situations does increase in volume due to...
View ArticleHow to make an I217 network adapter work with GSS 2.51 WinPE.
Making Ghost WinPE / Vista 32-bit to work with Intel i217-lm chipset. By Terry WaskowichFirst: This is not a Symantec supported solution. Do Not call Symantec for support with this solution....
View ArticleThe Old and New; The Difficulties of Keeping Up To Date
IT investment into software and hardware inevitably fluctuates over time. This has been the case in recent years, with many organisations having to choose carefully what to invest money in, and what to...
View ArticleSymantec Storage Foundation - Replicator Option - Aplicabilidades
Cada vez mais as empresas tem se preocupado em proteger seus dados em um outro ambiente fora do seu proprio Datacenter, seja com um backup remoto ou até mesmo um complexo ambiente de DR capaz de...
View ArticleUsing ADPlus Utility to Collect the Crash Dumps for ITMS (Altiris)
Whenever there are issues where Symantec Management Agent crashes, a user can follow the steps below to collect the crash dumps and further send it to Symantec Support for further analysis.ADPlus.vbs...
View ArticleITMS 7.6 | Agentless WMI Performance Metrics Pack
Description about custom agentless policyThis custom "Agentless Monitor pack" contains agentless "WMI" metrics which are monitoring agentless computers performance and Altiris Services performance as...
View ArticleCompliance Sampling and Support for SMTP/Social content in Compliance...
The article below describes the changes made in Compliance accelerator in version 11 SP1 to support new content types SMTP, IMAP and Social.To support sampling for the new content type the compliance...
View ArticleEnterprise Vault SAN Storage to Hitachi HCP
(This is deliberately very high level, every configuration is different, but summarises the process.)DigestWe recently completed a move from SAN to Hitachi HCP HTTP/REST storage using the streamer...
View Article