SWS/SWV Shortcuts pinned to the taskbar turn white after deactivating layers
PurposeThis article will deal with issues with pinning shortcuts to the taskbar that are virtualized with SWV/SWSIssue:When pinning applications like chrome to the taskbar and you disable the layer and...
View ArticleWorkflow - SendCompleteWorkflowMessage - Event Listeners
In this Article I will explain how to use the 'SendCompleteWorkflowMessage' to hook into a Dialog Workflow via the Event Listeners.I'm assuming that you already have a Workflow written that is creating...
View ArticleUsing the REST Generator (POST) in Workflow 7.6 with Mobility Suite
In this Article I will explain how to use POST requests in the REST Generator within Workflow and Mobility Suite.This will assume knowledge of Workflow and REST APIs and it would be helpful to read...
View ArticleHow to renew iOS certificates and profiles
Is it time to renew your Apple/iOS certificates? If so checkout the attached document which highlights step-by-step instructions for how to renew your expiring/expired certificates.How to renew iOS...
View ArticleITMS 7.6 Upgrade Lessons Learned
While upgrading several environments these are some of the lessons learned.Disable any Agent Upgrade policies you have created Ensure your servers are fully patchedClear the IE cache @echo offECHO...
View ArticleUsing aex-helper to uninstall the SMP Agent for Unix, Linux and Mac
The aex-helper utility has an option to uninstall the SMP Agent for Unix, Linux and Mac (ULM). Examples of using this command follow. aex-helper uninstall all -s - shows solutions that are available...
View ArticleHow to decrypt the drive from Windows PE (Symantec Encryption Desktop 10.x)
In order to be able to boot affected machine using the Recovery CD, you need to create first custom Windows PE iso, which can be then burned on CD. Here is the document which describes in details the...
View ArticleStaffing Altiris Infrastructure
I have not seen any discussions about staffing Altiris Infrastructure, so let me bring my view for others.Managing Desktop Users is one of the most challenging activities in IT world.Improper (usually...
View ArticleGhost Solution Suite 3.0 Licensing FAQ
Hello Everyone! Great to meet everyone at the user group meeting on Friday. Here is the lienisng FAQ mentioned during the meeting. It talks about the transitions from DS9.9 and GSS 2.x to GSS 3.0...
View ArticleSymantec Management Agent 7.6 - Large Package Size
When testing upgrade from SMP 7.5 to 7.6 I have realized, that SMA 7.6 package is larger than usually,It used to be around 15 MB and now it is over 45 MB.I have verified content of that package, which...
View ArticleManual installation of an in-house certificate on Android and iOS
The attached document is divided into two main parts; the first is directed towards how to obtain and publish the certificate, making it available for the device. The second will add an in-house...
View ArticleSymantec secure proxy connectivity test and logs script
The attached script may be used on a fully installed and configured Symantec Secure App/Email Proxy to test inbound and outbound connectivity based on the bind and listen directives set during the...
View ArticleWorkflow - Repository
In this Article I'm going to show you how to use the Repository in Workflow.The Repository is a great place to store your workflows, keep a backup and see the changes throughout the process.When you...
View ArticlePatch Compliance - Understanding Dashboard
Most Managers like Dashboards, since they can understand high level summary pretty quickly.I have investigated on Patch Management Compliance Dashboard, since I did not trust numbers I could see. I am...
View ArticleCreating a Pilot Computers Filter: dymanic, automatic & maintenance free
Rolling out software is a tricky business. Any change, whether a major software release or a security patch, runs the risk of impacting user productivity. In order to manage this risk, IT...
View ArticleUpdating a Mobility site name and FQDN
Important: Ensure that the primary Mobility front-end(s) and databases have been fully backed up before proceeding further. Any changes made to the Mobility installation name and residing domain will...
View ArticleUpgrading Mobility Front-end and secure proxy from 5.X to 5.4.1
The attached article highlights step-by-step isntructions on how to upgrade a standard Mobility 5.3.1 environment to 5.4.1.Upgrading Mobility front-end from 5_x to 5_4_1.pdf
View ArticleCreating a cold site for use with Symantec Mobility
The attached article includes guidelines for creating a cold site for use with symantec Mobility.Creating a cold site for use with Symantec Mobility.pdf
View ArticleUsing the REST Generator (Response Content) in Workflow 7.6
In this Article I will explain how to use the REST Generator (Response Content) within Workflow 7.6.Other articlesUsing the REST Generator in Workflow 7.6Using the REST Generator (GET) in Workflow 7.6...
View ArticlePatch Management Settings and Reports
I have collected several useful reports, which are not available out-of-box, but could help you to maintain Patch Configuration in your environment.Reports are from several contributors and KB articles...
View Article