ServiceDesk - API - Incident
IndexConfiguringExtendingEndpoints AuthorizationChangeRequestIncidentDemoServiceDesk Version:8.5IncidentAllows the creation, modification and resolution of Incidents in ServiceDesk. The Incident...
View ArticleServiceDesk - API - Demo
IndexConfiguringExtendingEndpoints AuthorizationChangeRequestIncidentDemoServiceDesk Version:8.5Download Postman or an API client of your choiceStart by creating a new Postman CollectionServiceDesk...
View ArticleInstalling SMP 8.1 RU4
IntroductionThis article covers the steps required to install SMP 8.1 RU4 after installing SIM on a Windows Server 2012 R2 Standard Edition system running SQL Server 2016 Standard Edition that was...
View ArticleInstalling CMS 8.1 RU4
IntroductionThis article covers the steps required to install CMS 8.1 RU4 on a Windows Server 2012 R2 that already has SMP 8.1 RU4 installed (That installation was covered in a previous article). It...
View ArticleHelp us spread the word about DLP and get a $25 Amazon gift card!
It’s simple: Click here and log into G2 Crowd using your LinkedIn Account. You must contribute a detailed, balanced and complete review! After your review is verified, G2 Crowd will send the first 40...
View ArticleSymantec Gold Summer Challenge: "Guess the Landmark" Locations
Hi Symantec Gold Advocates -You asked and here it is! Some of you had asked about the locations of the "Guess the Landmark" challenge series, so here they are.Hope you...
View ArticleNetwork Discovery and Inventory for Network Devices Tips and Tricks Article 5
Device ClassificationsSpecifying device classifications allows you to set not only the device type, make and model, but also the resource type The Symantec Management Platform will use to classify the...
View ArticleNetwork Discovery and Inventory for Network Devices Tips and Tricks Article 6
For this article, I'll cover technical details of how Discovery works. Read through the following sections for insight on the process.Advanced SettingsThis section will be remarkably short. In two...
View ArticleNetwork Discovery and Inventory for Network Devices Tips and Tricks Article 7
Network Discovery TaskAfter all the preliminary work is done (covered in the previous 6 articles), it is simple to run a Network Discovery. If an initial Discovery was run, you can kick off the same...
View ArticleNetwork Discovery and Inventory for Network Devices Tips and Tricks Article 8
Network Discovery to Agentless InventoryNow that the discovery is done, Agentless Inventory can now be used against SNMP discovered devices. The following items should be considered when moving to an...
View ArticleNetwork Discovery and Inventory for Network Devices Tips and Tricks Article 9
SNMP Data Mapping TablesThe heart of Agentless Inventory (sometimes known as Inventory for Network Devices) is custom values available via SNMP. By setting up new tables and columns, these values can...
View ArticleNetwork Discovery and Inventory for Network Devices Tips and Tricks Article 10
Troubleshooting TipsFrom the data Mapping section in the previous article (9).Have you selected the device mapping for the device being inventoried? You can review this in the Discovered Devices report...
View ArticleIT Management Suite 8.5 and Ghost Solution Suite 3.3 - Launch Webcast
The recording of the Launch webcast for IT Management Suite 8.5 and Ghost Solution Suite 3.3 broadcast live from our Technical Workshop in Chicago is now available!Watch the...
View ArticleOctober 2018 Endpoint Management Technical Workshop - Slides and Videos
Last week, we officially launched IT Management Suite 8.5 and Ghost Solution Suite 3.3 at our Technical Workshop in Chicago! We kicked off the workshop with a Live Video Webcast followed by 2 days of...
View ArticleStaying on the software update curve
New software versions and revisions are released periodically, bringing support for new applications, features and functionality, and Operating Systems. This can become an issue to keep up with,...
View ArticleSymantec IT Management Suite 8.5 Deep Dive
Deep dive of the new features in IT Management Suite 8.5 as covered at our Technical Workshop in Chicago such as:Time Critical Management – Data is collected on demand and in real time for immediate...
View ArticleReal-time Endpoint Management using Symantec IT Management Suite
This session from our Technical Workshop in Chicago focused on the new real-time management capabilities in Symantec IT Management Suite 8.5.To learn more about this:Download the slides attached to...
View ArticleSEE - Uninstalling the SEE for BitLocker Client in the Event of Client Failure.
This article is focused on demonstrated how you can manually uninstall the SEE for BitLocker client from an endpoint in the event that the client has failed in some manner. Whether this is generic...
View ArticleSMP - Patch Management - Disable Bulletins
SMPPatch ManagementDisable BulletinsPatch Management has it's own Web Service.http://localhost/altiris/patchmanagementcore/PatchWorkflowSvc.asmxSMP8.5.3073✔8.1.5844✘7.5.#✘Looks like 8.5 got a new...
View ArticleQuarantine Non-Compliant Endpoints using ITMS and SEP
One of the innovative new features in Symantec IT Management Suite 8.5 allows you to block endpoints from the network that have failed a compliance scan through direct integration with SEP to help...
View Article