IT Analytics for Symantec Endpoint Management 6.0 Release Notes
|Article:DOC1583|||||Created: 2008-04-03|||||Updated: 2008-04-16|||||Article URL http://www.symantec.com/docs/DOC1583|
What do I need to know about Altiris™ IT Analytics 6.1 for Symantec Endpoint Protection Pack?
Altiris IT Analytics 6.1 for Symantec Endpoint Protection Pack
Product Version: 6.1
Altiris™ IT Analytics 6.1 for Symantec Endpoint Protection Pack is an add-on solution that leverages the advanced multi-dimensional analysis and graphical reporting capabilities of Altiris IT Analytics. It provides you with actionable information that improves your ability to effectively manage and secure your Symantec Endpoint Protection client computers.
By taking advantage of the capabilities provided by Symantec Endpoint Protection, you can use new methods of storing, aggregating, and accessing the operational data from your Symantec Endpoint Protection system and the Altiris CMDB. You can also use OLAP Cubes to explore the data, without needing advanced database knowledge or third-party reporting tools. You can ask and answer your own data questions quickly, easily, and effectively.
The following are features of this release:
Ad hoc data mining
A convenient way to navigate and explore your Symantec Endpoint Protection data through interactive, drag-and-drop capabilities.
A proactive method for identifying trends and historical views for problem identification and forecasting.
Dashboards and powerful reporting
A holistic view of your IT operations and key performance indicators that help you pinpoint issues and make sound strategic decisions.
Expanded management and security insight
A single report that lets you correlate security and asset information.
The following are unresolved issues in this release:
- You can add or remove Symantec Endpoint Protection manager computers in the Symantec Endpoint Protection Integration Component configuration. However, after you install the IT Analytics Symantec Endpoint Protection cubes, you must uninstall all Symantec Endpoint Protection cubes from the Installed tab of the Cube Setup page. Then, install them again to re-create the underlying data source views. Only then are the changes reflected in the cubes because source mappings are made at the time that the cubes are installed.
Article URL http://www.symantec.com/docs/DOC1583