Video Screencast Help
Give us your opinion and win with Symantec! Please help us by taking this survey to tell us about your experience with Symantec Connect, so that we can continue to grow and improve.  Take the survey.

Search

Search results

Description about custom agentless policy This custom "Agentless Monitor pack" contains agentless "WMI" metrics which are monitoring agentless computers performance and Altiris Services performance as well. You can ...
Article by Igor Perevozchikov | 09 Apr 2015 | 0 comments
Selecting image in the Deploy Image and Restore BackUp Image tasks is not working well when you have a large amount of images to select from. The dropdownbox is not very useful when you must select amongst many images so the best option is to use ...
Idea by epkpej | 07 Apr 2015 | 1 comment
I have almost always had an issue with this as a server administrator.  Space is relatively cheap, but until I can travel to all of my remote sites and upgrade the storage or replace the sarvers that are my package servers, throwing more space at the ...
Idea by burndtjammer | 20 Feb 2015 | 0 comments
This article contains some cases about problems in CEM environment, where you can find their root cause and possible solution for your case. Note!: All these description steps were done, using SMP 7.5 SP1 release build ! ...
Article by Igor Perevozchikov | 29 Jan 2015 | 0 comments
What is basically required to have SMP 7.5.x CEM functionality working via HTTPs using self-signed or non self-signed certificates Probably this information will be useful to know, if you're going to setup CEM in your environment. ...
Article by Igor Perevozchikov | 29 Jan 2015 | 7 comments
The Client Task Agent Command Line Utility The actual binary can be found in the ‘/opt/altiris/notification/ctagent/bin’ directory. A link to aex-cta is found in the ‘/usr/bin’ directory, which is in most Unix, Linux and Macintosh path ...
Article by dougj | 19 Jan 2015 | 0 comments
As of the Agent for Unix, Linux and Mac (ULM) 7.1, it is possible to configure which resource keys to ignore during generation of NSE events. This allows for exclusion of any values that would cause a conflict in a given environment. (An NSE event is ...
Article by dougj | 16 Jan 2015 | 0 comments
In some circumstances, it may be necessary to assign a new resource guid value to a Unix, Linux or Mac (ULM) client. This is typical in the case of merged computer resources in the NS console and two or more clients are assigned the same guid.    ...
Article by dougj | 16 Jan 2015 | 0 comments
Inventory tasks and policies include rules based on a default set of file extensions. These extensions are pre-defined in the Symantec_cmdb. In order to create a rule for a file extension that is not currently available in an inventory rule, the ...
Article by dougj | 16 Jan 2015 | 0 comments
SSE is a collection of reports commonly used by Backline support and Sustained Engineering. They are very useful for monitoring, administering and troubleshooting. An example can be seen at link below: (ITMS 7.5 - Checking Agent Plug-ins versions via ...
Article by Mauro Dalvit | 13 Jan 2015 | 0 comments