Video Screencast Help
New Company Name and Logo Announced. Learn More.

Search

Search results

Symantec UK, Reading, Berkshire Tue, 24 March, 2015 - 9:00 GMT - Fri, 27 March, 2015 - 16:30 GMT Please ...
Event by Richard_Combes | 30 Jan 2015 | 0 comments
This article contains some cases about problems in CEM environment, where you can find their root cause and possible solution for your case. Note!: All these description steps were done, using SMP 7.5 SP1 release build ! List ...
Article by Igor Perevozchikov | 29 Jan 2015 | 0 comments
What is basically required to have SMP 7.5.x CEM functionality working via HTTPs using self-signed or non self-signed certificates Probably this information will be useful to know, if you're going to setup CEM in your environment. ...
Article by Igor Perevozchikov | 29 Jan 2015 | 6 comments
Inventory Solution will gather font data from client machines running supported versions of the Mac OS X operating system.  Font Types Inventory Solution will search for the following font types:   True Type Fonts:  FFIL ttf ...
Article by dougj | 28 Jan 2015 | 0 comments
Today's download is one I use a lot. It's a script which converts a text file containing raw T-SQL to a format more readily consumed by programming code. I do a lot of task automation that embeds T-SQL, and this little script is  ...
Download by ianatkin | 26 Jan 2015 | 0 comments
There are several ways to gather inventory data for evaluation and troubleshooting purposes. Any or all of the following methods may be used. 1. Capture copies of NSE files  It is possible to capture copies of the NSE file(s) being sent to ...
Article by dougj | 19 Jan 2015 | 0 comments
The Client Task Agent Command Line Utility The actual binary can be found in the ‘/opt/altiris/notification/ctagent/bin’ directory. A link to aex-cta is found in the ‘/usr/bin’ directory, which is in most Unix, Linux and Macintosh path ...
Article by dougj | 19 Jan 2015 | 0 comments
As of the Agent for Unix, Linux and Mac (ULM) 7.1, it is possible to configure which resource keys to ignore during generation of NSE events. This allows for exclusion of any values that would cause a conflict in a given environment. (An NSE event is ...
Article by dougj | 16 Jan 2015 | 0 comments
In some circumstances, it may be necessary to assign a new resource guid value to a Unix, Linux or Mac (ULM) client. This is typical in the case of merged computer resources in the NS console and two or more clients are assigned the same guid.    ...
Article by dougj | 16 Jan 2015 | 0 comments
Inventory tasks and policies include rules based on a default set of file extensions. These extensions are pre-defined in the Symantec_cmdb. In order to create a rule for a file extension that is not currently available in an inventory rule, the ...
Article by dougj | 16 Jan 2015 | 0 comments