Video Screencast Help
Protect Your POS Environment Against Retail Data Breaches. Learn More.

Search

Search results

There is often a need to imply a local computer policy change on all your client computers in your network. If you are a domain administrator, you can easily use the group policy to make whatever changes you want. What if you are not a domain ...
Article by KESH MAN | 04 Jun 2014 | 0 comments
The Altiris Patch Management module in 6.x can no longer be used to deploy patches for Windows XP computers. Though Microsoft  stopped providing security updates for Windows XP computers  after April 8th 2014, there are some companies that still have an ...
Article by KESH MAN | 16 May 2014 | 0 comments
This article is intended to generate a report having fields from multiple tables in the database. When you use two or more tables at the same time for pulling data, there needs to be a unique id that should connect the tables. That is when we use inner ...
Article by KESH MAN | 14 May 2014 | 0 comments
Introduction Design SQL code Usage Conclusion Introduction Monitoring inventory updates (refresh rates) over time is an important task in large environments, and is beneficial in any environment.In this article we will ...
Article by Ludovic Ferre | 06 Mar 2014 | 2 comments
Introduction Design SQL code Usage Conclusion Introduction Monitoring agent upgrade progress over time is an important task in large environments, and is beneficial in any environment to understand the managed computer pool ...
Article by Ludovic Ferre | 06 Mar 2014 | 2 comments
Introduction Resource Update Summary hashes history Manifesto against datahash verification Creating a SQL Task to clean up the hashes Conclusion References Introduction Inventory quality is very important for a lot of ...
Article by Ludovic Ferre | 04 Mar 2014 | 2 comments
Introduction: The aila2 collection of tools comes with quite a few articles and downloads (see references [1-6]. But how can we benefit from this tool without having to read the full documentation? In short, how can we deploy the tool as simply as ...
Article by Ludovic Ferre | 06 Feb 2014 | 1 comment
How to assign security to a Role so that it can open the Resource Selector in order to either add or exclude resources to a collection?   01 Create a Role with these Global Privileges.   ...
Article by SK | 16 Jan 2014 | 0 comments
Creating filters that update themselves based off of Active Directory data without using an Active Directory Import   Settings > All Settings > Notification Server > Data Connector > Data Sources Create an LDAP import data ...
Article by SK | 16 Jan 2014 | 0 comments
The following process is a guide on how to migrate endpoints from previous versions of Altiris to Symantec Management Platform 7.5 utilizing a side by side infrastructure method.  (Version 6.x current and Version 7.5 future) Assumptions:  The ...
Article by JasonI | 12 Dec 2013 | 2 comments