Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.

Search

Search results

This is Part 7 of a 7 part article series detailing the data classes for Inventory, including Inventory Pack for Servers 7.5, providing administrators the knowledge they need to report on the newly expanded data set provided by this Solution. This Pack ...
Article by Joel Smith | 21 Oct 2014 | 0 comments
This is Part 6 of a 7 part article series detailing the data classes for Inventory, including Inventory Pack for Servers 7.5, providing administrators the knowledge they need to report on the newly expanded data set provided by this Solution. This Pack ...
Article by Joel Smith | 21 Oct 2014 | 0 comments
Part 5 covers Network Device data. Whether you need to create a custom report, or a custom computer filter based on Inventory Data in Inventory Solution 7.5, knowing the database schema is important.  In Inventory Solution 7.5 the data structure for ...
Article by Joel Smith | 21 Oct 2014 | 0 comments
In Part 4 the Software and User Inventory data classes are covered.  Whether you need to create a custom report, or a custom computer filter based on Inventory Data in Inventory Solution 7.5, knowing the database schema is im portant.  In Inventory ...
Article by Joel Smith | 21 Oct 2014 | 0 comments
In Part 3 the Operating System Data Classes are covered.  Whether you need to create a custom report, or a custom computer filter based on Inventory Data in Inventory Solution 7.5, knowing the database schema is important.  In Inventory Solution 7.5 ...
Article by Joel Smith | 21 Oct 2014 | 0 comments
In Part 2 the Hardware data classes are covered.  Whether you need to create a custom report, or a custom computer filte r based on Inventory Data in Inventory Solution 7.5, knowing the database schema is important.  In Inventory Solution 7.5 the data ...
Article by Joel Smith | 21 Oct 2014 | 0 comments
Understanding the schema for Basic Inventory in 7.5 is very useful when creating reports. Since Basic Inventory contains generally valuable information, it is essential for creating custom reports that includes other solution data. The goal of this ...
Article by Joel Smith | 21 Oct 2014 | 0 comments
Symantec has created the following process to identify Unix, Linux and Mac (ULM) computers that are vulnerable to the Bash Shellshock bug. Description The process uses a custom inventory script that can be ran on ULM clients. A zipped file is ...
Article by dougj | 03 Oct 2014 | 1 comment
 In some cases, the Activity Center in the NS/SMP console does not show an "Identification" section for computer resources.    The reason for this is that the Identification section is currently dependent on the presence of hardware ...
Article by dougj | 02 Oct 2014 | 0 comments
MIB Imports       Troubleshooting Tips SNMP Data Mapping Tables       Troubleshooting Tips Agentless Inventory Task       Troubleshooting Tips Troubleshooting       SNMPutilg.exe ...
Article by Joel Smith | 30 Sep 2014 | 1 comment