Video Screencast Help

Search

Search results

Table of Contents Introduction New Features     New Operating System Support New Packages for Virtualization Upgrade Paths Drag and Drop Managed Delivery Policies Software Portal ...
Article by Joel Smith | 03 Jul 2014 | 0 comments
Introduction In previous versions of Inventory Solution Internet Explorer was well reported. By moving to the CIM (Common Information Model) Inventory lost some of the robust report of Internet Explorer. This article demonstrates how to setup ...
Article by Joel Smith | 26 Feb 2014 | 2 comments
About Symantec Software Resource Replicator The Symantec Software Resource Replicator utility is designed to migrate “logical” information for deliverable software resources from one Notification Server to another. Note that the utility does not ...
Download by Joel Smith | 06 Feb 2014 | 2 comments
Symantec Out-of-Band Discovery Utility v1.0 OOB Discovery Utility is a stand-alone package that helps you check the endpoints in their environment and detect client computers with support of OOB technologies. OOB Discovery Utility does the ...
Download by Joel Smith | 06 Feb 2014 | 3 comments
Issue: We have seen a variety of issues where data that is initially captured from an Inventory Policy is subsequently removed from the database. In most cases the first inventory capture works, but any subsequent ones send up blank data, stripping ...
Article by Joel Smith | 22 Aug 2012 | 12 comments
Recent news revealed source code theft from Symantec back in 2006. At the time this article was published, only one product still contained code that the source code revealed vulnerabilities: pcAnywhere. The current version of pcAnywhere is safe from ...
Article by Joel Smith | 03 Feb 2012 | 0 comments
The Software Management model stems from the Software Resource Model, or the SRM. The SRM is used by the Platform and many Solutions, tying together the sometimes disparate frameworks different Solutions use to manage or otherwise track Software. This ...
Article by Joel Smith | 01 Feb 2012 | 2 comments
Inventory Rules fulfill the roles of Detection or Applicability checks in relation to a Managed Software Delivery Policy. They represents a check on an agent computer system and can only return the values of true/false, or fail in the case of an ...
Article by Joel Smith | 13 Dec 2011 | 5 comments
This list of Reports is provided as a static list at the time this article was published. The details for this report came from an installation of Symantec ITMS Suite on version 7.1 SP1 (for all Platform and Solution versions). This is provided to help ...
Article by Joel Smith | 13 Sep 2011 | 4 comments