Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.

Search

Search results

This is Part 7 of a 7 part article series detailing the data classes for Inventory, including Inventory Pack for Servers 7.5, providing administrators the knowledge they need to report on the newly expanded data set provided by this Solution. This Pack ...
Article by Joel Smith | 21 Oct 2014 | 0 comments
This is Part 6 of a 7 part article series detailing the data classes for Inventory, including Inventory Pack for Servers 7.5, providing administrators the knowledge they need to report on the newly expanded data set provided by this Solution. This Pack ...
Article by Joel Smith | 21 Oct 2014 | 0 comments
Part 5 covers Network Device data. Whether you need to create a custom report, or a custom computer filter based on Inventory Data in Inventory Solution 7.5, knowing the database schema is important.  In Inventory Solution 7.5 the data structure for ...
Article by Joel Smith | 21 Oct 2014 | 0 comments
In Part 4 the Software and User Inventory data classes are covered.  Whether you need to create a custom report, or a custom computer filter based on Inventory Data in Inventory Solution 7.5, knowing the database schema is im portant.  In Inventory ...
Article by Joel Smith | 21 Oct 2014 | 0 comments
In Part 3 the Operating System Data Classes are covered.  Whether you need to create a custom report, or a custom computer filter based on Inventory Data in Inventory Solution 7.5, knowing the database schema is important.  In Inventory Solution 7.5 ...
Article by Joel Smith | 21 Oct 2014 | 0 comments
In Part 2 the Hardware data classes are covered.  Whether you need to create a custom report, or a custom computer filte r based on Inventory Data in Inventory Solution 7.5, knowing the database schema is important.  In Inventory Solution 7.5 the data ...
Article by Joel Smith | 21 Oct 2014 | 0 comments
Understanding the schema for Basic Inventory in 7.5 is very useful when creating reports. Since Basic Inventory contains generally valuable information, it is essential for creating custom reports that includes other solution data. The goal of this ...
Article by Joel Smith | 21 Oct 2014 | 0 comments
Symantec has created the following process to identify Unix, Linux and Mac (ULM) computers that are vulnerable to the Bash Shellshock bug. Description The process uses a custom inventory script that can be ran on ULM clients. A zipped file is ...
Article by dougj | 03 Oct 2014 | 1 comment
Attached is a report that will provide a list of all of the software updates that are downloaded and staged by the Patch Managment Solution, but are disabled without being superseded.  To import this report right click on the folder you want to ...
Article by eglismann | 26 Aug 2014 | 1 comment
Attached is an excel sheet with the mappings for the following Tables>Columns>Solution Views>Tables>Columns>Solution Stored Procedures>Tables>Solution Functions>Tables>Solution All of these were created on ...
Article by eglismann | 26 Aug 2014 | 2 comments