Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.

Search

Search results

I need a solution Hello Everyone! I need help , the inventory in an mac mini fail, when the task is running : In the client task history Execution result: -2111635340 task ...
Forum Discussion by CRAC2313 | 10 Nov 2014 | 3 comments
Symantec has created the following process to identify Unix, Linux and Mac (ULM) computers that are vulnerable to the Bash Shellshock bug. Description The process uses a custom inventory script that can be ran on ULM clients. A zipped file is ...
Article by dougj | 03 Oct 2014 | 1 comment
Following is a list of each component  of the Unix, Linux and Macintosh (ULM) Agent and Solutions and required information to manually install each component.  This document applies to SMP 7.5 SP1. For SMP versions prior to 7.5 SP1, see knowledge ...
Article by dougj | 15 Aug 2014 | 0 comments
To collect all available data from ULM machine for Inventory troubleshooting please do the following: 1. Collect information about agent and plug-ins: Run:aex-helper list all -f > /tmp/agent.info 2. Gather output for all inventory ...
Article by dougj | 15 Aug 2014 | 3 comments
The following commands are used by the Unix, Linux and Mac Software Mangement Framework to gather native software information: Platform Collector Info source Platform specific DataClass ...
Article by dougj | 14 Aug 2014 | 0 comments
KeyName Key Value Description Resource Types Component/Solution Key Owner Versions Related KBs Ad_ipaddress   Printer Network Discovery 6   ...
Article by dougj | 14 Aug 2014 | 0 comments
I do not need a solution (just sharing information) This thread is to see what thoughts are from customers side within ITMS Share your thoughts here about required area of ITMS ...
Forum Discussion by Igor Perevozchikov | 01 Aug 2014 | 19 comments
How to check Symantec Management Agent logs of client computer (and other things to do), within SMP Console using Real Time System Management solution Case: Very often we need to perform analyze of logs on client computer to ...
Article by Igor Perevozchikov | 01 Aug 2014 | 0 comments
Merging is based on resource key names and values. Unix, Linux and Mac (ULM) systems that have even a single matching resource key name and value combination will merge. Typical causes are: Common mac addresses from virtualization software or ...
Article by dougj | 02 May 2014 | 0 comments
A community member wanted to be able to identify machines that are not running the latest version of the SMA so that they could then email the user to inform them that they needed to connect to the network in order to bring their machine into compliance ...
Article by SK | 11 Mar 2014 | 2 comments