Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.

Search

Search results

Summary This document details the Asset Types and Statuses that we have come to track within our Symantec Management Platform for ITAM managed equipment.  Feel free to use this as a basic template, take what you want, and adjust, review, and ...
Article by ziggy | 18 Nov 2014 | 0 comments
What is required to create such environment, where you will be able to receive mail notifications about Agent service crash from any of available managed endpoints via mail? This scenario is applicable for SMP 7.1.x and SMP 7.5.x 1. ...
Article by Igor Perevozchikov | 14 Nov 2014 | 0 comments
This article is in regards to the SMP Agent for Mac 7.x and Mac OS X 10 (Yosemite).  Symantec will release an early support statement for running the agent on Yosemite on or about November 4th. A full support statement is tentatively scheduled for ...
Article by dougj | 06 Nov 2014 | 3 comments
Table of Content Introduction Cleaning up the constants class Overview of the constants class Going deep: looking at the mime type handling code Mime type JSON output sample Adding new mime types support ...
Article by Ludovic Ferre | 03 Nov 2014 | 0 comments
Data Center Architecture In data centers like Cisco's UCS (Unified Computing System), every server be it blade or rack-mount, is provisioned through a Service Profile. Just the way a SIM card holds an identity of a mobile phone, the ...
Article by Kshitij_Korde | 31 Oct 2014 | 1 comment
Introduction: The Altiris IIS Log Analyzer - version 2 (aila2) is a c# re-write of the first version of aila, that was written in C on a Linux system (it was my way to get intimate with c, pointers and efficient or not so-efficient data structures). ...
Article by Ludovic Ferre | 24 Oct 2014 | 0 comments
Hello All, Lots of people are facing issue to scan their network for shellshock vulnerability with CCSVM. Follow the below steps and you are ready to scan for shellshock vulnerability: 1. In the CCSVM Console Web interface, click Administration ...
Article by isaneh | 08 Oct 2014 | 0 comments
Symantec has created the following process to identify Unix, Linux and Mac (ULM) computers that are vulnerable to the Bash Shellshock bug. Description The process uses a custom inventory script that can be ran on ULM clients. A zipped file is ...
Article by dougj | 03 Oct 2014 | 1 comment
 In some cases, the Activity Center in the NS/SMP console does not show an "Identification" section for computer resources.    The reason for this is that the Identification section is currently dependent on the presence of hardware ...
Article by dougj | 02 Oct 2014 | 0 comments
It’s been a while coming but I’ve finally got some time to write this article on protecting vCenter Server availability. It’s probably also come as an opportune time as not so long ago VMware announced the end of availability of vCenter Heartbeat so now ...
Article by Virtually_LG | 28 Sep 2014 | 0 comments