Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.
Endpoint Management Community Blog
Showing posts tagged with Client Management Suite
Showing posts in English
riva11 | 20 Nov 2008 | 3 comments

Windows System Control Center (WSCC) is a graphic interface that allows you to manage the utilities from Windows Sysinternals and Nirsoft.

This tool is released as freeware and allows you to navigate and execute all Sysinternal and Nirsoft utilities through a friendly GUI. WSCC is only a graphical interface, all tools will be executed on a command line.

For the installation, you will need first to download all or part of Sysinternals and Nirsoft tools, then store together with WSCC in your favorite USB key.


Deepanshu | 17 Nov 2008 | 4 comments

Some useful information about ATTRIB command which you can use for changing attributes.

Display or change file attributes. Find Filenames.

ATTRIB [ + attribute | - attribute ] [pathname] [/S]


+ : Turn an attribute ON
- : Clear an attribute OFF

pathname : Drive and/or filename e.g. C:\*.txt
/S : Search the pathname including all subfolders.


  • H Hidden
  • S System
  • R Read-only
  • A Archive

If no attributes are specified ATRIB will return the current attribute settings. Used with just the /S option ATTRIB will quickly search for a particular filename.

Combining the Hidden and System attributes.

If a file has both the Hidden and System attributes set, you...

dougj | 12 Nov 2008 | 1 comment

It is a misnomer to state that Custom Inventory supports certain data types. Within the aexcustinv.exe process, all data is treated as a string type. It is incumbent on the Notification Server dataloader to interpret the data types defined in the column attributes, create the table properly in the database, and validate the incoming data.

So, it is a clearer to say that when creating custom inventory XML scripts, certain data types can be processed by the NS dataloader.

Currently, the dataloader will process the following data types:

Custinv Data Type Converts to SQL Data Type
string nvarchar
int int
dateTime datetime
r4 real
float float
BRING | 10 Nov 2008 | 0 comments

Standard Reports - You should be able to trust them, especially when they have to do with how complete your patching is in your environment. Normally you can check the reports (Like the "Microsoft Compliance and Vulnerability by Computer" report), and then go set up the correct tasks, and remediate the machines.

If you are like most administrators, you will know what bulletins and tasks you have enabled for distribution. So when you see them show up as vulnerable in the report it becomes very easy to be frustrated (and it could get you in trouble too!). The next thing to do is to be absolutely sure that your reports are accurate. You do this by spot-checking or auditing a few of the individual machines that are reported as vulnerable.

But what do you do when you find that the reports you trusted were wrong? The machines actually were...

dfnkt_ | 24 Oct 2008 | 3 comments

Microsoft has released a bulletin to certain partners dated October 23, 2008 regarding a patch MS08-067 that patches a vulnerability in the server service that could allow remote code execution from an unauthenticated user. You can view more about it here:

Altiris has worked through the night and released the update and if your download has run for today, then you should see MS08-067 in Tasks> Software Management> Patch Management> Manage Software Updates.

If your has not updated then you should manually kick off this job by going to Configuration> Software Management> Patch Management> Server Settings> Microsoft Settings and right click on Microsoft Patch Management Import and select Start download...

Eshwar | 20 Oct 2008 | 7 comments

I have created the following report when I was asked to write an altiris report, to find a list of software installed on the given user’s PCs.

I was given a list of users as input to the report. Now I have to find out the list of software in each user’s PC. There are actually two reports in this.

  1. Finding primary user of the computer
  2. Display list of software on the computer

1. Finding primary user of the computer:

SELECT DISTINCT (PU.[User]), vComputer.[Name] AS 'Machine Name',
ACI.[Domain] AS 'Domain'      
FROM vComputer        
INNER JOIN [inv_aex_ac_primary_user] PU  
ON PU._ResourceGuid = vComputer.Guid        
JOIN [Inv_AeX_AC_Identification] ACI  
ON ACI.[_ResourceGuid] = vComputer.Guid   
WHERE PU.[Month] = datename(month, getdate())   
IN (...
dnorris | 07 Oct 2008 | 0 comments

When packaging an application requiring an exception within the XP firewall, you can automate the exception using netsh.

The XP firewall can be configured using the firewall command of the netsh utility. For full usage options, type the following:

netsh firewall ?

To add a program exception to the firewall, you will need to specify a descriptive name for the exception and the path to the executable. For this example, we'll use a description of SomeAppException and an executable path of C:\Program Files\SomeApp\App.exe.

The following script performs a check to ensure that XP is running, then calls the netsh command.

REM Allow exception in XP Firewall

REM Only perform this for XP
ver | find "XP" > nul
if %ERRORLEVEL% == 0 goto Is_XP
goto exit

:Run Windows XP...
erikw | 01 Oct 2008 | 0 comments

In this video, Kevin Unbedacht shows us how Intel Vpro works together With Altiris Client Management Suite.

This very valuable video explains how these work together.

Erik Westhovens

Terry Cutler | 26 Sep 2008 | 0 comments

Having a reference point of considerations, insights, and so forth can be invaluable to any project - whether a simple pilot of technology or preparing for a full production rollout.

If your project involves deploying and utilizing Intel vPro in an Altiris environment, a checklist of items and associated resources has been posted at

In addition to utilizing the checklist, having it online allows you to provide feedback and suggestions.

The opinions expressed on this site are mine alone and do not necessarily reflect the opinions or strategies of Intel Corporation or its worldwide subsidiaries.

CondorMan | 23 Sep 2008 | 1 comment

If you ever need to script the removal of an application or need to run an install or upgrade that requires the application to be closed, you can use PsKill to kill all the open processes of a certain file so that you can be sure the task will complete successfully without any files being locked.

PsKill will terminate a local or remote processes. You can find out more at