Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.
Endpoint Management Community Blog
Showing posts tagged with Client Management Suite
Showing posts in English
Ludovic Ferre | 07 Oct 2013 | 3 comments

The symantec.pl.xml update for 7.5 has hit SolutionSam.com, so 7.5 is now GA.

Here are some information from the product listing:

file md5  = b8675ec97437e633fbcad1c112a6a557
file size = 15 361 694 bytes
timestamp = 2013-10-03 10:59

And here its the full file list (and handfull as you could guess :D):

Modified:
/solutions/7_5/eipower/7_2_rtm/ei_powersaversolution_7_2_perth.msi
 
Added:
/solutions/7_1/ita/ita_doc/altiris_itanalyticsdocumentation_x64.msi
/solutions/7_5/itms/7_5_rtm/altiris_activitycenter_7_5_x64.msi
/solutions/7_5/itms/7_5_rtm/altiris_activitycenterlanguages_7_5_x64.msi
/solutions/7_5/itms/7_5_rtm/altiris_agentlessinventoryupgrade_7_5_x64.msi
/solutions/7_5/itms/7_5_rtm/altiris_agentlessinventoryupgrade_7_5_x86.msi
/solutions/7_5/itms/7_5_rtm/altiris_assetmanagementcombine_7_5_x64.msi
/solutions/7_5/itms/7_5_rtm/altiris_assetupgrade_7_5_x64.msi
/solutions/7_5/itms/7_5_rtm/...
Ludovic Ferre | 09 Sep 2013 | 0 comments

After I posted my previous blog entry [1] I went to implement a solution (for which the documentation is done and awaiting moderation to be release here on Connect).

It worked pretty well, but still we have far too many basic inventory coming in. A look at captured NSE's indicated that there is another problem with inventories hijacking the Basic Inventory Capture Item:

Sample 1:

<?xml version='1.0' ?>
<message>
<from><resource guid='{ffffff-ffff-ffff-ffff-ffffffffffff}' typeGuid='{493435F7-3B17-4C4C-B07F-C23E7AB7781F}'/></from>
<to>1592B913-72F3-4c36-91D2-D4EDA21D2F96</to>
<time>20130905211027.187000-120</time>
<body><inventory><dataClass guid="ca029e6b-f124-4399-9b91-10c41b73165b"><data><resource partialUpdate="true"><row PolicyGuid="ffffff-ffff-ffff-ffff-ffffffffffff" TaskInstanceGuid=...
Ludovic Ferre | 05 Sep 2013 | 2 comments

Today is riddle day. So here it is in full:

When is a basic inventory not a basic inventory?

When it's a custom inventory!!!

So, now this explains why we are getting thousands of customer inventory every day at my customer. The custom inventories are generated by VBS and as documented here on Connect [1] (and I'm sure in much of the product documentation) we generate NSE's with a msgTo element pointing to the Basic Inventory Dataclass:

'----------------------NOTIFICATION SERVER ENTRY STARTS HERE------------------
dim nse
set nse = WScript.CreateObject ("Altiris.AeXNSEvent")
nse.To = "{1592B913-72F3-4C36-91D2-D4EDA21D2F96}" 'Never change this guid, it is needed by NS.
nse.Priority = 1
dim objDCInstance
set objDCInstance = nse.AddDataClass ("{8284a0ad-b37f-4c9b-b0ad-cb92f97d7401}") ' Change this to math the guid of the custom data class
dim objDataClass
set objDataClass...
petr_sanda | 28 Aug 2013 | 0 comments

Hi everyone,

I've recently fixed a simple problem and I would like to share it with you.

We have one huge package on the notification server which recently started to time out before update distribution points finished.

The solution is simple!

You need to increase the http timeout, which is by default set to 10 minutes.

Locate C:\Program Files\Altiris\Notification Server\Web\web.config and find a line which contains "httpRuntime executionTimeout". Change the value from 600 (in seconds) to something larger like 900.

Restart the Symantec and IIS services or just simply reboot and voila :)

This worked for me.

Marcello D'Angelone | 12 Aug 2013 | 0 comments
According to ssd-vs-hdd-report, Windows does not allow a reliable way to collect information about a SSD disks.
However we can identify the SSDs from the Inv_HW_Logical_Device data class.
  
You can copy the following query to create your own report:
 
SELECT
v.[Name] AS [Computer Name],
cs.[Model] AS [Computer Model],
hwl.Model,
ld.[Device ID] as Drive,
CAST((ISNULL(ld.[Size (Bytes)], 0)/(1024 * 1024 * 1024)) AS DECIMAL (10, 2)) AS 'Total Disk Space (GB)',
CAST((ISNULL(ld.[Free Space (Bytes)], 0)/(1024 * 1024 * 1024)) AS DECIMAL (10, 2)) AS 'Free Disk Space (GB)'

FROM vComputer v
INNER JOIN Inv_HW_Logical_Device hwl
ON v.Guid = hwl._ResourceGuid
INNER JOIN vHWComputerSystem...

michael cole | 31 Jul 2013 | 0 comments

I came across a stored procedure that is quite popular for troubleshooting SQL especially blocking, it's not new but deserves a repost. I tried it against sp_who and sp_who2. It seems that this SP gives a more instant snapshot in better detail. Probably it's best feature is a clickable link to the transact that is running. I could still see block chains better with sp_who2, as you could see the trail of SPID's better. There is a SQL query for finding the lead blocker at http://sqlserverplanet.com/troubleshooting/blocking-processes-lead-blocker

For those that are interested in what the differences are between sp_who and sp_who2, the screen snip below shows the column differences, the hidden difference is that sp_who is documented and thus supported, otherwise they are very similar. SP_WhoIsActive complements them.

Disclaimer

...
ohzone - CherylPeterson | 30 Jul 2013 | 0 comments

We love our Connect community members and once again we're celebrating SysAdmin day. Check out this blog to find out how we are sharing the love with you!

Happy International Sysadmin Day!

Tell us something crazy that's happened in your world and we might make it worth your time!

stebro | 26 Jun 2013 | 0 comments

Properly securing privileged accounts is a basic security tenet and often a priority for servers. Unfortunately, the same level of concern is not present for desktops in many organizations. Yet desktops\laptops often contain as much sensitive information as servers and have done so for many years.

Most desktops\laptops have information that doesn’t make it to servers yet is extremely sensitive and valuable. Think about what is on the laptops of the CEO, the HR director, the software architect, or the CFO in any given organization. Much of this information on these systems can create serious risks if compromised as any data on an organizations file or database server. Endpoint security too often focuses solely on the threat of malware and hackers, but ignores the simple threat of insecure privileged user accounts.

For Windows systems, privileged accounts are any accounts that are in the Administrators group. Often there is at least one account that is used by an...

SK | 15 May 2013 | 7 comments

The long awaited pcAnywhere hotfix is finally here.

Please review "Symantec pcAnywhere 12.6.7 Hot Fix (HF1) readme" (http://www.symantec.com/docs/DOC6435) for full details.

Joe G. | 13 May 2013 | 0 comments

Ever since the introduction, and general take-up of the tablet, it has been speculated that the death of the PC is nigh. But is this the case? According to IDC, global PC sales fell 13.9% in Q1 2013, accelerating the drop of 8.3% in Q4 2012. Certainly less are being sold, and for this there are many reasons.

A fundamental reason for this, and I believe we’ll be seeing this very shortly with smartphones and tablets, is that PCs have become like ‘white goods’. You don’t throw away your fridge or cooker when a new model comes out, and the same has become the case with the PC. Given the slowdown of processor improvements, and how well Windows 7 runs on older machines, consumers are no longer buying a new PC every couple of years to keep up. RAM is still very cheap and given the prevalence of 64bit Windows 7, it’s easy to put in another 4 or 8GB of RAM to improve performance.

Another reason for keeping an aging machine is cloud services. If...