Video Screencast Help

Endpoint Management Community Blog

Showing posts tagged with 7.x
Showing posts in English
stebro | 21 Aug 2012 | 0 comments

One of the first challenges an organization faces when deciding to remove end-user administrator rights is determining what applications require such rights. Many times the approach is to remove administrator rights, see who complains and add those users back to the administrators group. Over time, large chunks of an organization still have administrator rights due to applications that are not compatible when run as a standard user. Let’s look at how this can be addressed.

There are four application types that typically require administrator rights:

  • System Utilities: Some of these utilities make sense to restrict from standard users including computer management, turning Windows features on or off, or allowing remote access. Others such as the Disk Defragmenter, changing the system time, or adding language packs may be appropriate
  • Installers: Most installers will not run by a standard user. There are some installer exceptions that will still...
mmurphy7 | 20 Aug 2012 | 0 comments

With 2012 almost at the midpoint, it is a good time to take a look at the state of security. Arellia research has analyzed Adobe Security Bulletins and how removal of administrator rights could mitigate their vulnerabilities. As mentioned in the Introduction on Privilege Exploitation, privilege exploitation is where the malicious software takes advantage of the rights of the logged in user to change the configuration of the local computer. Adobe is a common target and Arellia has found a high risk of operating with an administrator user when using many Adobe products.

Here is a summary of privilege exploitation for Adobe Products in 2012 to date:

  2012
 Bulletins 14
...
mmurphy7 | 20 Aug 2012 | 0 comments

With the first half of 2012 now over, here is Arellia’s analysis of Microsoft vulnerabilities and those with privilege exploitation:

 Bulletins

42

 Vulnerabilities

97

 Bulletins with Privilege Exploitations

19

 Vulnerabilities with Privilege Exploitations

46

 % of Bulletins with Privilege Exploitation

45.2%

 % of Vulnerabilities with Privilege Exploitation

47.4%

As a refresher from the Introduction...

mds1974 | 14 Jun 2012 | 1 comment

---------------------------------------------------------------------------------------------------------------------------------------------

***Update 27/06/2012

In the upcoming SMM 7.2 release there have been some changes to the underlying database schema. For this reason, if you import the 'Custom Mobile Reports' it is likely some will be missing data. I have therefore created a new set of reports for the SMM 7.2 version. This bundle has been provided in the attachments section and includes the following reports:

Applications Report - All Devices

Applications Report - Android

Applications Report - iOS

Device Management Status

Device Network Details

Last check in time

Manage Devices

Phone Inventory Details

...
tbenson | 21 May 2012 | 0 comments

The May 23rd Twin Cities User Group meeting is cancelled for this week.

Sorry for the late notice!

We hope to have an event in June. Please check back for further info.

stebro | 26 Apr 2012 | 0 comments

Microsoft’s Security Intelligence Report Volume 12, released earlier this week discusses the continuing challenges of the Conficker worm in enterprises. Conficker came about in later 2008 and continues to plague Windows systems despite patches for the originally exploited vulnerability being available for over 3 years. Conficker continues to spread via one of two methods: exploiting weak passwords or unpatched systems and according to Microsoft’s Tim Rains, in an article by eWeek, 92% of recent infections are due to the exploit of weak passwords.

In terms of exploiting weak passwords, the Security Intelligence Report states “This type of attack uses the credentials of the logged-in user to access local or network resources, or else attacks password-...

Marcello D'Angelone | 24 Feb 2012 | 0 comments

If you wish to apply the registry change mentioned in  TECH109926 to several machines using SMP server you can perform the following steps:

 

  1. On the Notification Console, create a new "Client Job" and select  "Task" and Run Script
  2. Copy and paste the text below and select Command Script as script type  Click OK  

@echo off

net stop "awhost32"

reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Symantec\pcAnywhere\CurrentVersion\Host" /V "QuickADSGroupAuth" /D 1 /T REG_DWORD /F  

net start "awhost32" 

     3.  Use quick run or Create a New schedule to run the script on several computers.

 

in case of  x64 bit machines  the content...
Darrell Elmore | 23 Feb 2012 | 0 comments

Problem

  • Unable to add new Item Link based on a filter

 

  • The following item appears in the Altiris Log Viewer under Warning

Log File Name: D:\Program Files\Altiris\Notification Server\Logs\a.log
Priority: 2
Date: 1/25/2008 11:16:45 AM
Tick Count: 1378279890
Host Name: ****
Process: w3wp.exe (4184)
Thread ID: 6340
Module: AltirisNativeHelper.dll
Source:
Altiris.NS.UI.AltirisWebApplication.Application_PreRequestHandlerExecute
Description: provided fallback culture(en-US) for non supported languages. Maximum request length exceeded

Solution

Perform the steps listed in Tech Article 38973 but for step 1 use the web.config in the \Program Files\Altiris\CustomConsole\Web location.

...

nickthenerd | 10 Feb 2012 | 0 comments

Greetings all-

Due to outside obligations, we are currently looking for two persons to fill open roles in our User Group Membership team:

 

Marketing Director:

Please print the sign-in sheet and bring with you to meeting and have people sign-in so we have accurate attendance. Please give sheet to (Membership Director).                                                                       

                               ...

Pascal KOTTE | 12 Jan 2012 | 8 comments

How, where to find the latest Architecture, Planning, Implementation and Design Guide for Altiris

There was a time where we were not having any "Architecture" guideline documentation for such complex Altiris framework... Now, we have a lot, and when TECHs are talking about the "Design" doc, they are not always talking about the same. ;-P

I found main 4 below: Please, provide any additional, update you’ll find in there :)

Symantec Management Platform Architecture and Design - Version 1.1 - (all the same doc name display 1.0 :)

http://www.symantec.com/docs/HOWTO30370 (last update 2010-07-15) 27 pages

 

Altiris IT Management Suite 7.1 SP2 from Symantec Planning and Implementation Guide

  That is the OFFICIAL one ! 350 pages ! 

http://www.symantec....