Video Screencast Help
Endpoint Management Community Blog
Showing posts tagged with 7.x
Showing posts in English
Ludovic Ferre | 05 Sep 2013 | 2 comments

Today is riddle day. So here it is in full:

When is a basic inventory not a basic inventory?

When it's a custom inventory!!!

So, now this explains why we are getting thousands of customer inventory every day at my customer. The custom inventories are generated by VBS and as documented here on Connect [1] (and I'm sure in much of the product documentation) we generate NSE's with a msgTo element pointing to the Basic Inventory Dataclass:

'----------------------NOTIFICATION SERVER ENTRY STARTS HERE------------------
dim nse
set nse = WScript.CreateObject ("Altiris.AeXNSEvent")
nse.To = "{1592B913-72F3-4C36-91D2-D4EDA21D2F96}" 'Never change this guid, it is needed by NS.
nse.Priority = 1
dim objDCInstance
set objDCInstance = nse.AddDataClass ("{8284a0ad-b37f-4c9b-b0ad-cb92f97d7401}") ' Change this to math the guid of the custom data class
dim objDataClass
set objDataClass...
Marcello D'Angelone | 12 Aug 2013 | 0 comments
According to ssd-vs-hdd-report, Windows does not allow a reliable way to collect information about a SSD disks.
However we can identify the SSDs from the Inv_HW_Logical_Device data class.
  
You can copy the following query to create your own report:
 
SELECT
v.[Name] AS [Computer Name],
cs.[Model] AS [Computer Model],
hwl.Model,
ld.[Device ID] as Drive,
CAST((ISNULL(ld.[Size (Bytes)], 0)/(1024 * 1024 * 1024)) AS DECIMAL (10, 2)) AS 'Total Disk Space (GB)',
CAST((ISNULL(ld.[Free Space (Bytes)], 0)/(1024 * 1024 * 1024)) AS DECIMAL (10, 2)) AS 'Free Disk Space (GB)'

FROM vComputer v
INNER JOIN Inv_HW_Logical_Device hwl
ON v.Guid = hwl._ResourceGuid
INNER JOIN vHWComputerSystem...

stebro | 26 Jun 2013 | 0 comments

Properly securing privileged accounts is a basic security tenet and often a priority for servers. Unfortunately, the same level of concern is not present for desktops in many organizations. Yet desktops\laptops often contain as much sensitive information as servers and have done so for many years.

Most desktops\laptops have information that doesn’t make it to servers yet is extremely sensitive and valuable. Think about what is on the laptops of the CEO, the HR director, the software architect, or the CFO in any given organization. Much of this information on these systems can create serious risks if compromised as any data on an organizations file or database server. Endpoint security too often focuses solely on the threat of malware and hackers, but ignores the simple threat of insecure privileged user accounts.

For Windows systems, privileged accounts are any accounts that are in the Administrators group. Often there is at least one account that is used by an...

SK | 15 May 2013 | 7 comments

The long awaited pcAnywhere hotfix is finally here.

Please review "Symantec pcAnywhere 12.6.7 Hot Fix (HF1) readme" (http://www.symantec.com/docs/DOC6435) for full details.

Joe G. | 13 May 2013 | 0 comments

Ever since the introduction, and general take-up of the tablet, it has been speculated that the death of the PC is nigh. But is this the case? According to IDC, global PC sales fell 13.9% in Q1 2013, accelerating the drop of 8.3% in Q4 2012. Certainly less are being sold, and for this there are many reasons.

A fundamental reason for this, and I believe we’ll be seeing this very shortly with smartphones and tablets, is that PCs have become like ‘white goods’. You don’t throw away your fridge or cooker when a new model comes out, and the same has become the case with the PC. Given the slowdown of processor improvements, and how well Windows 7 runs on older machines, consumers are no longer buying a new PC every couple of years to keep up. RAM is still very cheap and given the prevalence of 64bit Windows 7, it’s easy to put in another 4 or 8GB of RAM to improve performance.

Another reason for keeping an aging machine is cloud services. If...

Rae Landua | 06 May 2013 | 0 comments

ITS & Altrinsic Solutions' free Altiris Deployment webinar is just around the corner! Join Mark England to hear Quagmires Quandries and Snake Pits: Don’t Get Stuck on Deployments on Thursday 5/9/13 at 1pm CDT. Register now to save your spot!  https://www1.gotomeeting.com/register/454827056

InfaSean | 26 Mar 2013 | 0 comments

Hello,

 

We have an immediate opening for an Altiris admin in Redwood City. CA.   If you would like additional details, please contact me directly @ scurran@informatica.com

 

Thank you,

 

Sean

stebro | 06 Mar 2013 | 0 comments

In previous articles, we discussed why users want administrator rights and why they need them. Now let’s explore why they shouldn’t have them. In today’s increasingly dangerous threat landscape, every organization’s security strategy should include the goal to remove administrator rights. Here are the reasons.

  1. Zero-Day Threat Protection: Arellia research has proven that running with reduced privileges can mitigate a majority of software vulnerabilities in Microsoft, Adobe, and Mozilla products. Any vulnerability has the potential to be a zero-day: meaning it is exploited before the vendor or security vendors know about it and have a chance to stop exploits with patches or antivirus \ intrusion prevention signatures. Running software with reduced privileges protects commonly software when exploited by vulnerabilities that...
ShaneB | 26 Feb 2013 | 0 comments

https://www.publicsector.shidirect.com/Webinars/SeminarRegister.aspx?SeminarSeriesId=813

 

I just wanted to post this event on the connect page and see if anyone else from the user group planned on attending?  WKU will have a few folks there.

Sumit G | 15 Feb 2013 | 0 comments

Best Practices articles of Symantec Software Management 7.1

 

Symantec Software Management 7.1 Best Practices, Part 1
 
https://www-secure.symantec.com/connect/articles/symantec-software-management-71-best-practices-part-1
 

Symantec Software Management 7.1 Best Practices, Part 2
 
https://www-secure.symantec.com/connect/articles/symantec-software-management-71-best-practices-part-2
 

 
Symantec Software Management 7.1 Best Practices, Part 3
 
https://www-secure.symantec.com/connect/articles/symantec-software-...