Video Screencast Help
Endpoint Management Community Blog
Showing posts tagged with 7.x
Showing posts in English
hugo_parra | 09 Oct 2012 | 3 comments

Continuing our commitment to help you, our users, get the most value out of the Endpoint Management solutions, the product team is sponsoring twelve groups on Connect. In these groups, you will find the best how to videos, articles, and product extensions available. By participating in one or more of these groups (depending on your needs and interests) you will gain access to best practices and content that has been reviewed by our subject matter experts. You will also find access to insightful advice from other users and a trusted conduit for submitting ideas for new content and improvements to our product team.

All these groups are live now! We encourage you to join these sponsored groups and start collaborating with our product team to make our solutions as valuable to you as they can be.

For more information on what a sponsored group is and for instructions on how to join and contribute, see the following article:
...

Ludovic Ferre | 09 Oct 2012 | 1 comment

I was in Spain helping a customer migrate their 7.1 SP1 servers to 7.1 SP2 Rollup 4, and I encountered a strange issue that I am finding, today, on my test servers as well.

The issue, as the title indicates, relates to the Security Role Manager, and was found in one (the reporting server) for my customer. I still need to create a case and send it to our backline / engineering team, but wanted to reserve the primer to Connect.

Now, to be more precise here is how I found the issue on my server (it's slightly different from the customer server - but the root is the same):

  • Clone the Symantec Admin role
  • Open the Security Role Manager
  • Select the "Resources" view, here is what it looked like:

 

  • Click on the pen to limit the role view on the Resource tree:

 

...

Pascal KOTTE | 03 Oct 2012 | 4 comments

Did you already angry because not able to export or copy/paste (text) the content of a filter ? As we were able with NS6 crying

With a report, we still are not able to copy/paste directly into Excel no It is one our feature request to Symantec enlightened thanks to vote those:

Pascal KOTTE | 03 Oct 2012 | 96 comments

2012-10-03: From news on Anthony P. blog an available release MP1 for the SP2. Reviewed 2012-10-26. Re-Reviewed 2012-11-21.

Before upgrading, you must also check this article, can change in the time and obosolete this blog a little:

http://www.symantec.com/docs/TECH197966

IT Management Suite 7.1 SP2 MP1 Release Notes

here it is: http://www.symantec.com/docs/DOC6052

and the IT Management Suite 7.1 SP2 MP1.1 Release Notes

http://www.symantec.com/docs/DOC5955

Notice: You should install the MP1.1, that is...

stebro | 27 Sep 2012 | 0 comments

Since publishing the article on Zero-Day Vulnerability Protection with Privilege Management, there has been a lot of additional press around the September 2012 Microsoft Internet Explorer vulnerability that adds additional insights into this problem. The bottom line is that zero-day vulnerabilities, while not new, continue to be a big problem to organizations.

Time to respond to security threats is crucial and there is some concerning news around the disclosure of this latest Internet Explorer vulnerability. Reviewing the publicly disclosed timeline, we see the following key events:

ianatkin | 20 Sep 2012 | 0 comments

It's just been brought to my attention that Brian Madden yesterday posted this very interesting blog,

http://www.brianmadden.com/blogs/brianmadden/archive/2012/09/19/here-s-how-symantec-can-dominate-the-quot-new-quot-desktop-fingers-crossed-they-don-t-screw-it-up-again.aspx

Interesting to see how others on the outside see the Symantec's plays in desktop management space. 

stebro | 18 Sep 2012 | 0 comments

Have you used Internet Explorer to visit a malicious website recently? Have you used Internet Explorer to visit any website lately? How do you know for sure that you are not infected? Yesterday, a new zero-day vulnerability for Internet Explorer versions 6-9 was reported affecting everything from Windows XP to Windows 7 and Windows Servers. Zero-day vulnerabilities are a common fact of life, but the same old approaches to protection continue to be insufficient. Let’s discuss this vulnerability and how privilege management can mitigate the impact.

In the case of this zero-day vulnerability, a malicious website can be crafted then unsuspecting victims can visit it with Internet Explorer only to be exploited. Once exploited, security software can be disabled, files are downloaded or malicious software is installed so that system can be reused as a zombie or SPAM relay.

...

jasonfo | 18 Sep 2012 | 0 comments

If you have ever needed to create a report but dont know what table you are looking for this might help you out. In my case I had to find something that had the "Publisher".

 To look for columns in view...

USE
Symantec_CMDB
SELECT
V.name AS View_name,
SCHEMA_NAME(schema_id) AS schema_name,
c.name AS column_name
FROM sys.views AS v
INNER JOIN sys.columns c ON v.OBJECT_ID = c.OBJECT_ID
WHERE c.name LIKE '%Publisher%'
ORDER BY schema_name, View_name;

To look for columns in tables...

USE
Symantec_CMDB
SELECT t.name AS table_name,
SCHEMA_NAME(schema_id) AS schema_name,
c.name AS column_name
FROM sys.tables AS t
INNER JOIN sys.columns c ON t.OBJECT_ID...

Darrell Elmore | 24 Aug 2012 | 0 comments

Problem

It seems that the Install Endpoint Protection task fails for some but not all computers.

Solution

  1. Go to the installation package located under D:\Program Files\Altiris\Notification Server\NSCap\bin\Win32\x86\Symantec Endpoint Protection\Install Package or D:\Program Files\Altiris\Notification Server\NSCap\bin\Win64\x64\Symantec Endpoint Protection\Install Package
  2. Open the InstallSEP_<Package Name>.vbs file
  3. Make the following changes

Change: WshShell.Run <Package Name>.exe, HIDE_WINDOW, WAIT_ON_RETURN

To:  sCurrPath = CreateObject("Scripting.FileSystemObject").GetAbsolutePathName(".")

WshShell.Run chr(34) + sCurrPath + "\<Package Name>.exe" + chr(34), HIDE_WINDOW, WAIT_ON_RETURN

In my case this seemed to have fixed my...

stebro | 21 Aug 2012 | 0 comments

One of the first challenges an organization faces when deciding to remove end-user administrator rights is determining what applications require such rights. Many times the approach is to remove administrator rights, see who complains and add those users back to the administrators group. Over time, large chunks of an organization still have administrator rights due to applications that are not compatible when run as a standard user. Let’s look at how this can be addressed.

There are four application types that typically require administrator rights:

  • System Utilities: Some of these utilities make sense to restrict from standard users including computer management, turning Windows features on or off, or allowing remote access. Others such as the Disk Defragmenter, changing the system time, or adding language packs may be appropriate
  • Installers: Most installers will not run by a standard user. There are some installer exceptions that will still...