Video Screencast Help
Endpoint Management Community Blog
Showing posts tagged with Configuring
Showing posts in English
jasoncordell | 04 Jun 2007 | 1 comment

Hey Everyone,

I am trying to automate some menial tasks and need some help. The final task for a DS imaging or PCT job is a vb script that will send an email to incidents@mydomain.com. This will cause an incident to be automatically created. Since we have bunches of these per day, I don't really want to have someone have to go into each incident and change a couple fields and close it.

I was given a tip on Altirigos to use {HelpdeskValue} in the email to set the values in the incident, but I can't seem to make it work yet.

I did some poking around on the web and I was able to find the DataIsland info in the formats.xml file and found that I should be able to use the following fields.

workitem_priority_lookup_id
workitem_status_lookup_id
workitem_category_tree_value
workitem_external_reference
workitem_action
workitem_source
workitem_category_lookup_id
...

BRING | 31 May 2007 | 0 comments

No one likes to see too much fat anywhere. It is great when it lightly surrounds a New York strip steak, or slowly tenderizes a roast, but not in too many other places. It definitely does not belong in SQL transaction logs.

Unfortunately, some transaction logs get bigger and bigger, some by gigabytes a day, or even in hours. This is usually indicative of a problem.

The Altiris KB article entitled "Why is the SQL Transaction Log growing by Gigabytes Daily?" and found at https://kb.altiris.com/article.asp?article=35211&p=1
outlines one way that this can happen, and how to keep it from happening in the future.

Joel Smith | 30 May 2007 | 0 comments

In a secure network environment, it's important to know what Ports are accessed and utilized by your management applications. Network Discovery is an agentless discovery tool that allows the Notification Server to go out on the wire and discover what devices exist. This tech tip covers what ports are used by Network Discovery, including their corresponding protocol.

The following Ports are Required by Network Discovery:

  • SNMP : 161
  • HTTP : 80

The following Ports are Optional, but are used by Default:

  • FTP : 21
  • SSH : 22
  • Telnet : 23
  • SMTP : 25
  • Sun RPC : 111
  • Terminal Services : 3389

The following Ports are used If AMT is Enabled:

  • Small Business Mode : 16992
  • Enterprise : 16993

SNMP uses UDP, and the rest are defaulted at TCP.

*Many of the above items can be configured within the Scan Policy for Network Disocovery. See this...

riva11 | 29 May 2007 | 0 comments

The original article Leveraging SVS to Prepare Training Course with Less Time and Effort , can be read : here .

In questo contributo descriverò quello che ho fatto per una associazione di studenti locale , che si occupa di diffondere l'educazione all'suo di software Open Source per la comunità studentesca.

Questa associazione mi ha chiesto di tenere un corso di addestramento dove insegnare l'uso di alcuni programmi Open Source come Open Office e altri.

Ho trovato la proposta molto interessante, e dal mio punto di vista (usare programmi open source ovunque) , ho dato velocemente il mio consenso a preparare e tenere questo corso. Ecco come SVS è diventato una chiave di svolta per aiutarmi nella mia preparazione e presentazione.
Requisiti:

L'associazione mi ha chiesto di eseguire i programmi con il sistema operativo Windows XP (Home...

SK | 24 May 2007 | 1 comment

SK spends more time than he's willing to admit in the Altiris Knowledge Base. But, maybe we can benefit from his passion.

Here's a list of articles he highly recommends to anyone wanting to know more about Altiris' Deployment Solution framework.

Thanks for the "heads up" SK!

Altiris Get Local Package Server Script (created by Professional Services): http://kb.altiris.com/article.asp?article=22688&p=3

The following three articles were created by Ludovic Ferre (Altiris Services Assigned Engineer):

What is the DS Image Distribution framework (default usage is DOS)? http://kb.altiris.com/article.asp?article=31186&p=3

How can the DS Image...

SK | 23 May 2007 | 2 comments

When attempting to run an application from a UNC location, a pop-up error message is displayed saying access is denied.

This happens if Internet Explorer Enhanced Security is installed and left in its default configured state, which means that it blocks executions from UNC locations.

To resolve this problem, either disable, remove or configure IE Enhanced Security so that the UNC share is added to the Intranet Security Site in IE. Adding \\machinename will allow executions from all UNC locations on that computer.

riva11 | 21 May 2007 | 1 comment

Dealing with computers, you often find yourself in a situation where you need a driver and for some reason you can't find the correct CD in your collection.

There are several sites that offer information about drivers and and software availability. Unfortunately, some of these sites sell this information or only list recently-released drivers.

For this reason I use two useful sites, DriverPacks.net and DriverZone.

The first site, DriverPacks.net is a fantastic project that collects (in a compressed file) many devices for every different device topology. In DriverPacks page you can find 11 DriverPacks that contains for X86-32 platform the following categories:

  • DriverPack Chipset
  • DriverPack CPU
  • DriverPack Graphics A
  • DriverPack Graphics B
  • DriverPack...
riva11 | 18 May 2007 | 5 comments

In addiction to my previous post Windows XP Common Stop Messages, I'd like to give more info related to managing the Blue Screen of Death (BSOD).

These errors show up at the worst possible times... usually after midnight. And there's always someone willing to call you in to solve this issue immediately.

A normal solution for is probably shutdown the server and restart, lose all your data and wait to see what happens. Maybe the problem will be resolved. But if you see it again, the same fantastic ( ... ) screen then you need to investigate the cause more thoroughly.

The first operation is identify the error message in the BSOD. This information is in the first part of the blue screen and contains an error code number, the addresses where the error occurred, and text where the type of error is reported.

Using this information, you can start the investigation.

Some resources are reported in my previous...

Joel Smith | 17 May 2007 | 2 comments

When running a Network Discovery, Intel vPro AMT systems are not discovered, or AMT Inventory is not collected.

Read on to get an explanation of the problem and a way to get around it.

The Explanation

This occurs on Network Discovery 6.0 SP2 through SP4 (version up to SP4 that have AMT capabilities).

When configuring Network Discovery to discover or capture AMT Inventory from Intel AMT systems, you can check the boxes for Small Business and or Enterprise Mode. When selecting Enterprise Mode, Network Discovery is assuming AMT has been configured with TLS certificates. Intel AMT allows you to provision a system in Enterprise mode without TLS enabled. Since we assume https in Enterprise Mode, if they are provisioned with standard http we will not be able to discover or collect inventory from these systems.

The Solution

If systems have been configured to work in Enterprise Mode without certificates, the 'Small Business Mode' option...

Joel Smith | 15 May 2007 | 3 comments

Having issues with the AMTConfig service and don't mind reading debug logs, or you need to escalate an issue to Intel or Altiris? The following process can capture debug logging for the AMTConfig service.

Here's how to enable logging for the Intel SCS Service (AMTConfig) in conjunction with Out of Band Management Solution and Provisioning.

Debug logging of the SCS service and the SOAP API web service components is turned off by default, which means that the log files (scs_win_server.log, scs_server.log) will not be created.

Turn on Debug Log

Create the following registry key on the service's machine:

HKEY_LOCAL_MACHINE\SOFTWARE\Intel\AMTConfServer\Log\LogLevel – Optional values 'V' for verbose, 'W' for warnings and errors, 'E' for only errors.

If the above registry key is not created then the debug insertion is turned off.

Set the Log File Name

  • HKEY_LOCAL_MACHINE\SOFTWARE\Intel\AMTConfServer\LogFile – full path of...