Video Screencast Help
Endpoint Management Community Blog
Showing posts tagged with Performance
Showing posts in English
BRING | 20 Mar 2009 | 0 comments

Recently, it was discovered on a large number of server class machines that the Altiris Agent was displaying the following error:

HTTP Request Failed: An operation on a socket could not be performed because the system lacked sufficient buffer space or because a queue was full. (-2147014841).

Sufficient buffer space?  Well, after checking the memory statistics on a client machine exhibiting the behavior, the handle counts for the Altiris Agent Service were very high, in some cases exceeding 10k or more.  However, the counts were ascending and descending as expected, just at a very high level. 

After some research, this error is a common error and warning occurs when the Altiris Agent cannot contact a domain controller/DNS server to resolve the name of the Notification Server.  This has been shown in some cases to point to a inconsistently behaving or non-functional domain controller/DNS server. The high ...

haim96 | 08 Jan 2009 | 0 comments

OpenedFilesView displays the list of all opened files on your system. For each opened file, additional information is displayed: handle value, read/write/delete access, file position, the process that opened the file, and more...
Optionally, you can also close one or more opened files, or close the process that opened these files.

This utility is especially useful if you try to delete/move/open a file and you get one of the following error messages:

  1. Cannot delete [filename]: There has been a sharing violation. The source or destination file may be in use.
  2. Cannot delete [filename]: It is being used by another person or program. Close any programs that might be using the file and try again.

When you get one of these error messages, OpenedFilesView will show you which process locked your file. Closing the...

riva11 | 19 Dec 2008 | 7 comments

Many helpful tools are portable and every IT admin uses these tools from USB memory key.

Usually USB devices are really easy to install and use on different computers. But sometime problems happen when you insert a USB device and for some unknown reason it isn't recognized or cause a hardware error.

A good way is delete entries generated from this installation and install again. To help to perform this maintenance there is a good tool called USBDeview made by Nirtsoft.

Using this program you can see all USB devices configured on a local or remote computer, and see many information: device name and description, device type, serial number, the date/time that device was added, VendorID, ProductID, and many others.

Also you can perform other maintenance tasks, in addition to report functions, there are basic commands to disconnect or delete USB devices.

USBDeview is released as freeware and the nice feature is a portable application. You have only...

BRING | 11 Nov 2008 | 2 comments

We all like the ease-of-use and access of the Altiris Agent logviewer application. It gives us quick and easy access to look at the agent-side logs. It is a bit cumbersome, and as the graphic below shows, you need to click the browse button to be able to view the other stored files on the computer.

One day, when needing to review the files for a problem that I was troubleshooting, I needed to look at some historical information in the logs, when lo and behold, I clicked on the Browse button and nothing happened. Why?

Well, I came to find out that a new security policy...

BRING | 10 Nov 2008 | 0 comments

Standard Reports - You should be able to trust them, especially when they have to do with how complete your patching is in your environment. Normally you can check the reports (Like the "Microsoft Compliance and Vulnerability by Computer" report), and then go set up the correct tasks, and remediate the machines.

If you are like most administrators, you will know what bulletins and tasks you have enabled for distribution. So when you see them show up as vulnerable in the report it becomes very easy to be frustrated (and it could get you in trouble too!). The next thing to do is to be absolutely sure that your reports are accurate. You do this by spot-checking or auditing a few of the individual machines that are reported as vulnerable.

But what do you do when you find that the reports you trusted were wrong? The machines actually were...

looeee | 31 Oct 2008 | 2 comments

Ok there are a few changes you need to make to the BDE MSM to get it to work properly:

Open the MSM in Orca or Inst Ed

The errors requiring admin rights when your user self-repairs all come from a dodgy CustomAction.

Fixing the CustomAction's Component:

1. Go to the Component Table. Find the TempFolderFiles row. Delete the values in the ComponentId and KeyPath columns.

Fixing the CustomAction's Condition:

2. Go to the ModuleInstallExecuteSequence Table. Find the BDEConfig Row and set its Condition to "Privileged".

This really is a poor MSM.

While you are in the ModuleInstallExecuteSequence you should fix the condition on BDEReduceUseCount. It should be the same as BDEBumpUseCount, changing the 3s to 2s.

It doesn't...

CondorMan | 15 Oct 2008 | 3 comments

VMWare is now offering ESX for free! I have been using it on my test system and it works great. I can now run multiple versions of Notification Server and Deployment Server on separate virtual machines.

For me, the best part about ESX is that all the guest OSs share common memory pages. That means you can have four Windows Server 2003 virtual machines up and since most of the data stored in memory is the same, they cumulatively will use about the same RAM as two servers.

haim96 | 06 Oct 2008 | 0 comments

VMware has just released VMware server 2.0. This is a free product of VMware to create and run virtual machine and it's a great for testing.

In this version they go for WEB console (with Tomcat web sever). I preferred the dedicated console but this will one also do the job...

More info and download:

CondorMan | 24 Sep 2008 | 1 comment

If you use Sysinternals tools on many different computers for your troubleshooting, go to and you will be presented with a list of all Sysinternals executables.

You can run them directly from there instead of finding, downloading, and extracting them through the regular site. It has been a great timesaver for me.

CondorMan | 23 Sep 2008 | 1 comment

If you ever need to script the removal of an application or need to run an install or upgrade that requires the application to be closed, you can use PsKill to kill all the open processes of a certain file so that you can be sure the task will complete successfully without any files being locked.

PsKill will terminate a local or remote processes. You can find out more at