Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.
Endpoint Management Community Blog
Showing posts tagged with Tip/How to
Showing posts in English
Antonp | 14 May 2009 | 2 comments

 If you are a network admin or security admin at your company, think you will find this really interesting, if not already known to you.

Microsoft Visio 2003 and 2007 versions have a connector for MBSA (Microsoft Baseline Security Analyzer) which can be downloaded from here:

If you have ever used Visio, you probably know that it is an effective tool for creating network diagrams. However, you aren't limited to creating these diagrams manually. You can create an MBSA-suitable diagram manually, but it's a lot easier to use LANsurveyor. You can use the LANsurveyor for Visio tool (it's in the Visio 2003 Resource Kit) to automatically create a Visio diagram of your network.

Once this diagram has been created, you can add in the Visio connector for the...

Antonp | 14 May 2009 | 3 comments

 I recently browsed the net on a forum site and noticed a google ad "Get SVS Free". Obviously knowing what SVS is, i clicked on the ad and was redirected to a nice site, containing SVS
packages, for multimedia software, games, office tools, development tools, etc.....

Thought i would share the link with everyone, that need to demo the SVS process and how the packages work. Here is the link to download 
various SVS packages.

BRING | 14 May 2009 | 4 comments

While attempting to run a report for local administrator password access from Local Security Solution 6.1 (LSS),  the report, for some of the client machines, rather than referencing a computer/username, displayed "User RID 500" instead. Who is he? :)

Further research showed that Local Security Solution (LSS) uses a "Local User Inventory Policy" which, by default, has a capture interval of every 12 hours. This inventory sends a nse file to the Notification Server (NS) that contains all the needed data to properly create a local user resource. This should get created as "Computer Name/User". LSS also has the password reset policy that sends an event up containing the password change information. Because the password change is on a known RID (Relative Identifier),( in this case, the local Administrator account, which has a pre-defined RID of 500), the current policy applies to new comptuers.

The issue of transposing the...

John Atkins | 14 May 2009 | 0 comments

I have found a handy website for help with command line scripting of all kinds of software installations.  So far, for me it has been very accurate and is a real time saver when you are asked to create a task to distribute software.  It is searchable or you can browse through the list.  I hope this can help someone as much as it has helped me.

Mohammad Bamya | 30 Apr 2009 | 0 comments

You set up a host to disconnect the session if inactive after XX minutes, the remote connected to the host, and stay inactive for the XX minutes, but it's not getting disconnected as configured.

There is 2 main reasons behind that:

  1. The caller is a Superuser, and that's working by design. The Superuser will have a full permission.
  2. The mouse pointer is not stable.


  • Change to a normal user
  • replace the mouse
riva11 | 30 Apr 2009 | 2 comments

Sometime in a batch file you need to wait to ensure that enough time is given for some operations to complete (installation, configuration, etc.)

There are some ways and tricks to put a pause, if you have a specific time a good solution is use the Sleep.exe utility.

This utility is available with the Windows Server 2003 Resource Kit Tools .  Useful in batch files, Sleep.exe waits for a specified amount of time.


sleep time-to-sleep-in-seconds
sleep [-m] time-to-sleep-in-milliseconds
sleep [-c] commited-memory ratio (1%-100%)

Example :
sleep 5 ( waits for 5 seconds )

Link :...

ChrisBern | 28 Apr 2009 | 2 comments

Recently, a website has been launched with the goal of making Workflow Solution resources easier to find. It is not a replacement for any existing sites, but rather an aggregator of available resources in an organized way that will help both new and existing users of Workflow Solution. The site won't host content, but will link to content that is on Symantec Connect, the official Symantec website, the Altiris KnowledgeBase, forums, etc.

Please review the site and let us know what you think, either by responding to this blog, or on the Submit Feedback tab on the site itself. The more feedback we get on ways to improve or organize the site, the better we can make it. Here is the URL:

BRING | 28 Apr 2009 | 2 comments

While recently working a Recovery Solution issue, we encountered some problems.  The clients could not register and SSM jobs were not completing.  Upon reviewing the Event Viewer logs, we saw a consistent sequence of errors

 Altiris Recovery Solution Error Server Space Management 35 N/A SERVER "RemovePhysicalFile RemovePhysical() returned an error.

Altiris Recovery Solution Error Server Space Management 73 N/A SERVER "Error retentioning file 'winlogon.log' of user 'XXXXXXXXX' on volume 'C:'.
FileKey 10448642, file revision 13.

Altiris Recovery Solution Error Server Space Management 2 N/A SERVER "There was an error when a file was being processed for Recovery Solution Server space management.
Problem backing up the file.
File 10448642

Altiris Recovery Solution Error File Repository Engine 12 N/A SERVER "Unable to read file data from the Recovery Solution Server.

Altiris Recovery...

adtlink | 28 Apr 2009 | 1 comment

You are cordially invited to join the Altiris 7 First-Mover program.

At ManageFusion 09 in Las Vegas, we announced the creation of the First Mover program for Altiris 7. For those who are looking to move to Altiris 7 over the next six months, we want to help facilitate your information gathering, and planning, in order to ensure a successful migration to Altiris 7.

Enrollment to the program will begin April 28th and will be open until June 1, 2009. To register for the program, click on the link Use your Altiris Beta account to access the portal.

Benefits of the First Mover Program include:

  • Preferred status for technical support escalations
  • Access to advanced level support engineers
  • One-stop access to the latest information, KB articles, tips and tricks, and a discussion forum
  • Scheduled...
Randall Newnham | 28 Apr 2009 | 0 comments

There are some hardware setups that require using a different version of WIndows PE than WIndows PE 2.0, which is what the Ghost Boot Wizard in Ghost Solution Suite 2.5 uses. The disadvantage to using custom Windows PE boot disks is that some options that are available in the boot wizard are either not available, or it is not intuitive to include. One of these features is DeployAnywhere, the Ghost utility for injecting drivers into a machine after an image is deployed. This method will allow you to use that feature even if you have to use a different PE environment.

How to add DeployAnywhere:

1. Add this file to the PE environemnt:

C:\Program Files\Symantec\Ghost\GhDplyAw32.exe

2. Add this folder to the PE environment:

C:\Documents & Settings\All Users\Application Data\Symantec\Ghost\Template\common\windrivers

This provides the executable and the drivers necessary for evaluating and retargeting. Here is the...