Video Screencast Help
Endpoint Management Community Blog
Showing posts in English
BRING | 22 Aug 2013 | 0 comments

Servicedesk 7.2 Sp2 and 7.5 have a handy built in tool that allows for the bulk closure of incident tickets.  It was discovered, however, that this tools ability to remove incidents from the selection set is not properly functioning. 

To reproduce the problem:

1. Go to Submit Request > Administrative Service > Resolve/Close Multiple  Incidents

2. Search & Add Tickets

3.  From the Selected Tickets section > Click Remove option

The actual result  is that the incident ticket is not removed    The expected result is that the incident ticket should be removed from the selection set.

There are no specfic errors displayed as a result of this problem

 

Further research showed that there was missing data in the save sets of the closure process.  This has been fixed and will be available in the upcoming 7.6 release of Servicedesk.  You can also workaround the problem by...

BRING | 21 Aug 2013 | 0 comments

In Servicedesk 7.5 Mp1 - all builds, on initial incident creation, the priority of the task shown in the process view page does not match the priority of the inicident.  This can also be seen by a review of the My Tasks List report.  All tasks show with a "Normal" priority.

 

This occurs because the priorities are hard-coded for the default list of priorities.  While users can change the priority in Process View, those priorities are not available during initial incident creation.  Also, the ability to use the custom priorities that can be stored in the Application Properties are not available to the initial incident creation process.

 

This is a feature request and will be included in a later release of Servicedesk.

BRING | 21 Aug 2013 | 0 comments

When creating a set of new components based off the Web Service Caller Generator (as shown below),

image001_7.png

Errors can occur if, on the last page of the generator (as shown below), component properties are named with words like “new”, “finally”, “byte”, “interface” etc.

 

image003_8.png

 

Cause:

Many words are reserved  or protected, and may NOT be used in component names and properties.

The list of reserved words that we check for are:

                "abstract",

                "event",

   ...

ohzone - CherylPeterson | 15 Aug 2013 | 0 comments

Never attended a Symantec Vision conference?  We want to know why.  For the first 20 people (10 in the US and 10 in Europe) who sign up and participate in a 30-minute interview before August 22nd, we’ll award you 200 Connect points AND send you a custom Vision Hoodie.  To set-up a time, please click here or email your contact information to vision@symantec.com.

Marcello D'Angelone | 12 Aug 2013 | 0 comments
According to ssd-vs-hdd-report, Windows does not allow a reliable way to collect information about a SSD disks.
However we can identify the SSDs from the Inv_HW_Logical_Device data class.
  
You can copy the following query to create your own report:
 
SELECT
v.[Name] AS [Computer Name],
cs.[Model] AS [Computer Model],
hwl.Model,
ld.[Device ID] as Drive,
CAST((ISNULL(ld.[Size (Bytes)], 0)/(1024 * 1024 * 1024)) AS DECIMAL (10, 2)) AS 'Total Disk Space (GB)',
CAST((ISNULL(ld.[Free Space (Bytes)], 0)/(1024 * 1024 * 1024)) AS DECIMAL (10, 2)) AS 'Free Disk Space (GB)'

FROM vComputer v
INNER JOIN Inv_HW_Logical_Device hwl
ON v.Guid = hwl._ResourceGuid
INNER JOIN vHWComputerSystem...

mmurphy7 | 09 Aug 2013 | 0 comments

In the past 6 months Apple has released 2 Security Updates for their Windows versions of Quicktime and iTunes addressing 52 vulnerabilities. Both of the Apple Security Bulletins released had vulnerabilities that could be used to exploit the rights of the logged on user. Here’s a breakdown of the updates released:

Bulletins 2
Vulnerabilities 52
% of Vulnerabilities with privilege exploits 48%

Apple, unlike Microsoft and other software vendors Arellia has looked at, does not classify their Security Updates. Instead they lump many vulnerabilities into a single security update. Here’s a breakdown of the two security updates and the vulnerabilities with Privilege Exploits:

Security Update Vulnerabilities with Privilege Exploits Total Vulnerabilities
...
mmurphy7 | 09 Aug 2013 | 0 comments

In the past 6 months Adobe has released 16 Security Bulletins addressing 116 vulnerabilities. Of the 16 Adobe Security Bulletins released 81% had vulnerabilities that could be used to exploit the rights of the logged on user. However, if you don’t count the bulletins related to ColdFusion then 100% of the Security Bulletins had vulnerabilities that could be used to exploit user rights. Here’s a breakdown of the Adobe Security Bulletins:

Bulletins 16
Vulnerabilities 116
% of Bulletins with privilege exploits 81.25%
% of Vulnerabilities with privilege exploits 67.24%

Adobe classifies the bulletins as critical, important, moderate, and low. Similar to Microsoft, critical vulnerabilities can run attacker code and install software...

mmurphy7 | 09 Aug 2013 | 0 comments

In the past 6 months Mozilla has released 62 Security Bulletins addressing 88 vulnerabilities. Of the 62 Mozilla Security Bulletins released more than 1 out of every 2 bulletins had vulnerabilities that could be used to exploit the rights of the logged on user. All of the bulletins released affected Mozilla Firefox, which means that any user not keeping up to date with their Firefox browser is in imminent danger unless some privilege management software is in place. Here’s a breakdown of the Mozilla Security Bulletins:

Bulletins 62
Vulnerabilities 88
% of Bulletins with privilege exploits 55%
% of Vulnerabilities with privilege exploits 67%

Mozilla...

mmurphy7 | 09 Aug 2013 | 0 comments

In the past 6 months Microsoft has released 51 Security Bulletins addressing 121 vulnerabilities. Here’s a breakdown of the bulletins and vulnerabilities. Of the 51 Microsoft Security Bulletins released nearly 1 out of every 3 bulletins had vulnerabilities that could be used to exploit the rights of the logged on user.

Bulletins 51
Vulnerabilities 121
% of Bulletins with privilege exploits 35%
% of Vulnerabilities with privilege exploits 34%

Microsoft classifies the bulletins as critical, important, moderate, and low. Vulnerabilities of critical bulletins mean vulnerabilities can be exploited without the user knowing. Vulnerabilities of important bulletins will provide end users some warnings that the exploit is happening, but these...

mmurphy7 | 09 Aug 2013 | 0 comments

One of the most dangerous threats to IT security is abuse of privileged access. Preventing the exploitation of administrator privileges first requires knowledge of who has administrator access whether local or domain based. This is not only good practice, but also driven by many security standards.

One such security compliance standard is the Payment Card Industry Data Security Standard (PCI DSS) which outlines many security requirements to protect consumers’ credit card data. Requirement 8.5.1 states: Control addition, deletion, and modification of user IDs, credentials, and other identifier objects, which clearly identifies the need to monitor and maintain control of the administrators group.

The Center for Internet Security (CIS) releases security configuration guidelines for each Operating System. For Windows 7 section 1.8 defines User Rights and who should have access to certain system capabilities. The key to the user rights defined by CIS is which...