Video Screencast Help
Symantec to Separate Into Two Focused, Industry-Leading Technology Companies. Learn more.
Endpoint Management Community Blog
Showing posts in English
Scott Jones | 19 Apr 2007 | 16 comments

We have a winner! (No more submissions, please.) Check out this labor of love for the full details.

Altiris awarded 1,000 Juice Points as a bounty for this commonly requested tool!


Altiris is planning a feature for the next major release of SVS ("AutoCapture") that will allow end users to install their own software without breaking corporate standard apps. AutoCapture will also give IT the ability to make this personal stuff go away cleanly if they need to.

Two new things need to be done to support AutoCapture. First, a service needs to be built that reliably recognizes installation processes run from anywhere (including the Web) and triggers the SVS capture function to create a new layer. Also, SVS needs to be...

erikw | 18 Apr 2007 | 1 comment

Have you ever wanted to check what your security level is on you own PC? I found an Altiris link that gives you the ability to scan some rules.

Click to view.

Go to:, mark the rule the you wish to use, and click "Begin Audit".

The following message will appear:

Click to view.

Click yes to accept the message,...

riva11 | 18 Apr 2007 | 15 comments

I've found a very cool freeware tool called "SteelSonic Run-As". It allows you to create standalone .exe files with administrative permissions. This .exe file allows computers to run as a standard user with admin privileges. The best thing is that can you do this without giving the computer user any administrator privileges.


Sometimes you need to install or execute programs without provide administrator rights to anyone. Imagine that you need to install some program without having access to the high level tools that would normally help you do this job?

For example, you can install Microsoft Office only using this tool by simply creating a .exe program that points to the setup stored on a software storage server and recording the admin/password information. After setting things up, you send this .exe program to the end user and he will be able to run this program without asking anyone to (with administrator priviliges) to perform the installation....

Admin | 17 Apr 2007 | 0 comments

A few days ago we added a new content type to the Juice called "heads up!" These posts feature beta and release announcements and links to articles of interest that don't live in the community.

It's hard to believe, I know, but we have found useful content that doesn't live on the Juice. Go figure.

So, if you find an amazing tutorial or article that explains how to get more out of your Altiris investment, stop. Don't pilfer or plagiarize. Post a "heads up!"

It's quick. It's easy. It'll earn you 25 points *and* keep you out of prison.

Please keep in mind that we all have our own opinions about what's "useful information". What looks (to you) like an amazing tutorial might not look the same to us.... We reserve the right to disagree, and delete.

Wow, that was harsh.

Admin | 17 Apr 2007 | 11 comments

One of the fun things about the ManageFusion conferences are the sometimes crazy, always hilarious video clips created by the Marketing team.

In this clip, the creative team explores the ability of Altiris and Symantec to "blend".

Tune in to hear Tom Dickson (of fame) utter the immortal words that turned him into an overnight sensation and YouTube celebrity, "Will it blend? That is the question."

saurabhshrivastava | 17 Apr 2007 | 2 comments

The Problem:
After upgrading Application Metering Solution from version 6.0.1024 to version 6.1.26, the Application Metering upgrade task fails.

Before upgrading the Agents, you should uninstall Application Metering Agent 6.0.1024 on all the computers using the command line (this silently removes the agent):

AMAgent.exe -s -a /s /oRemove

Then, enable the Install/Upgrade Application Metering Agent task.

trb48 | 17 Apr 2007 | 1 comment

There are thousands of settings that system admins need to set to create a good image. I ran across a resource that simply explains some Vista system settings that all admins should take into account while building an image.

Here is the link:
Vista Tips, Microsoft Windows Vista Guide

erikw | 17 Apr 2007 | 4 comments

A day out of the life of a System consultant. Today a customer called me, and he explained to me that his Deployment Solution was not functioning anymore.

First question I asked: Have you done anything on the server?

Answer: No, I only installed the new patches and Microsoft updates.

I got in my car and drove to the customer to see what was happening.

When a client booted into PXE boot and tried to connect to the express share, there was a statement that the password was invalid.

Entering the password gave an invalid disk error, and the machine rebooted....

Admin | 16 Apr 2007 | 1 comment

Realtime Publishers has just released chapter 10 of the Altiris-sponsored "Definitive Guide to Service-Oriented Systems Management". This chapter is focused exclusively on how risk management relates to system security. Get the download now to learn more about the goal of risk management: to understand the breadth of risks facing an organization and to formulate strategies for mitigating those risks to the greatest extent possible.


You can download Chapter 10 here.

Chapter 10: Managing Risk in Information Systems

  • The Practice of Risk Analysis
    • Identify Information Assets and Threats
      • Servers and Client Devices
      • Network Devices
      • Databases
      • Application Code...
nhundal | 16 Apr 2007 | 0 comments

The art of converting a legacy installation into a Windows installer package is known to many. And accepting the vendor repackaging tool's output, a standard practice. While we can create an msi package through the reverse engineering process of repackaging, we are often content with making sure the application works and passes the user acceptance test. But is that enough to ensure that the msi package is foul proof?

The multiple auto-repair of Windows installer and breaking of applications in a locked down environment are some of the issues facing system administrators today that would suggest otherwise. Read the Complete Article at