Video Screencast Help

Rules

Results for Rules

First, let me admit, I am shocked that a search function does not exist in the console. Now to the problem (there is enough evidence on the Net that this functionality is needed). Problem: Takes a significant amount of time to find a machine in the ...
Idea by Raj Murthy | 24 Feb 2012 | 0 comments
I need a solution Hello, SSIM is reporting incidents for several activities that are considered normal activity in my environment so I'm trying to adjust the rules that are ...
Forum Discussion by csprague | 24 Feb 2012 | 9 comments
I do not need a solution (just sharing information) Does anyone have comments or can someone share their experience with the Display String Settings?  It seems too good to be true or ...
Forum Discussion by EathenR | 22 Feb 2012 | 3 comments
I need a solution Can someone confirm for me what will happen when my AUP expires?  Will I be not allowed to use the current licenses or just not be able to upgrade? I have read ...
Forum Discussion by Harold.Moore | 22 Feb 2012 | 2 comments
I need a solution Please help me on two items, 1. Create an Install Package that only has 'Virus and Spyware Protection' enable. 2. How to update existing SEP clients ...
This issue has been solved
Forum Discussion by cityboy | 22 Feb 2012 | 3 comments
I need a solution Hi, we have the issue that users which are part of a security group in AD needs to be assigned to a resource. e.g. Every User who is allowed to use Outlook via ...
Forum Discussion by Eisenkarl | 22 Feb 2012 | 1 comment
I need a solution We are currently performing a migration from Altiris Deployment Solution 6.9 in favor of SCCM 2007. Is there a safe and efficient way to disable the deployment ...
Forum Discussion by kevinradler | 21 Feb 2012 | 10 comments
I need a solution We run a fleet of Dell 990,960 and 755 computers. Recently we have been piloting Device Control for management of USB devices but I have come across a few issues. When ...
This issue has been solved
Forum Discussion by bozman | 20 Feb 2012 | 10 comments
How to block Unwanted memory Cards In many organizations using USB Stick is allowed as it is their business requirement. However by allowing USB Disk Storage you are allowing lot of Unwanted things too for example users connecting their mobile ...
Article by Vikram Kumar-SA... | 19 Feb 2012 | 7 comments
It is a difficult task for a system administrator or security engineer to determine where exploitable software is installed within their environment. How can they find the exploitable software installed in their environment. Well, Symantec Control ...
Article by Sanehdeep Singh | 18 Feb 2012 | 2 comments