What's new in Symantec Installation Manager (SIM) in ITMS 7.5 SP1 or later
ObjectiveThis article discusses the feature summary, background and reason for the new features, and any requirements and pre-requisites for Symantec Installation Manager (SIM) that is released along...
View ArticleFallback Imaging II: Mapped Drive Imaging with Deployment Solution 7.5
This is for using a standalone Ghost boot package to take and deploy images across a network using drive mapping using the tools found in Deployment Solution 7.5. This is a method that bypasses the...
View ArticleFallback Imaging III: USB-connected Imaging with Deployment Solution 7.5
An imaging admin may at times encounter a situation where the use of a network at all is not possible, or not desirable. Many organi8zation may have network usage restrictions, or there might be a...
View ArticleCSharp essentials: generating a sha256 directory hash
Evey know and then it is useful to build up a quick tool to provide a feature that is not available (why, oh why?) by default in Windows. Today I need to be able to hash a full directory in order to...
View ArticleT-SQL to Quickly Grab Aggregate Altiris Monthly Data
Every now and then, it's nice to have metrics. So today I’m going to illustrate how simple trends can be divined from a few standard metrics that we can find in our Altiris databases. Metrics are...
View ArticleNetwork Discovery and Agentless Inventory 7.1, 7.5 Best Practices and...
IntroductionNetwork Discovery and ComputersCredential Management Troubleshooting TipsPluggable Protocol Architecture Troubleshooting TipsInitial Network Discovery Considerations...
View ArticleNetwork Discovery and Agentless Inventory 7.1, 7.5 Best Practices and...
Device Classifications Troubleshooting TipsAdvanced SettingsDiscovery Engine Main Engine Port Scan Master Browse List PPA Connection Profile ICMP SNMP...
View ArticleNetwork Discovery and Agentless Inventory 7.1, 7.5 Best Practices and...
Network Discovery Task Considerations Task Results Discovered Devices Reports Resource ManagerNetwork Discovery TaskAfter all the preliminary work is done, it is simple to run a Network...
View ArticleNetwork Discovery and Agentless Inventory 7.1, 7.5 Best Practices and...
MIB Imports Troubleshooting TipsSNMP Data Mapping Tables Troubleshooting TipsAgentless Inventory Task Troubleshooting TipsTroubleshooting SNMPutilg.exeConclusionNetwork Discovery to...
View ArticleActivity Center is Missing the "Identification" Section for Some Computer...
In some cases, the Activity Center in the NS/SMP console does not show an "Identification" section for computer resources. The reason for this is that the Identification section is currently...
View ArticleIdentifying Unix, Linux and Mac computers affected by the Bash Shell Shock Bug
Symantec has created the following process to identify Unix, Linux and Mac (ULM) computers that are vulnerable to the Bash Shell Shock bug.DescriptionThe process uses a custom inventory script that can...
View ArticleUsing Ghost To Capture Windows 8.1 update 1 Images
This article is intended to give a reliable method for using Ghost to capture Windows 8.1 update 1 images for deployment. Currently, Ghost has difficulty with Apps. Apps in Windows 8.1 refer...
View ArticleJob Parameterisation in DS6.9
Contents1. Introduction2. Why Did I Come Up With This?3. Implementing Job Parameters in DS6.9 3.1. Preparing your Deployment Server for Job Parameters 3.2. Preparing your Deployment Server for...
View ArticleInventory Database Schema 7.5, Part 1 - Basic Inventory
Understanding the schema for Basic Inventory in 7.5 is very useful when creating reports. Since Basic Inventory contains generally valuable information, it is essential for creating custom reports that...
View ArticleInventory Database Schema 7.5, Part 2 - Hardware
In Part 2 the Hardware data classes are covered. Whether you need to create a custom report, or a custom computer filter based on Inventory Data in Inventory Solution 7.5, knowing the database schema...
View ArticleInventory Database Schema 7.5, Part 3 - Operation System
In Part 3 the Operating System Data Classes are covered. Whether you need to create a custom report, or a custom computer filter based on Inventory Data in Inventory Solution 7.5, knowing the database...
View ArticleInventory Database Schema 7.5, Part 4 - Software and User
In Part 4 the Software and User Inventory data classes are covered. Whether you need to create a custom report, or a custom computer filter based on Inventory Data in Inventory Solution 7.5, knowing...
View ArticleInventory Database Schema 7.5, Part 5 - Network Devices
Part 5 covers Network Device data. Whether you need to create a custom report, or a custom computer filter based on Inventory Data in Inventory Solution 7.5, knowing the database schema is important....
View ArticleInventory Database Schema 7.5, Part 6 - Inventory Pack for Servers Virtual...
This is Part 6 of a 7 part article series detailing the data classes for Inventory, including Inventory Pack for Servers 7.5, providing administrators the knowledge they need to report on the newly...
View ArticleInventory Database Schema 7.5, Part 7 - Inventory Pack for Servers Database...
This is Part 7 of a 7 part article series detailing the data classes for Inventory, including Inventory Pack for Servers 7.5, providing administrators the knowledge they need to report on the newly...
View Article