There a multiple options to report which computers are affected by the vulnerability. Option: Use Custom Inventory to report on the affected Computers - Symantec created a KB with a Custom Inventory Script that can be used.Option: Use the Build-in Inventory File Scan to report on the affected ComputersIn the SMP Console navigate to Manage … Weiterlesen How to find Dell Security vulnerability Dbutil_2_3.sys using Symantec Inventory Solution
Autor: jbedrech
OS Deployment with OSDCloud and Symantec Client Management Suite
When looking at modern Client Management Solutions nearly everything is cloud-driven. So the question is, is it necessary to replace your traditional Management Solution with a modern Management Solution? The answer to this question depends on multiple factors and there is no simple answer like "yes" or "no". In this blogpost we are looking on … Weiterlesen OS Deployment with OSDCloud and Symantec Client Management Suite
Symantec Asset Management 8.6 Issue
When you upgrade to 8.6 with Asset Management installed you may see this issue after the upgrade or a new installation In the SMP Console -> Manage -> Computers -> right click on a Computer -> click Edit You may see a new Dataclass appearing called AeX Network Adapter or when navigating to Home ->Service … Weiterlesen Symantec Asset Management 8.6 Issue
Endpoint Management User Group – April 2021
Register today for the next Endpoint Management User Group on April 14, 2021. There are two sessions that day – one for Europe and one for North America so when you register select the one that works best for your time zone! Register today to find out what’s new in ITMS and GSS and what … Weiterlesen Endpoint Management User Group – April 2021
What´s New in ITMS 8.6 Release (Blackbird)
The following new features are introduced in Task Management: Ability to not show task information to the end users in the Symantec Management Agent user interface. This option can be configured in one of the following ways: In the Advanced Options of a task, or a job you can hide a single task or a … Weiterlesen What´s New in ITMS 8.6 Release (Blackbird)
Feature Request: OS Deployment through the Internet Gateway (CEM) using USB Thumb Drive
During the last month, we are receiving multiple requests to allow the installation of an Operating System using a USB Thumb Drive over the Cloud. So I asked myself why not using Symantec Deployment Solution to accomplish this task? Short answer: Currently this is not implemented in the product. Long answer: Symantec / Broadcom doesn´t … Weiterlesen Feature Request: OS Deployment through the Internet Gateway (CEM) using USB Thumb Drive
Extended Patch Management Support
There are two new products in the price book for Endpoint Management Products (EPM) called "Extended Patch Management Support, Windows Server 2008 for 2021" and "Extended Patch Management Support, Windows 7 for 2021". These new SKUs enable customers to use an enhanced patch management data feed that includes metadata for extended support updates released by … Weiterlesen Extended Patch Management Support
Symantec Virtual User Group – Endpoint Management
Symantec hosts a Virtual User Group for Endpoint Management on 17th of November 2020 If you want to attend please register here. Agenda Endpoint Management within Symantec, A Division of Broadcom with Mike GrueberSymantec Endpoint Management Today with Jim BroniecThe IT team is critical to many companies’ approach to endpoint management, and may be utilizing any … Weiterlesen Symantec Virtual User Group – Endpoint Management
Quick tip: Symantec ITMS 8.5 RU3 and 8.5 RU4 Agent Push
When accessing the Symantec Management Console always make sure you are using a supported Browser. If not you see the following error when accessing the SMP Console ->Actions ->Agent/Plug-ins ->Push Symantec Management Agent -> Default Settings -> Push Install Settings -> provide credentials an click OK Failed to process web request: .....Invalid length for a … Weiterlesen Quick tip: Symantec ITMS 8.5 RU3 and 8.5 RU4 Agent Push
How to securely map a Drive for Deployment Server 7.x / 8.0 / 8.1 and 8.5 – Part II
Part 2: How to use loginw in a run script task There are multiple ways of using the generated .pwl File in scripts. I will show you how you could use it in two examples. The First example is a very simple one. The second example is a little bit more complex but it allows … Weiterlesen How to securely map a Drive for Deployment Server 7.x / 8.0 / 8.1 and 8.5 – Part II