Yearly archives: 2013

17 posts

LANDesk 9.5 SP1 Inventory Scan Missing 32-bit Applications from Add or Remove Programs Inventory

LANDesk 9.5 SP1 Inventory Scan Missing 32-bit Applications from Add or Remove Programs Inventory

So you have upgraded your LDMS Core and Agents to 9.5 SP1. Everything looks tickety boo and you notice some of your software queries are not working anymore. Upon further investigation you notice that you are missing applications in “add and remove programs” in your software inventory. The ldiscn32.exe packaged in SP1 […]

AppSense Environment Manager Event IDs

AppSense Environment Manager Event IDs

AppSense DesktopNow offers the tech heads among us a wide range of Event IDs that can be generated from the endpoint CCA (Client Communications Agent). Some are classed as “High Priority Events”. These are non configurable and are sent direct to the AMC (AppSense Managment Centre) database via HTTP from the […]

How to Personalize Microsoft Office 2010 with AppSense

How to Personalize Microsoft Office 2010 with AppSense

Microsoft Office 2010 can be personalised with AppSense Environment Manager. AppSense have a “Best Practice” guide which is available from www.myappsense.com. The guys did a good job with it and we used it as a baseline. Most of the information here is reflected in the guide but, and please don’t drag […]

Personalize Adobe Reader with AppSense

Personalize Adobe Reader with AppSense

Adobe Reader can be personalized using AppSense Environment Manager. Here are some simple steps to create a new User Application for Adobe Reader in the Environment Manager Console and a tip to keep your SQL admins happy. By default acrord32.exe is in the default blacklist for monitored applications (thanks Bryan @techbury […]

Leveraging Location Based Conditions with the Registry in AppSense Environment Manager

Leveraging OU Membership Conditions with the Registry in AppSense Environment Manager

So I have quickly learned that I can satisfy a lot of my “membership” conditional triggers by referencing a registry key rather than looking up the Active Directory. This is especially useful on “Computer-Start-up” triggers. In my experience, when the computer boots, the network is not always ready by the […]