Netdiag Commands
troubleshoot network issues using Netdiag commands with QUEST SDA and QUEST SMA
troubleshoot network issues using Netdiag commands with QUEST SDA and QUEST SMA
This guide explains how to create an SMA label for workstations installed via SDA and set up a dynamic label based on the installation date. It involves using a custom inventory rule in the Dell KACE system to manage application installations effectively post-imaging.
Guide on how to configure and update passwords for reports in multiple organizations, including navigation tips and a step-by-step process
This detailed guide explores configuring the KACE SMA HelpDesk module, focusing on setting up SMTP and POP3 servers, categorizing tickets, and managing user interactions through emails. It includes instructions for optimizing ticket assignment and categorization to streamline support processes.
This article explores three methods to utilize scripts in SMA, including running scripts from a network path, copying scripts locally, and executing pre-existing executables. It offers practical examples like retrieving user profile sizes and HDD information, illustrating the use of VBS scripts and KACE system variables for efficient management and automation.
This article provides a detailed guide on setting up SMA and SDA relays on a PC using VMware. It covers installing ESXi, creating and configuring virtual machines for the relays, setting up Samba, and configuring replication tasks to ensure seamless operation at remote sites.
This guide provides step-by-step instructions on setting up remote access via UltraVNC and Windows Remote Assistance. It includes configuring Internet Explorer for VNC, managing deployments, and customizing settings for optimal security and functionality within corporate environments.
This article provides a detailed guide on managing application deployments with KACE SMA. It covers creating installation packages, associating sources, and distributing applications using the software catalog and inventory features. The guide includes examples for Google Chrome and Notepad++.
This article provides detailed instructions on managing Windows release changes using the KACE Systems Management Appliance (SMA). It covers key steps such as downloading patches, scheduling, and deploying updates to ensure a seamless upgrade process for Windows 10 and Windows 11 workstations.
This article provides detailed instructions on managing and controlling licenses with KACE Systems Management Appliance (SMA). It covers workstation configuration using manual and dynamic labels, application control, software catalog usage, measuring application usage, blocking applications, and ensuring license compliance.
This content provides detailed instructions for managing and monitoring the TPM chip and BitLocker encryption status using Systems Management Appliance (SMA). It includes steps for creating labels, activating BitLocker, and associating specific software applications for enhanced security and inventory management.
This guide details the integration of Active Directory users into KACE, focusing on role creation, LDAP configuration, and user import. It provides practical steps for efficient user management and system security, including label creation for users and computers, enhancing organizational workflows within KACE.
This article provides detailed instructions for configuring and installing a remote relay with KACE SMA. It covers prerequisites, creating labels for remote IPs, setting up replication, and ensuring proper configuration to avoid bandwidth saturation.
This article provides a guide for creating a custom inventory rule in Quest SMA to identify devices with low battery levels. It includes the specific command needed to retrieve the battery charge status using ShellCommandTextReturn and wmic.
This article provides a guide for creating a custom inventory in Quest SMA based on registry keys. It covers scenarios for 32-bit and 64-bit systems, creating new software inventory entries, verifying functionality, and automatically creating registry keys using scripts or installers.
This article provides a guide on enabling and configuring server monitoring in Quest SMA. It covers setting up monitoring parameters, modifying profiles, creating maintenance windows, and handling alerts to ensure effective log monitoring and server management with the Quest KACE SMA Systems Management Appliance.
This guide provides detailed steps for installing and configuring Quest SMA appliances, including network setup, agent deployment, backup configuration, firewall settings, and creating custom inventory based on registry keys. It covers both virtual and physical appliances, ensuring a comprehensive setup.
This article provides a comprehensive guide on managing and deploying patches using KACE SMA, covering subscription management, download scheduling, and the creation of dynamic and static labels for efficient patch detection and deployment. Ideal for ensuring patch compliance and automating IT processes.
This article provides a detailed guide on integrating KACE Cloud MDM inventory into SMA, including steps to retrieve and regenerate the security key, add the tenant name, and schedule and execute tasks for seamless mobile device management and inventory integration.
This article details the differences between QUEST SMA URLs and their specific uses for administration, tutorials, documentation, and user access. It provides a clear understanding of the various interfaces available to optimize SMA appliance management.
Ce guide explique comment activer l’accès aux appareils mobiles pour les utilisateurs, configurer les autorisations nécessaires, et installer l’application KACE Go Client sur Android et iPhone pour accéder aux tickets et déploiements via le smartphone.
This article provides a step-by-step guide on how to configure external read-only access to the KACE SMA database, including detailed settings and tools like MySQL Workbench and iReport for effective database management and monitoring.
This article provides a step-by-step guide for manually updating the KACE SMA Appliance. It covers downloading kbin files, updating the appliance, validating the update, and updating KACE agents. Emphasis is placed on performing a backup before starting the update process.
This article outlines steps to optimize the KACE SMA database by reducing its size. It includes important precautions like verifying and backing up the appliance before deleting the history of agents to manage the database limit effectively.
This article provides a detailed guide on configuring Microsoft Exchange 2013 for optimal email flow with KACE K1000. It includes steps for setting up both receive and send connectors, with emphasis on enabling anonymous connections and detailed tab-wise configurations illustrated through screenshots.
This article provides detailed specifications for managing logos within the SMA interface, including acceptable formats, precise dimensions for different uses such as user portals, reports, and agent alerts, and instructions for replacing the Dell logo.
This guide explains how to check the HP warranty date using the SMA interface. It details the steps to enable and use the CSS API through the HP Developers site, including creating an application and integrating it with the SMA system for warranty management.
This article discusses challenges associated with using the 32-bit KACE agent on 64-bit systems. It outlines how to use sysnative commands like cmd.exe, msiexec.exe, and cscript.exe to accurately modify registry settings, exemplified through a practical script snippet.
This article explains how to manage applications larger than 2 GB using the K1000 appliance. It provides a step-by-step guide on using the clientdrop share to handle zip files that cannot be directly attached through the QUEST web console.
This article describes how to use the command line to force inventory updates during application deployments with Dell Kace. It highlights a now-native feature that eliminates the need for manual inventory forcing.
This article explains how to resolve access issues to SMB shares caused by security policies. It details the process of disabling guest access in the security settings to enhance system security and prevent unauthorized access.