Can’t expand tabs on Adminstrator Daily Summary Report.

I need a solution

Has anyone else had an issue with setting up scheduled reports in 14.2 to be emailed to administrators in an HTML document, and not being able to expand the tabs when the report is opened in the browser? I tried on both Chrome and IE, and cannot expand the tabs on the report in either. I have no problem viewing the report when i generate it inside the SEPM console, and view it there.

0

Related:

  • No Related Posts

Is SEP compatible with Chrome Cleanup tool?

I need a solution

Hi,

Can anyone help me out to see if SEP conflicts with Chrome Cleanup engine which detects and removes unwanted software from hosts. This tool is not a general-purpose AV which only detects the software. However, there is a “Clean up Computer” setting which user can click to scan the computer for  harmful software. Please advise. 

0

1523563724

5240141

Related:

  • No Related Posts

Get Hands-On with Our Latest Open Solutions at OCP Summit

EMC logo


Dell EMC is a strong proponent of open industry standards because we believe customers win with non-proprietary solutions based on open solutions. As part of this commitment, we have participated in the Open Compute Project (OCP) since its inception. The annual OCP Summit, happening this week (March 20-21) at the San Jose Convention Center, brings together more than 3,000 key decision makers that help grow, drive and support the open hardware ecosystem in the data center and beyond. To help drive the adoption of an open ecosystem, our Extreme Scale Infrastructure group will be showcasing two demos at this week’s OCP Summit that highlight our open solutions. Join us in booth B24 in the exposition area to get hands-on with our experts.

 

Open Source RedDrum Redfish Demo

Our latest contribution to the open source community, RedDrum, is a python-based implementation of a Redfish service that includes a recipe for backend integration with OpenBMC. RedDrum allows client system management software to use standard Redfish APIs to access the capabilities provided by OpenBMC.

OpenBMC is an open software framework for a Baseboard Management Controller (BMC) that connects to sensors in a system to read and control environmental conditions (i.e., temperature) and provide other system management functions (i.e., power control, monitoring and logging of CPU and memory).

We will be demonstrating RedDrum working with both a live OpenBMC-based server as well as a backend simulator that is included in our contribution. The simulator will be a valuable tool for developers who need to work on software even when they have limited access to hardware.

The RedDrum contribution shows our continued leadership and commitment to improve developer and interoperability tools to enable the Redfish ecosystem. Read more about RedDrum in our recent Tech Center blog.

 

Virtual Reality: Modular Data Centers and the DSS 9000 Rack Scale Infrastructure

We will also be running a great VR demo that we just debuted at Mobile World Congress.

This experience allows attendees to explore a typical modular data center installation in a virtual space, giving them a realistic sense of how an MDC can fit to their particular IT environment.

The demo features a fully equipped DSS 9000 rack scale infrastructure solution, and attendees will be able to pull out and closely examine each of the DSS 9000’s three sled types.

Customers at Mobile World Congress found this demo to be tremendously informative – and fun!

 

 

How to Find Dell at OCP Summit

Dell EMC will be in Booth B24 in the exposition area. Come by to learn more about open management with RedDrum and to fully experience the latest in Modular Data Center and Rack Scale technology.

You can also follow us on Twitter at @DellEMCservers for news from the show. Share your experience using the and hashtags.



ENCLOSURE:https://blog.dellemc.com/uploads/2018/03/Open-Road-Forest-Wilderness-1000×500.jpg

Update your feed preferences


   

   


   


   

submit to reddit
   

Related:

  • No Related Posts

Troubleshooting: Common Errors for Chromebook Devices Secured by XenMobile

How do I capture the Secure Hub logs?

To capture the Secure Hub logs you will need to open the extensions dev-tools window:

Go to the extensions page: chrome://extensions

Find the checkbox at the top right of the page labeled “Developer mode” and check it.

On the same page, find the Secure Hub extension.

It should now show a link labeled “background page“, clicking on the link will open a popup dev-tools window.

Sample page below

User-added image

Go the tab labeled “Console

All the logs for the extension are captured here.

Sample page below

User-added image

How can I save the logs?

You can either do “Select all” and copy the logs or right click on the window and click “Save as…” to save the logs to a file.

How are network errors logged?

Any network errors are displayed in Red.

Some of the network level errors from other windows (like “Enrollment” window) may not get logged in the background page. To capture the errors, you’ll have to open the dev-tools for that active window instead and look at its console.

Ex: During enrollment if you see “Network error occurred” in the enrollment window, press (Ctrl+Shift+I) to open the dev-tools for the active window. It can also be opened by right clicking anywhere on the window and then clicking on inspect. In the pop-up dev-tools window, click on the “Console” tab to see more logs.

The actual requests and responses exchanged with the server can be monitored on the Network tab of the dev-tools window.

What are some common errors that might be encountered?

Feature Errors:

403: Feature is not available – Error displayed when the chrome feature is not enable on XenMobile Service

Network errors:

Error Cause Resolution / Workaround
net::ERR_NAME_NOT_RESOLVED DNS resolution issue Verify DNS configuration.
net::ERR_INSECURE_RESPONSE This means the Server certificate is invalid. Usually seen with a XenMobile server that does not have a publicly trusted certificate. To workaround this issue, open the https url in the browser, and manually accept the server’s self signed certificate. (i.e. When you see the warning “Your connection is not private”, click on “ADVANCED” and then click on “Proceed to ..(unsafe)”. You should now be able to go back to the extension and continue enrollment.
net::ERR_FAILED This is usually seen in response to a device checkin request. It usually happens in re-enrollments scenarios where the log out and log in operation was not performed Logging out and logging back in, should fix the issue. After re-login, any open dev-tools windows may have to be closed and re-opened to see the logs again.
net::SSL_CLIENT_AUTH_CERT_NEEDED During device check-in a client cert was not sent. This usually points to a missing or incorrect “auto certificate selection” policy on G-Suite. This can be verified by going to chrome://policy on the Chromebook and search for a policy called “AutoSelectCertficateForUrls” and look at its value.

Related:

  • No Related Posts

App Layering Recipe For Google Chrome 2.6 or Later

None.
Unidesk recommends including the OS Type and OS bit level in the name, for Example Google Chrome 31 Win7x32. For versions remember that when choosing a layer you can see the version name but not the version description. Use naming that will allow you to differentiate versions appropriately. For example “1.0 12-12-2013”.
The basic installation steps are straight forward:

  1. Create a Google Chrome application layer
    1. Install Chrome using the offline installer or msi
    2. Note on extensions
    3. Disable Google Updates (optional)
  2. Configure Chrome AD GPO’s
  3. Apply the layer to desired desktops


Step 1 Create a Google Chrome Application Layer

The first step is to install Chrome itself. Download the offline installer from here:

https://support.google.com/chrome/answer/126299?hl=en

Choose the Alternate installer for all user accounts. Then install Chrome. It will install into the “Program Files” directory.

To install extensions please use a GPO http://dev.chromium.org/administrators/policy-list-3#ExtensionInstallForcelist


Disable Updates

There are two ways that can be used to disable Google Updates for Chrome. You can use the enterprise GPOs, see the next section or follow this link to disable via the registry

http://www.chromium.org/administrators/turning-off-auto-updates

or set the value of HKEY_LOCAL_MACHINESOFTWAREPoliciesGoogleUpdateAutoUpdateCheckPeriodMinutes to the REG_DWORD value of “0”.

Step 2 (Optional but recommended) Install and configure the Google Enterprise Active Directory Templates In Order To Manage These Settings

The Goggle Chromium project has created a set of GPO settings that can be used to manage Chrome in an Enterprise Environment.

Here is where you can download the ADM files and see the documentation:

https://support.google.com/installer/answer/146164?hl=en

Once you have the ADM files installed its very easy to configure Chrome settings.

Updates

If you are using a GPO to disable updates just add a version to your layer and open Chrome it will automatically update. If you have used the registry setting to disable updates modify the registry setting to a number other than 0 and open chrome, it will update then you can set the registry entry back to 0. Note: If this doesn’t work for you let me know I was not able to test this in the lab.

Considerations for Non-Persistent Desktops

It is not possible to add custom extensions for a single user with a NP desktop.

Related:

  • No Related Posts

ProxySG – Chrome Download behaviour

I need a solution

Hi All,

In ProxySG, We have configured the rule to block the exe based on the file extension and appreant data type. 

When user went to the google.com/chrome and click download option , they able to install the chrome sucessfully. 

Am wondering how it’s not blocked since it’s excutable fille. I took the policy capture where specific rule is neglected as “n/a”.

Rule :

Soucre              Destination               Action 

Any                   File Type                    Deny

Snippet from Policy Capture:

       <Proxy>
  miss:     category=All_Global_Denied_URL
   n/a:     condition=__CondList1Org_Global_Deny_CD

Thanks in Advance….

0

Related:

  • No Related Posts