Prior to downloading this Software, you must review the Software Transaction Agreement located here and confirm, by clicking the I agree check box below, that your organization accepts and is bound by the terms and conditions of the Software Transaction Agreement for this Software.
If you purchased the licenses for this Software by executing an order form with Quest or if you have an agreement with Quest that states that all purchases are governed by such agreement, then the terms and conditions of that agreement supersedes and takes precedence over the Software Transaction Agreement.
In version 10.1 the ability to prevent users from adding attachments to Service Desk queues was added. Starting in this release, appliance administrators can specify ticket attachments restrictions, as applicable. These restrictions can be configured through the Queue Detail page Service Desk | Configuration | Queues | Name of Queue.
This article addresses the status of the KACE SMA and KACE SDA Appliances in regards to the Apache HTTP Server vulnerabilities identified under:CVE-2021-44790: Possible buffer overflow when parsing multipart content in mod_lua of Apache HTTP Server 2.4.51 and earlierCVE-2021-44224: Possible NULL dereference or SSRF in forward proxy configurations in Apache HTTP Server 2.4.51 and earlierFor more de...
Each asset with the exception of locations can be assigned an asset status to determine its use or purpose, this would be especially useful when there's a compliance or reporting need of assets, since they can be filtered out this way.
This article addresses the status of the KACE SMA and KACE SDA Appliances in regards to the Apache Log4j2 Zero-Day exploit identified under CVE-2021-44228. For more details regarding the Apache Log4j2 vulnerability, refer to Fixed in Log4j 2.15.0 section of the Apache Log4j Security Vulnerabilities page.
After deploying KACE Systems Management Appliance agent using KACE Systems Deployment Appliance post-installation tasks the agent will not check-in the KACE SMA, and will not appear on the Device list, even when using a valid Token.
This article addresses the status of the KACE SMA and KACE SDA Appliances in regards to the Apache HTTP Server vulnerabilities identified under:CVE-2021-44790: Possible buffer overflow when parsing multipart content in mod_lua of Apache HTTP Server 2.4.51 and earlierCVE-2021-44224: Possible NULL dereference or SSRF in forward proxy configurations in Apache HTTP Server 2.4.51 and earlierFor more de...