Automating Microsoft System Center Service Manager 2010 Portal Activex Control

Automating Microsoft System Center Service Manager 2010 Portal Activex Control

One of the client side requirements for access to the System Center Service Manager 2010 Self-Service Portal is the “Microsoft System Center Service Manager Portal ActiveX Control.” This control is required for your end users to navigate to your Microsoft System Center Service Manager Portal. That being said a best practice to leverage distribution the control is the application of a group policy object. This provides the ability to automatically distribute the control domain wide, as well as filter who receives the control.

Using the Group Policy Management feature create a new Group Policy Object that is Link Enabled and Enforced. I the example below the name “Install SCSM Portal Software” has been applied. As you can see the object is Enforced and Link Enabled.

Now the group policy object needs to be edited with the Group Policy Management Editor. Navigate to \Computer Configuration\Policies\software Settings in the Group Policy Management Editor. Right click the Software installation icon and select New\Packackage. Browse, and then navigate to the PortalClient.msi location selecting the .msi. In this example, the location is \\secondsite\scomsoftware\Portal.msi “. Choose Assigned for the deployment method, if no modifications to the .msi are required.

One of the best methods to ensure the policy has been applied is to run GPRESULT /H .HTML on the client. This will use IE to return results for the systems new policy.

Share:

Facebook
Twitter
LinkedIn
Picture of Matt Tinney

Matt Tinney

Professional IT executive & business leader having decades of experience with Microsoft technologies delivering modern-day cloud & security solutions.

Contact Us

=
On Key

More Posts

WME Cybersecurity Briefings No. 024
Cyber Security

WME Security Briefing 28 August 2024

GhostWrite Vulnerability in T-Head CPUs Exposes Devices to Unrestricted Access Overview A critical architectural flaw in T-Head’s XuanTie C910 and C920 RISC-V CPUs was uncovered by recent research from the CISPA Helmholtz Center for Information Security. Dubbed GhostWrite, the vulnerability

Click Here to Read Full Article »
Be assured of everything

Get WME Services

Stay ahead of the competition with our Professional IT offerings.

=