How to exclude Virtual Machine from Intune integration?
I am looking for a way to exclude any virtual machine from the Intune integration.Is there a way to achieve in ETL Transform Map.
Join the #BuildWithBuildAgent Challenge! Get recognized, earn exclusive swag, and inspire the ServiceNow Community with what you can build using Build Agent. Join the Challenge.
I am looking for a way to exclude any virtual machine from the Intune integration.Is there a way to achieve in ETL Transform Map.
I am trying to integrate Service Graph Connector for Cisco Meraki . I have followed the documentation , installed the plugin and followed the guided setup.This is what I have under Meraki in servicenow:I see one data source : After completing the set...
Could you please help me check if step 5 is correct? Because the Name and Description have been updated successfully, only the version has not been updated.
Please send step by step
We are replacing IP based discovery with agent based discovery (ACC-V) and it appears to have broken our discovery of certificates (non URL based certificates). Are others experiencing the same and has anyone resolved the discovery of the certificat...
Hello, when you implement the Service Graph Connector for Intune (or also some other SGC, like Defender). The installed and used Robust Import Set Transformers have a "Transformer Definition" where you have the option to add a 'Before" script to use ...
Hi,We are getting the following error after an upgrade to Yokohama Patch 7 and to Discovery and Service Mapping patterns version 1.28.0. Windows command failure count is 3 and allowable failures is 2. Exiting pattern execution.It is the Windows serv...
Hi everyone,I’m trying to understand the best way to reboot an AWS Work Space through ServiceNow. I have some knowledge that the AWS Service Management Connector is used to integrate AWS services with ServiceNow.However, I’m a bit unclear on the exa...
Service Mapping Implementation (Rome) Steps to complete simulator tasks Pattern Designer > Discovery Patterns, open JBoss Wildfly Pattern - Open the Identification for JBoss WildFly Web Site (war) Identification section - Set Debug Mode to ht...
Hi Team, Any one able to discover the dell unity box successfully? The logical components NAS servers and file shares using CIM or REST?
In the AIX - Active Connections probe, the ECC queue name is "sh ${file:aix_connection.sh}". It is reported that this is a script that is created on the AIX server during probe activities. Our InfoSec team is securitizing every AIX probe and I'm unab...
Hi Folks, I have required to convert emails into tickets, I have created flow to convert and it working as expected, only description is not populating correctly.Here, Email body need to populate in incident description. Mail body coming as table fo...
Hi, Can someone help me understand which domain Cost Centers, Budgets, and Expense Allocation Rules belong to? I’d also love to know if there are any recommended courses or resources to explore these topics in depth. Thanks in advance for your help!....
Hello Community, Identification rule for Linux Server was changed from Hardware rule to Computer Rule.How can I revert this back to Hardware rule.
There is a task in Discovery Fundamentals that involves creating credentials for both Windows and Linux MID Servers. Creating Windows credentials was straightforward because the Windows MID Server was already included in the lab instance. However, I ...
| User | Count |
|---|---|
| 9 | |
| 9 | |
| 6 | |
| 5 | |
| 5 |
