Solved

acrobat software

Posted on 2013-06-18
3
211 Views
Last Modified: 2013-07-04
how to track , installed acrobat professional on network ...
0
Comment
Question by:techp
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 17

Expert Comment

by:selvol
ID: 39257624
Track?  as in? Forms?  
Understanding Acrobat Tracker for Forms?
If not please be specific.

http://tv.adobe.com/watch/acrobat-tips-and-tricks/understanding-acrobat-tracker-for-forms/

Selvol
0
 

Author Comment

by:techp
ID: 39257673
hello selvol ,

 like license manager , how many users are using and on which computers....need to track get period report
0
 
LVL 55

Accepted Solution

by:
McKnife earned 500 total points
ID: 39258087
Adobe does not offer anything to achieve this. I can only think of this: deploy Audit settings on acrobat.exe using GPOs, activate auditing for file system objects on the clients (as well per GPO) and (GPO-) deploy a scheduled task to each client that triggers a mail with a certain subject line like "computername, time, day" and send it to some special account. The inbox will be your monitoring tool.
0

Featured Post

On Demand Webinar: Networking for the Cloud Era

Did you know SD-WANs can improve network connectivity? Check out this webinar to learn how an SD-WAN simplified, one-click tool can help you migrate and manage data in the cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Update 21-May-2015: I temporarily removed the source code to make major changes to the program. Regards, Joe INTRODUCTION This article presents a solution to a question (http://www.experts-exchange.com/Programming/Installation/Q_28396542.html)…
It’s been over a month into 2017, and there is already a sophisticated Gmail phishing email making it rounds. New techniques and tactics, have given hackers a way to authentically impersonate your contacts.How it Works The attack works by targeti…
In this fifth video of the Xpdf series, we discuss and demonstrate the PDFdetach utility, which is able to list and, more importantly, extract attachments that are embedded in PDF files. It does this via a command line interface, making it suitable …
In this sixth video of the Xpdf series, we discuss and demonstrate the PDFtoPNG utility, which converts a multi-page PDF file to separate color, grayscale, or monochrome PNG files, creating one PNG file for each page in the PDF. It does this via a c…

617 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question