Autodesk Inventor - iLogic - Find and Remove Parts List Overrides

A quick iLogic rule to sniff out and remove any overrides and display the master BOM data in your part list(s) again.

We can’t always guarantee that other Inventor users will follow good practice when creating parts lists in drawings. One really common issue we see is an inexperienced (or deadline haunted) designer manually entering data into a drawing parts list. This results in a broken link between the model data (the master) and the drawing parts list. Bad news.

Many CAD managers will appreciate the ability to quickly highlight issues such as this, so here’s a quick iLogic rule to sniff out any overrides and give the ability to automatically remove the overrides and display the master BOM data in your parts list(s) again.

The iLogic rule checks ALL parts lists in the active drawing and gives the additional option to manually edit the offending parts list if desired. Give your CAD manager a hug.

Download the code here & watch our tutorial below.

Note: the below video was created by Excitech prior to becoming Symetri in January 2021, following its acquisition by Addnode Group. All Excitech products, services and solutions mentioned in this recording are available through Symetri.


How CQi Automates CAD Deployments and Reduces Risk

05 September 2025

In modern Architecture, engineering, construction and design environments, the pressure is on IT teams to deliver fast, consistent, and secure software setups. Whether you're supporting ten users or ten thousand, manual installation methods simply can’t keep up with the demands of large-scale CAD environments. That’s where CQi (Configuration Intelligence)steps in. At Symetri, we developed CQi to help organisations automate CAD deployment, reduce risk, and maintain standardisation—all without increasing the burden on IT departments. In this blog, we’ll explore how CQi works and why it’s becoming a go-to solution for smarter CAD management.

Security Gaps You Didn't Know You Had

26 August 2025

As cybersecurity threats continue to evolve, some of the biggest risks to your organisation might not be obvious. In this month’s IT Bulletin, we shine a light on three critical security concerns that are often underestimated or overlooked entirely. These issues can silently compromise systems, leak data, or be exploited without detection.