Job Management Partner 1/Client Security Control Description, User's Guide and Operator's Guide

[Contents][Glossary][Index][Back][Next]


Preface

This manual explains how to set up and operate a system that manages client security. Such a system is referred to in this manual as a client security control system.

A client security control system consists of the following program products:

This manual primarily explains the functionality for Job Management Partner 1/Client Security Control. It also gives an overview of a client security control system, and explains linkages to other JP1 products and network control products. Read this manual before setting up a client security control system. In this manual, Job Management Partner 1 is abbreviated to JP1. Hereafter in this manual, Job Management Partner 1/Asset Information Manager is referred to as Asset Information Manager or AIM.

Intended readers

This manual is intended for administrators installing JP1/Client Security Control, and setting up and operating a client security control system.

Administrators are assumed to be familiar with the following:

Organization of this manual

This manual consists of the following parts:

PART 1. Overview
This part describes the features of a client security control system and typical ways in which it may be used.

PART 2. Functionality
This part describes the functionality and system configuration of a client security control system.

PART 3. System Design and Setup
This part describes factors to consider and the tasks involved from installation to operation of a client security control system. It also describes how to install and set up each program product, and how to edit security policies.

PART 4. System Operation
This part describes how to operate a client security control system. It explains how to manage inventory information, monitor clients, handle security risks, conduct security audits, and link with JP1/Integrated Manager.

PART 5. Quarantine Systems
This part describes the quarantine systems that can be implemented by linking JP1/Client Security Control with various program products.

PART 6. Reference
This part describes the commands, definition files, and output messages of JP1/Client Security Control, and how to deal with any problems that may arise during the operation of your client security control system.

Related publications

The following manuals are related to this manual. Read them as necessary.

For more information about how to set up and operate integrated asset management:

For more information about how to set up and operate software distribution and inventory management:

For more information about JP1/IM linkage:

For more information about quarantine systems linked with JP1/Network Monitor:

Conventions: Abbreviations for product names

This manual uses the following abbreviations for product names:

Abbreviation Full name or meaning
Active Directory Active Directory(R)
AIM Asset Information Manager Job Management Partner 1/Asset Information Manager
Asset Information Manager Subset Component of
JP1/Software Distribution Manager
Asset Information Manager Subset Component of
Job Management Partner 1/Software Distribution Manager
AMT Intel Active Management Technology
IE or Microsoft Internet Explorer Microsoft(R) Internet Explorer(R)
Windows(R) Internet Explorer(R)
JP1/CSC JP1/CSC - Agent Job Management Partner 1/Client Security Control - Agent
JP1/CSC - Manager Job Management Partner 1/Client Security Control - Manager
JP1/CSC - Manager Remote Option Job Management Partner 1/Client Security Control - Manager Remote Option
JP1/IM JP1/IM - Manager Job Management Partner 1/Integrated Management - Manager
JP1/IM - View Job Management Partner 1/Integrated Management - View
JP1/NM JP1/NM Job Management Partner 1/Network Monitor
JP1/NM - Manager Job Management Partner 1/Network Monitor - Manager
JP1/Software Distribution JP1/Software Distribution Client Job Management Partner 1/Software Distribution Client
JP1/Software Distribution Client (relay system) Job Management Partner 1/Software Distribution Client(relay system)
JP1/Software Distribution Manager Job Management Partner 1/Software Distribution Manager
JP1/Software Distribution SubManager Job Management Partner 1/Software Distribution SubManager
MBSA Microsoft(R) Baseline Security Analyzer
Microsoft IAS Microsoft(R) Internet Authentication Service
Microsoft Internet Information Services Microsoft(R) Internet Information Services
Microsoft Software Update Services Microsoft(R) Software Update Services
MSCS or Microsoft Cluster Server Microsoft(R) Cluster Server
NetMonitor NetMonitor Job Management Partner 1/CSC - Network Monitor
NetMonitor/Manager Job Management Partner 1/CSC - Network Monitor Manager
UNIX UNIX(R)
Windows 2000# Windows 2000 Advanced Server Microsoft(R) Windows(R) 2000 Advanced Server Operating System
Windows 2000 Server Microsoft(R) Windows(R) 2000 Server Operating System
Windows 7# Microsoft(R) Windows(R) 7 Enterprise
Microsoft(R) Windows(R) 7 Professional
Microsoft(R) Windows(R) 7 Ultimate
Windows 95# Microsoft(R) Windows(R) 95 Operating System
Windows 98# Microsoft(R) Windows(R) 98 Operating System
Windows Me# Microsoft(R) Windows(R) Millennium Edition Operating System
Windows NT# Windows NT Server Microsoft(R) Windows NT(R) Server Network Operating System Version 4.0
Windows NT Workstation Microsoft(R) Windows NT(R) Workstation Operating System Version 4.0
Windows Server 2003# Windows Server 2003 Windows Server 2003, Enterprise Edition Microsoft(R) Windows Server(R) 2003, Enterprise Edition
Windows Server 2003, Standard Edition Microsoft(R) Windows Server(R) 2003, Standard Edition
Windows Server 2003(x64) Windows Server 2003, Enterprise x64 Edition Microsoft(R) Windows Server(R) 2003, Enterprise x64 Edition
Windows Server 2003, Standard x64 Edition Microsoft(R) Windows Server(R) 2003, Standard x64 Edition
Windows Server 2008# Windows Server 2008 Datacenter Microsoft(R) Windows Server(R) 2008 Datacenter
Microsoft(R) Windows Server(R) 2008 R2 Datacenter
Windows Server 2008 Enterprise Microsoft(R) Windows Server(R) 2008 Enterprise
Microsoft(R) Windows Server(R) 2008 R2 Enterprise
Windows Server 2008 Standard Microsoft(R) Windows Server(R) 2008 Standard
Microsoft(R) Windows Server(R) 2008 R2 Standard
Windows Vista# Windows Vista Business Microsoft(R) Windows Vista(R) Business
Windows Vista Enterprise Microsoft(R) Windows Vista(R) Enterprise
Windows Vista Ultimate Microsoft(R) Windows Vista(R) Ultimate
Windows XP# Windows XP Home Edition Microsoft(R) Windows(R) XP Home Edition Operating System
Windows XP Professional Microsoft(R) Windows(R) XP Professional Operating System
WUA Windows(R) Update Agent

#
Windows 7, Windows Server 2008, Windows Vista, Windows Server 2003, Windows XP, Windows 2000, Windows NT, Windows Me, Windows 98, and Windows 95 are referred to collectively as Windows when there are no functional differences between the operating systems.

Conventions: Acronyms

This manual also uses the following acronyms:

Acronym Full name or meaning
API Application Program Interface
BCC Blind Carbon Copy
CSV Comma Separated Value
DHCP Dynamic Host Configuration Protocol
EAP Extensible Authentication Protocol
FD Floppy Disc
IEEE Institute of Electrical and Electronics Engineers
IP Internet Protocol
IPv4 Internet Protocol Version 4
IT Information Technology
LAN Local Area Network
MAC Media Access Control
OS Operating System
PC Personal Computer
PDCA Plan Do Check Action
RADIUS Remote Authentication Dial In User Service
SMTP Simple Mail Transfer Protocol
TCP/IP Transmission Control Protocol/Internet Protocol
URL Uniform Resource Locator
VLAN Virtual Local Area Network
WAN Wide Area Network
WWW World Wide Web

Conventions: Date and time notation used in this manual

The following table gives definitions of the date and time format used in this manual.

Notation Definition
YYYY/MM/DD or YYYYMMDD Date expressed as year, month, and day (YYYY: year; MM: month; DD: day)
hh:mm:ss Time expressed as hour, minute, and second (hh: hour; mm: minute; ss: second)
YYYYMMDDhhmmssnnn or YYYYMMDDhhmmss.nnn Date and time expressed as year, month, day, hour, minute, second, and millisecond (YYYY: year; MM: month; DD: day; hh: hour; mm: minute; ss: second; nnn: millisecond)

Conventions: Diagrams

This manual uses the following conventions in diagrams:

[Figure]

Conventions: Fonts and symbols

The following table explains the fonts used in this manual:

Font Convention
Bold Bold type indicates text on a window, other than the window title. Such text includes menus, menu options, buttons, radio box options, or explanatory labels. For example:
  • From the File menu, choose Open.
  • Click the Cancel button.
  • In the Enter name entry box, type your name.
Italics Italics are used to indicate a placeholder for some actual text to be provided by the user or system. For example:
  • Write the command as follows:
    copy source-file target-file
  • The following message appears:
    A file was not found. (file = file-name)
Italics are also used for emphasis. For example:
  • Do not delete the configuration file.
Code font A code font indicates text that the user enters without change, or text (such as messages) output by the system. For example:
  • At the prompt, enter dir.
  • Use the send command to send mail.
  • The following message is displayed:
    The password is incorrect.

The following table explains the symbols used in this manual:

Symbol Convention
| In syntax explanations, a vertical bar separates multiple items, and has the meaning of OR. For example:
A|B|C means A, or B, or C.
{ } In syntax explanations, curly brackets indicate that only one of the enclosed items is to be selected. For example:
{A|B|C} means only one of A, or B, or C.
[ ] In syntax explanations, square brackets indicate that the enclosed item or items are optional. For example:
[A] means that you can specify A or nothing.
[B|C] means that you can specify B, or C, or nothing.
... In coding, an ellipsis (...) indicates that one or more lines of coding are not shown for purposes of brevity.
In syntax explanations, an ellipsis indicates that the immediately preceding item can be repeated as many times as necessary. For example:
A, B, B, ... means that, after you specify A, B, you can specify B as many times as necessary.

Conventions: KB, MB, GB, and TB

This manual uses the following conventions:

Conventions: Structural elements used in this manual

The following table gives definitions of the types of structural elements (ranges for user-specified values) used in this manual.

Type Definition
Numeric character 0 to 9
Alphanumeric character A to Z, a to z, and 0 to 9
Symbol ! " # $ % & ' ( ) + , - . / : ; < = > @ [ ] ^ _ { } ?
Space character

Note: In Japanese systems, specify all characters as Hankaku characters.


Conventions: Version numbers

The version numbers of Hitachi program products are usually written as two sets of two digits each, separated by a hyphen. For example:

The version number might be shown on the spine of a manual as Ver. 2.00, but the same version number would be written in the program as 02-00.

Default installation folders

This manual represents the default installation folders as follows.

Product name Installation folder notation Default installation folder#
JP1/CSC - Manager JP1/CSC - Manager-installation-folder
  • For a 64-bit edition of Windows:
    C:\Program Files(x86)\HITACHI\jp1netmcscm
  • For other OSs
    C:\Program Files\HITACHI\jp1netmcscm
JP1/CSC - Manager Remote Option JP1/CSC - Manager-Remote-Option-installation-folder
  • For a 64-bit edition of Windows:
    C:\Program Files(x86)\HITACHI\jp1netmcscm\remote
  • For other OSs
    C:\Program Files\HITACHI\jp1netmcscm\remote
JP1/CSC - Agent JP1/CSC - Agent-installation-folder
  • For a 64-bit edition of Windows:
    C:\Program Files(x86)\HITACHI\jp1netmcsca
  • For other OSs
    C:\Program Files\HITACHI\jp1netmcsca

#
Indicates the installation folder when the product is installed in the default location (when the drive on which the OS is installed is C:\).

[Contents][Back][Next]


[Trademarks]

All Rights Reserved. Copyright (C) 2009, 2011, Hitachi, Ltd.
Copyright, patent, trademark, and other intellectual property rights related to the "TMEng.dll" file are owned exclusively by Trend Micro Incorporated