Job Management Partner 1/Client Security Control Description, User's Guide and Operator's Guide
This manual explains how to set up and operate a system that manages client security. Such a system is referred to in this manual as a client security control system.
A client security control system consists of the following program products:
- Job Management Partner 1/Client Security Control (for client security management)
- Job Management Partner 1/Software Distribution (for software distribution and inventory management)
- Job Management Partner 1/Asset Information Manager (for integrated asset management) (optional product)
This manual primarily explains the functionality for Job Management Partner 1/Client Security Control. It also gives an overview of a client security control system, and explains linkages to other JP1 products and network control products. Read this manual before setting up a client security control system. In this manual, Job Management Partner 1 is abbreviated to JP1. Hereafter in this manual, Job Management Partner 1/Asset Information Manager is referred to as Asset Information Manager or AIM.
Intended readers
This manual is intended for administrators installing JP1/Client Security Control, and setting up and operating a client security control system.
Administrators are assumed to be familiar with the following:
- JP1/Software Distribution
- Asset Information Manager (optional product)
- Windows (Windows Server 2003 and Windows Server 2008)
- Linked network control products
Organization of this manual
This manual consists of the following parts:
- PART 1. Overview
- This part describes the features of a client security control system and typical ways in which it may be used.
- PART 2. Functionality
- This part describes the functionality and system configuration of a client security control system.
- PART 3. System Design and Setup
- This part describes factors to consider and the tasks involved from installation to operation of a client security control system. It also describes how to install and set up each program product, and how to edit security policies.
- PART 4. System Operation
- This part describes how to operate a client security control system. It explains how to manage inventory information, monitor clients, handle security risks, conduct security audits, and link with JP1/Integrated Manager.
- PART 5. Quarantine Systems
- This part describes the quarantine systems that can be implemented by linking JP1/Client Security Control with various program products.
- PART 6. Reference
- This part describes the commands, definition files, and output messages of JP1/Client Security Control, and how to deal with any problems that may arise during the operation of your client security control system.
Related publications
The following manuals are related to this manual. Read them as necessary.
- For more information about how to set up and operate integrated asset management:
- Job Management Partner 1/Asset Information Manager Description (3020-3-S76(E))
- Job Management Partner 1/Asset Information Manager Planning and Setup Guide (3020-3-S77(E))
- Job Management Partner 1/Asset Information Manager Administrator's Guide (3020-3-S78(E))
- For more information about how to set up and operate software distribution and inventory management:
- Job Management Partner 1/Software Distribution Description and Planning Guide (3020-3-S79(E)), for Windows systems
- Job Management Partner 1/Software Distribution Setup Guide (3020-3-S80(E)), for Windows systems
- Job Management Partner 1/Software Distribution Administrator's Guide Volume 1 (3020-3-S81(E)), for Windows systems
- Job Management Partner 1/Software Distribution Administrator's Guide Volume 2 (3020-3-S82(E)), for Windows systems
- Job Management Partner 1/Software Distribution SubManager (3020-3-S85(E)), for UNIX Systems
- For more information about JP1/IM linkage:
- Job Management Partner 1/Integrated Management - Manager System Configuration and User's Guide (3020-3-K01(E))
- Job Management Partner 1/Integrated Management - Manager Reference (3020-3-K02(E))
- Job Management Partner 1/Base User's Guide (3020-3-R71(E))
- For more information about quarantine systems linked with JP1/Network Monitor:
- Job Management Partner 1/Network Monitor Description, User's Guide and Operator's Guide (3020-3-S73(E))
- Job Management Partner 1/Network Monitor - Manager Description, User's Guide and Operator's Guide (3020-3-S74(E))
Conventions: Abbreviations for product names
This manual uses the following abbreviations for product names:
Abbreviation Full name or meaning Active Directory Active Directory(R) AIM Asset Information Manager Job Management Partner 1/Asset Information Manager Asset Information Manager Subset Component of
JP1/Software Distribution ManagerAsset Information Manager Subset Component of
Job Management Partner 1/Software Distribution ManagerAMT Intel Active Management Technology IE or Microsoft Internet Explorer Microsoft(R) Internet Explorer(R) Windows(R) Internet Explorer(R) JP1/CSC JP1/CSC - Agent Job Management Partner 1/Client Security Control - Agent JP1/CSC - Manager Job Management Partner 1/Client Security Control - Manager JP1/CSC - Manager Remote Option Job Management Partner 1/Client Security Control - Manager Remote Option JP1/IM JP1/IM - Manager Job Management Partner 1/Integrated Management - Manager JP1/IM - View Job Management Partner 1/Integrated Management - View JP1/NM JP1/NM Job Management Partner 1/Network Monitor JP1/NM - Manager Job Management Partner 1/Network Monitor - Manager JP1/Software Distribution JP1/Software Distribution Client Job Management Partner 1/Software Distribution Client JP1/Software Distribution Client (relay system) Job Management Partner 1/Software Distribution Client(relay system) JP1/Software Distribution Manager Job Management Partner 1/Software Distribution Manager JP1/Software Distribution SubManager Job Management Partner 1/Software Distribution SubManager MBSA Microsoft(R) Baseline Security Analyzer Microsoft IAS Microsoft(R) Internet Authentication Service Microsoft Internet Information Services Microsoft(R) Internet Information Services Microsoft Software Update Services Microsoft(R) Software Update Services MSCS or Microsoft Cluster Server Microsoft(R) Cluster Server NetMonitor NetMonitor Job Management Partner 1/CSC - Network Monitor NetMonitor/Manager Job Management Partner 1/CSC - Network Monitor Manager UNIX UNIX(R) Windows 2000# Windows 2000 Advanced Server Microsoft(R) Windows(R) 2000 Advanced Server Operating System Windows 2000 Server Microsoft(R) Windows(R) 2000 Server Operating System Windows 7# Microsoft(R) Windows(R) 7 Enterprise Microsoft(R) Windows(R) 7 Professional Microsoft(R) Windows(R) 7 Ultimate Windows 95# Microsoft(R) Windows(R) 95 Operating System Windows 98# Microsoft(R) Windows(R) 98 Operating System Windows Me# Microsoft(R) Windows(R) Millennium Edition Operating System Windows NT# Windows NT Server Microsoft(R) Windows NT(R) Server Network Operating System Version 4.0 Windows NT Workstation Microsoft(R) Windows NT(R) Workstation Operating System Version 4.0 Windows Server 2003# Windows Server 2003 Windows Server 2003, Enterprise Edition Microsoft(R) Windows Server(R) 2003, Enterprise Edition Windows Server 2003, Standard Edition Microsoft(R) Windows Server(R) 2003, Standard Edition Windows Server 2003(x64) Windows Server 2003, Enterprise x64 Edition Microsoft(R) Windows Server(R) 2003, Enterprise x64 Edition Windows Server 2003, Standard x64 Edition Microsoft(R) Windows Server(R) 2003, Standard x64 Edition Windows Server 2008# Windows Server 2008 Datacenter Microsoft(R) Windows Server(R) 2008 Datacenter Microsoft(R) Windows Server(R) 2008 R2 Datacenter Windows Server 2008 Enterprise Microsoft(R) Windows Server(R) 2008 Enterprise Microsoft(R) Windows Server(R) 2008 R2 Enterprise Windows Server 2008 Standard Microsoft(R) Windows Server(R) 2008 Standard Microsoft(R) Windows Server(R) 2008 R2 Standard Windows Vista# Windows Vista Business Microsoft(R) Windows Vista(R) Business Windows Vista Enterprise Microsoft(R) Windows Vista(R) Enterprise Windows Vista Ultimate Microsoft(R) Windows Vista(R) Ultimate Windows XP# Windows XP Home Edition Microsoft(R) Windows(R) XP Home Edition Operating System Windows XP Professional Microsoft(R) Windows(R) XP Professional Operating System WUA Windows(R) Update Agent
- #
- Windows 7, Windows Server 2008, Windows Vista, Windows Server 2003, Windows XP, Windows 2000, Windows NT, Windows Me, Windows 98, and Windows 95 are referred to collectively as Windows when there are no functional differences between the operating systems.
This manual also uses the following acronyms:
Acronym Full name or meaning API Application Program Interface BCC Blind Carbon Copy CSV Comma Separated Value DHCP Dynamic Host Configuration Protocol EAP Extensible Authentication Protocol FD Floppy Disc IEEE Institute of Electrical and Electronics Engineers IP Internet Protocol IPv4 Internet Protocol Version 4 IT Information Technology LAN Local Area Network MAC Media Access Control OS Operating System PC Personal Computer PDCA Plan Do Check Action RADIUS Remote Authentication Dial In User Service SMTP Simple Mail Transfer Protocol TCP/IP Transmission Control Protocol/Internet Protocol URL Uniform Resource Locator VLAN Virtual Local Area Network WAN Wide Area Network WWW World Wide Web
Conventions: Date and time notation used in this manual
The following table gives definitions of the date and time format used in this manual.
Notation Definition YYYY/MM/DD or YYYYMMDD Date expressed as year, month, and day (YYYY: year; MM: month; DD: day) hh:mm:ss Time expressed as hour, minute, and second (hh: hour; mm: minute; ss: second) YYYYMMDDhhmmssnnn or YYYYMMDDhhmmss.nnn Date and time expressed as year, month, day, hour, minute, second, and millisecond (YYYY: year; MM: month; DD: day; hh: hour; mm: minute; ss: second; nnn: millisecond)
This manual uses the following conventions in diagrams:
Conventions: Fonts and symbols
The following table explains the fonts used in this manual:
Font Convention Bold Bold type indicates text on a window, other than the window title. Such text includes menus, menu options, buttons, radio box options, or explanatory labels. For example:
- From the File menu, choose Open.
- Click the Cancel button.
- In the Enter name entry box, type your name.
Italics Italics are used to indicate a placeholder for some actual text to be provided by the user or system. For example:
Italics are also used for emphasis. For example:
- Write the command as follows:
copy source-file target-file
- The following message appears:
A file was not found. (file = file-name)
- Do not delete the configuration file.
Code font A code font indicates text that the user enters without change, or text (such as messages) output by the system. For example:
- At the prompt, enter dir.
- Use the send command to send mail.
- The following message is displayed:
The password is incorrect.
The following table explains the symbols used in this manual:
Symbol Convention | In syntax explanations, a vertical bar separates multiple items, and has the meaning of OR. For example:
A|B|C means A, or B, or C.{ } In syntax explanations, curly brackets indicate that only one of the enclosed items is to be selected. For example:
{A|B|C} means only one of A, or B, or C.[ ] In syntax explanations, square brackets indicate that the enclosed item or items are optional. For example:
[A] means that you can specify A or nothing.
[B|C] means that you can specify B, or C, or nothing.... In coding, an ellipsis (...) indicates that one or more lines of coding are not shown for purposes of brevity.
In syntax explanations, an ellipsis indicates that the immediately preceding item can be repeated as many times as necessary. For example:
A, B, B, ... means that, after you specify A, B, you can specify B as many times as necessary.
Conventions: KB, MB, GB, and TB
This manual uses the following conventions:
- 1 KB (kilobyte) is 1,024 bytes.
- 1 MB (megabyte) is 1,0242 bytes.
- 1 GB (gigabyte) is 1,0243 bytes.
- 1 TB (terabyte) is 1,0244 bytes.
Conventions: Structural elements used in this manual
The following table gives definitions of the types of structural elements (ranges for user-specified values) used in this manual.
Type Definition Numeric character 0 to 9 Alphanumeric character A to Z, a to z, and 0 to 9 Symbol ! " # $ % & ' ( ) + , - . / : ; < = > @ [ ] ^ _ { } ?
Space characterNote: In Japanese systems, specify all characters as Hankaku characters.
The version numbers of Hitachi program products are usually written as two sets of two digits each, separated by a hyphen. For example:
- Version 1.00 (or 1.0) is written as 01-00.
- Version 2.05 is written as 02-05.
- Version 2.50 (or 2.5) is written as 02-50.
- Version 12.25 is written as 12-25.
The version number might be shown on the spine of a manual as Ver. 2.00, but the same version number would be written in the program as 02-00.
Default installation folders
This manual represents the default installation folders as follows.
Product name Installation folder notation Default installation folder# JP1/CSC - Manager JP1/CSC - Manager-installation-folder
- For a 64-bit edition of Windows:
C:\Program Files(x86)\HITACHI\jp1netmcscm
- For other OSs
C:\Program Files\HITACHI\jp1netmcscm
JP1/CSC - Manager Remote Option JP1/CSC - Manager-Remote-Option-installation-folder
- For a 64-bit edition of Windows:
C:\Program Files(x86)\HITACHI\jp1netmcscm\remote
- For other OSs
C:\Program Files\HITACHI\jp1netmcscm\remote
JP1/CSC - Agent JP1/CSC - Agent-installation-folder
- For a 64-bit edition of Windows:
C:\Program Files(x86)\HITACHI\jp1netmcsca
- For other OSs
C:\Program Files\HITACHI\jp1netmcsca
- #
- Indicates the installation folder when the product is installed in the default location (when the drive on which the OS is installed is C:\).
All Rights Reserved. Copyright (C) 2009, 2011, Hitachi, Ltd.
Copyright, patent, trademark, and other intellectual property rights related to the "TMEng.dll" file are owned exclusively by Trend Micro Incorporated