Job Management Partner 1/Client Security Control Description, User's Guide and Operator's Guide

[Contents][Glossary][Index][Back][Next]


1.3 Typical uses of a client security control system

The following presents some typical ways in which a client security control system can be used.

Table 1-1 Examples of typical uses of a client security control system

Example Section in manual
Send warning messages to clients with inadequate security. 1.3.1
Deny network connections to clients with inadequate security. 1.3.2
Distribute the latest security update programs and definition files to clients with inadequate security. 1.3.3
Create a list of clients with inadequate security. 1.3.4
View a history of judgments and actions for a specific client. 1.3.5
Output PC list information to a file. 1.3.6
Implement actions after all security level judgments have been made. 1.3.7
Discover trends in the status of security countermeasures. 1.3.8
Discover trends in countermeasure usage for user-defined judgment items. 1.3.9
Organization of this section
1.3.1 Send warning messages to clients with inadequate security
1.3.2 Denying network connections to clients with inadequate security
1.3.3 Distributing the latest security update programs and definition files to clients with inadequate security
1.3.4 Creating a list of clients with inadequate security
1.3.5 Viewing a history of judgments and actions for a specific client
1.3.6 Outputting PC list information to a file
1.3.7 Implementing actions after all security level judgments have been made
1.3.8 Gauge trends in security countermeasure statuses
1.3.9 Gauge trends in countermeasure usage for user-defined judgment items

[Contents][Back][Next]


[Trademarks]

All Rights Reserved. Copyright (C) 2009, 2011, Hitachi, Ltd.
Copyright, patent, trademark, and other intellectual property rights related to the "TMEng.dll" file are owned exclusively by Trend Micro Incorporated