Job Management Partner 1/Client Security Control Description, User's Guide and Operator's Guide

[Contents][Glossary][Index][Back][Next]


1.3.4 Creating a list of clients with inadequate security

n Overview

The example below shows how the administrator can create a list of clients with inadequate security for management purposes.

Figure 1-14 Creating a list of clients with inadequate security

[Figure]

n Work flow

  1. Client search
    Use the PC Search window to find the clients with inadequate security.
  2. List creation
    From the search results, create a client list as a CSV file.

[Contents][Back][Next]


[Trademarks]

All Rights Reserved. Copyright (C) 2009, 2011, Hitachi, Ltd.
Copyright, patent, trademark, and other intellectual property rights related to the "TMEng.dll" file are owned exclusively by Trend Micro Incorporated