Job Management Partner 1/Client Security Control Description, User's Guide and Operator's Guide
n Overview
The example below shows how the administrator can create a list of clients with inadequate security for management purposes.
Figure 1-14 Creating a list of clients with inadequate security
n Work flow
- Client search
Use the PC Search window to find the clients with inadequate security.
- Specify the search conditions.
8.2 Searching for clients
- List creation
From the search results, create a client list as a CSV file.
- Display the search results.
10.2 Outputting search results of clients to a file
All Rights Reserved. Copyright (C) 2009, 2011, Hitachi, Ltd.
Copyright, patent, trademark, and other intellectual property rights related to the "TMEng.dll" file are owned exclusively by Trend Micro Incorporated