Job Management Partner 1/Client Security Control Description, User's Guide and Operator's Guide
n Overview
The example below shows how the asset information and judgment result for a client whose security level was judged is output to a CSV file as PC list information. The administrator can use the PC list information file to manage PC security levels.
Figure 1-16 Outputting a PC list information file (CSV format)
n Work flow
- Security policy setup
Based on the corporate security policy, the administrator sets the judgment policy (judgment items) and the action policy (actions triggered according to the judgment result).
- Consider what needs to be in the security policy.
4.7 Considerations for security policies
- Set the security policy.
6. Managing Security Policies
- Collection of IT asset information
The IT asset information for a client is collected and centrally managed in the asset management database.
- Security level judgment
To determine the client's security level, the IT asset information collected at step 2 is compared against the judgment policy set at step 1.
A security level judgment can be triggered in any of three ways: Automatic judgment when inventory information is updated, periodic judgment via Scheduled Tasks in Windows, or judgment by an administrator.
- Judge the security level.
2.4 Judging security levels
- Execution of PC list information output command
When the PC list information output command (cscexportpclist) is executed, the IT asset information collected at step 2 and the result of the security level judgment at step 3 are output as PC list information to a CSV file.
- PC list information output command
cscexportpclist (outputs PC list information) in 15. Commands
- PC list information file
16.10 PC list information file.
All Rights Reserved. Copyright (C) 2009, 2011, Hitachi, Ltd.
Copyright, patent, trademark, and other intellectual property rights related to the "TMEng.dll" file are owned exclusively by Trend Micro Incorporated