Job Management Partner 1/Client Security Control Description, User's Guide and Operator's Guide

[Contents][Glossary][Index][Back][Next]


1.3.7 Implementing actions after all security level judgments have been made

n Overview

The example below shows how the administrator can manually implement actions after all security level judgments of clients have been made.

This operation is recommended when the security levels of many clients are judged and time is needed to complete the judgments and actions, or when you want to create a report on the judgment results before implementing any actions.

Figure 1-17 Implementing actions after all security level judgments have been made

[Figure]

n Work flow

  1. Specification of JP1/CSC - Manager setup items
    To prevent actions from being implemented as soon as a security level has been judged, in the JP1/CSC - Manager Setup dialog box, specify Skip for Action execution.
  2. Security policy setup
    The administrator sets the judgment policy (judgment items) and the action policy (the actions triggered according to the judgment results based on the corporate security policy).
  3. Collection of IT asset information
    The IT asset information for the client is collected and centrally managed in the asset management database.
  4. Security level judgment
    To determine the client's security level, the IT asset information collected at step 3 is compared against the judgment policy set at step 2. The security levels of clients are judged one group at a time for the groups defined by the administrator.
    A security level judgment can be triggered in any of three ways: Automatic judgment when inventory information is updated, periodic judgment via Scheduled Tasks in Windows, or judgment by an administrator.
  5. Execution of action command
    The action command (cscaction) executed for the specified client or clients implements actions according to the result of the latest security level judgment.

[Contents][Back][Next]


[Trademarks]

All Rights Reserved. Copyright (C) 2009, 2011, Hitachi, Ltd.
Copyright, patent, trademark, and other intellectual property rights related to the "TMEng.dll" file are owned exclusively by Trend Micro Incorporated