Job Management Partner 1/Client Security Control Description, User's Guide and Operator's Guide
After giving consideration to the functionality to be used, design a system configuration to suit the scale and environment for the system.
This section describes a basic configuration, and a configuration for a large-scale system. This section also describes a system configuration for operating a client security control system with a remote management server, and a configuration using a quarantine system.
- Organization of this subsection
- (1) Basic configuration
- (2) Configuration for a large-scale system
- (3) Configuration for operation with a remote management server
- (4) Configuration for using a quarantine system
In a basic configuration of a client security control system, client monitoring is performed using one management server and one network control server.
The following figure shows a basic configuration.
Figure 4-1 Basic configuration
(2) Configuration for a large-scale system
For organizations with a large number of clients or sites, a relay system is used to achieve a hierarchical configuration. On the relay system, install either JP1/Software Distribution Client (relay system) or JP1/Software Distribution SubManager.
The following figure shows a configuration for a large-scale system.
Figure 4-2 Configuration for a large-scale system
(3) Configuration for operation with a remote management server
To control client network connections from another system or to automatically update the judgment policies for anti-virus products by linkage with JP1/CSC - Manager Remote Option, you must use a system configuration that links with the other system, such as a model system for your anti-virus product. In such a configuration, JP1/CSC - Manager Remote Option must be installed on the remote management server.
The following figure shows a configuration with a remote management server.
Figure 4-3 Configuration with a remote management server
(4) Configuration for using a quarantine system
If clients with a high security risk level are detected, you can use a quarantine system to take security measures on these clients.
The following figures show the configuration of a system linked to JP1/Network Monitor and the configuration of a system linked to an authentication server.
Figure 4-4 Quarantine system configuration for linkage with JP1/NM
Figure 4-5 Quarantine system configuration for linkage with an authentication server
For details about operating a quarantine system, see Part 5. Quarantine Systems.
All Rights Reserved. Copyright (C) 2009, 2011, Hitachi, Ltd.
Copyright, patent, trademark, and other intellectual property rights related to the "TMEng.dll" file are owned exclusively by Trend Micro Incorporated