Job Management Partner 1/Client Security Control Description, User's Guide and Operator's Guide

[Contents][Glossary][Index][Back][Next]


6.10.2 Command execution for user-defined actions

The following describes how commands are executed based on user-defined actions set by the administrator.

At each judgment, commands are executed as user-defined actions according to the number of action policies defined and the number of security levels set in each policy. For example, if you set two action policies and three security levels for each policy, six commands will be executed as user-defined actions.

The following figure shows an example of command execution in this situation.

Figure 6-30 Example of command execution

[Figure]

[Contents][Back][Next]


[Trademarks]

All Rights Reserved. Copyright (C) 2009, 2011, Hitachi, Ltd.
Copyright, patent, trademark, and other intellectual property rights related to the "TMEng.dll" file are owned exclusively by Trend Micro Incorporated