Job Management Partner 1/Client Security Control Description, User's Guide and Operator's Guide

[Contents][Glossary][Index][Back][Next]


10.1 Transitions of windows used for auditing security

Client information retrieved from the PC Search window can be output to a CSV file. Also, the status of security measures taken on clients can be evaluated for each user and group on the basis of points awarded. This allows administrators to audit security for clients.

The following figure shows the transitions of windows used for auditing security.

Figure 10-1 Transitions of windows used for auditing security

[Figure]

To open the initial window of AIM, log in to AIM with CSC administrator or CSC user permissions. For the procedure to open the initial window, see 8.1 Transitions of windows used for client monitoring.

[Contents][Back][Next]


[Trademarks]

All Rights Reserved. Copyright (C) 2009, 2011, Hitachi, Ltd.
Copyright, patent, trademark, and other intellectual property rights related to the "TMEng.dll" file are owned exclusively by Trend Micro Incorporated