Job Management Partner 1/Client Security Control Description, User's Guide and Operator's Guide

[Contents][Glossary][Index][Back][Next]


14.1.3 Tasks during operation of a quarantine system linked to JP1/NM

This subsection explains the tasks involved in running a quarantine system linked to JP1/NM.

The following table lists the tasks.

Table 14-1 List of quarantine system tasks

Tasks Description Type Reference
Monitoring clients Client security levels are judged and action histories are reviewed at the administrator's discretion. M 8. Monitoring Clients
Implementing actions Based on instructions from the administrator, clients with high security risk levels are denied access to the network, and clients that are declared safe have their network access restored. M 9. Dealing with Security Risks
Evaluating client security The status of security measures is checked for each client, and the adequacy of the security measures for a specific user or group is evaluated based on a points rating. O 10. Auditing Security
Implementing security measures on clients Security measures are implemented on clients that have been denied access to the network after being judged a security risk.
Security measures are implemented on clients either in an online environment through communication with the treatment server or in an offline environment.
M 14.1.4 Implementing client security measures
Changing the system configuration When you add a new client to the network, information about the client is registered in JP1/NM. O 14.1.5 Adding new clients to the network
When you remove a client from the network while the quarantine system is running, information about the client is deleted from JP1/NM. O 14.1.7 Removing a client after operation has started

Legend:
M: Indicates a mandatory task.
O: Indicates an optional task.

[Contents][Back][Next]


[Trademarks]

All Rights Reserved. Copyright (C) 2009, 2011, Hitachi, Ltd.
Copyright, patent, trademark, and other intellectual property rights related to the "TMEng.dll" file are owned exclusively by Trend Micro Incorporated