Job Management Partner 1/Client Security Control Description, User's Guide and Operator's Guide
This section explains the disk capacity used by the files and database of JP1/CSC - Manager.
- Organization of this subsection
- (1) Disk capacity used by files
- (2) Database disk capacity
(1) Disk capacity used by files
The following table describes the disk capacity used by each file.
Table E-1 Disk capacity used by each file
No. Type Type of judgment policy Formula for estimating disk capacity (in megabytes) 1 Fixed file 235#1 2 Log file (a x b / 1,024) x 2#2 3 Judgment history Security update
Latest security updates is specified.(200 + 82 x e) x c x d / (1,024 x 1,024) 4 Security update
Specify security updates is specified.((200 + 280 x f) x c x d + (200 + 280 x g) x c x d) / (1,024 x 1,024) 5 Anti-virus products (36 + 1,170 x h + 1,160 x i) x c x d / (1,024 x 1,024) 6 Prohibited software (38 + 450 x j) x c x d / (1,024 x 1,024) 7 Mandatory software (38 + 707 x k) x c x d / (1,024 x 1,024) 8 User definition (50 + 320 x l + 1,436 x m) x c x d / (1,024 x 1,024) 9 PC security settings 6,144 x t x c x d / (1,024 x 1,024) 10 Judgment policy files (12,428 + 544 x (e + g) + 296 x f + 1,552 x h + 592 x j + 940 x k + 55 x l + 1,020 x m) x n / (1,024 x 1,024) 11 Action policy files (307,200 + 360 x o) x p / (1,024 x 1,024) 12 Product name definition file 256 x r / (1,024 x 1,024) 13 User-defined actions Temporary file when Pass the asset information to the command is selected.#3 2,500 x c / (1,024 x 1,024) 14 Temporary file when Pass the judgment result to the command and either Summary or Details are selected.#3 160 x c / (1,024 x 1,024) 15 Temporary file (security updates), when Pass the judgment result to the command and Details are selected.#3 (272 x g + 150 x q + 270 x f) x c / (1,024 x 1,024) 16 Temporary file (anti-virus products), created when Pass the judgment result to the command and Details are selected.#3 142 x c / (1,024 x 1,024) 17 Temporary file (prohibited software), created when Pass the judgment result to the command and Details are selected.#3 770 x j x c / (1,024 x 1,024) 18 Temporary file (mandatory software), created when Pass the judgment result to the command and Details are selected.#3 1,280 x k x c / (1,024 x 1,024) 19 Temporary file (user definition), created when Pass the judgment result to the command and Details are selected.#3 642 x l x c / (1,024 x 1,024) 20 Temporary file created when an HTML message is previewed in the Edit Action Policy window 33,000 x s / (1,024 x 1,024) 21 Audit log file 17
- Legend:
- a: Number of log files (default is 10)
- b: Log file size (in kilobytes, with a default of 1,024)
- c: Number of assets
- d: Number of history preservation generations (default is 20)
- e: Number of excluded patches defined in the judgment policy
- f: Number of service packs defined in the judgment policy
- g: Number of patches defined in the judgment policy
- h: Number of anti-virus products installed on the asset
- i: Number of anti-virus products defined in the judgment policy
- j: Number of prohibited software applications defined in the judgment policy
- k: Number of mandatory software applications defined in the judgment policy
- l: Number of user-defined judgment items defined in the judgment policy
- m: Number of user-defined judgment conditions defined in the judgment policy
- n: Number of judgment policies
- o: Number of email addresses defined in the action policy
- p: Number of action policies
- q: Number of OS service packs defined in the judgment policy
- r: Number of product name definitions (default is an empty file)
- s: Number of Edit Action Policy windows opened
- t: Number of PC security setting judgment items defined in the judgment policy
- #1
- 11 (size needed for installation) + 224 (trace within the product)
- #2
- The values of a and b can be changed from the JP1/CSC - Manager setup window. For details about the JP1/CSC - Manager setup window, see 5.4.3 Setting up JP1/CSC - Manager.
- #3
- Item set in the Action for the user definition area of the Edit Action Policy window. For details about this window, see 6.10 Setting an action for each security level.
(2) Database disk capacity
The following is a formula to estimate the disk capacity used by the database, in megabytes.
(188 + 24,280 x c + (2,996 x d) x c + 194 x (6 + n + p)) x 1.5 + 4,060 x (u + 1) x v / (1,024 x 1,024) + 50
- Legend:
- c: Number of assets
- d: Number of history preservation generations (default is 20)
- n: Number of judgment policies
- p: Number of action policies
- u: Number of groups registered in AIM
- v: Number of days on which the statistics storage command (cscstorecount) was executed
In consideration of the database block size and index area, the estimate is multiplied by 1.5.
All Rights Reserved. Copyright (C) 2009, 2011, Hitachi, Ltd.
Copyright, patent, trademark, and other intellectual property rights related to the "TMEng.dll" file are owned exclusively by Trend Micro Incorporated