Job Management Partner 1/Software Distribution Description and Planning Guide
When you execute a job that monitors software operation status, you can suppress startup of software on clients and acquire software operation logs and operation times. For example, by preventing printing and copying of data into USB memory at a client, you can prevent confidential information from being leaked. You can also obtain Web site access logs, and monitor access to risky Web sites that might result in information leakage.
By displaying the acquired suppression logs and operation logs, you can check all operations or you can check only specific operations performed during a specified period of time. You can also trace the history of operations performed on specific files.
From the acquired operation times, you can check the usage status of each software asset.
Monitoring software operation statuses enables you to better understand overall software usage, and enables you to more easily trace and identify unauthorized use of software.
The following figure shows an overview of software operation monitoring.
Figure 1-15 Software operation monitoring
For details about monitoring software operation status, see 2.5 Monitoring software operation statuses and 2.6 Managing software operation information.
The software operation status monitoring function can also acquire operation history, suppression history, and operation times from offline machines. For details about monitoring the operation status of offline machines, see 2.5.12 Monitoring the operation status of stand-alone PCs.
All Rights Reserved. Copyright (C) 2009, 2013, Hitachi, Ltd.
Copyright, patent, trademark, and other intellectual property rights related to the "TMEng.dll" file are owned exclusively by Trend Micro Incorporated.