Job Management Partner 1/Software Distribution Description and Planning Guide

[Contents][Glossary][Index][Back][Next]

2.6.2 Viewing and tracing operation log data

In the Operation Log List window, you can search the suppression and operation log data acquired by JP1/Software Distribution and display only specific information. The data that can be managed in the Operation Log List window is called the operation log data. By using the Operation Log List window, you can integrate the management of operation log data throughout the entire system.

You can start the Operation Log List window if Asset Information Manager Subset (one of the JP1/Software Distribution Manager components) and Remote Installation Manager have been installed, or JP1/Asset Information Manager 08-00 or later is linked.

The following figure shows the concept of managing operation log data in the Operation Log List window.

Figure 2-30 Managing operation log data in the Operation Log List window

[Figure]

You can start the Operation Log List window, shown in the following figure, from Remote Installation Manager.

Figure 2-31 Operation Log List window

[Figure]

For details about how to use the Operation Log List window, see 6.6 Using the Operation Log List window in the manual Administrator's Guide Volume 1.

Organization of this subsection
(1) Functions of the Operation Log List window

(1) Functions of the Operation Log List window

The following two functions are available in the Operation Log List window:

The following subsections explain these functions.

(a) Searching operation log data

You can use the following search functions in the Operation Log List window:

You can also select a search pattern provided by JP1/Software Distribution and set the operation log search conditions in batch mode.

Using the above search functions, you can manage the following operation log data from the Operation Log List window:

(b) Tracing user operations

If you click the file name displayed in an operation log entry in the Operation Log List window, the File Operation Trace window opens.

In the File Operation Trace window, you can trace the user operations performed on the selected file based on its associated operation log data. If there is operation log data whose date and time is more recent than the operation log data displayed for the selected file, you can also trace subsequent operations on that file.

If you discover from operation log data that a confidential file was copied to a different location, you can determine the details of the unauthorized operation by tracing back to the user who copied the file as well as the route traversed by the copied file.

The following figure shows the File Operation Trace window.

Figure 2-32 File Operation Trace window

[Figure]

For details about how to perform operations in the File Operation Trace window, see 6.6.4 Tracing operation logs in the manual Administrator's Guide Volume 1.