6.8.1 Types of information that can be imported or exported
The following table describes the range of information managed by IM Configuration Management that can be imported or exported.
Information managed by IM Configuration Management |
Export |
Import |
|
---|---|---|---|
Host information |
User-specified items |
Y |
Y |
OS information |
Y |
N |
|
Product information |
Y |
N |
|
Virtualization configuration information |
Y |
Y |
|
Remote communication method |
Y |
Y |
|
User name/password information |
Y |
Y |
|
System hierarchy |
Agent configuration information |
Y |
Y |
Remote monitoring configuration information |
Y |
Y |
|
Remote authentication information |
WMI authentication information |
Y |
Y |
SSH authentication information output |
Y |
Y |
|
Business group information |
Y |
Y |
|
Monitoring group information |
Y |
Y |
|
Profiles |
Event forwarding setting file |
Y |
Y |
Action definition file for event log trapping |
Y |
Y |
|
Action definition file for log file trapping# |
Y |
Y |
|
Log-file trap startup definition file# |
Y |
Y |
|
Local action execution definition file |
Y |
Y |
|
Authentication server settings file |
N |
N |
|
JP1 user settings file |
N |
N |
|
User mapping settings file |
N |
N |
|
Remote-monitoring log file trap action-definition file |
Y |
Y |
|
Remote-monitoring log file trap startup-definition file |
Y |
Y |
|
Remote-monitoring event log trap action-definition file |
Y |
Y |
|
Service activity information |
N |
N |