Contents
-
-
2. Features of JP1/IT Desktop Management
-
2.7 Controlling devices remotely
-
2.7.3 Functional differences between remote control connection methods
-
2.7.4 Notes on using the remote control feature in multi-language environments
-
2.7.5 Notes on files generated by the controller in user environments
-
2.7.8 Displaying the connection status of remote control sessions
-
2.7.9 Using the remote control feature in NAT and DHCP environments
-
2.7.10 User permissions required for remote control using Windows authentication
-
2.7.11 Setting user permissions required for remote control using Windows autpagehentication
-
2.7.12 Setting authentication information for remote control
-
2.7.14 Controlling the interface of a computer during a remote control session
-
2.7.16 Issuing connection requests from remote computers to controllers
-
2.7.17 Managing connection targets for the remote control feature
-
2.8 Managing network connections
-
2.8.1 Detecting devices by using the network monitoring function
-
2.8.4 Displaying the operating status of the network monitor
-
2.8.6 Using network monitor settings to control network access
-
2.8.13 Registering devices that are accessible to blocked devices
-
2.8.16 Managing exclusive communication destinations for devices denied network access
-
2.8.18 Network control function by linking with JP1/NETM/NM - Manager
-
-
-
2.10.2 Managing operation logs on the management server in a single-server configuration system
-
2.10.4 Investigating suspicious movements of files from systems using operation logs
-
2.10.5 Conditions for determining whether a file is to be monitored for suspicious file movements
-
2.10.7 Conditions for checking for large numbers of print jobs
-
-
2.12 Distributing software and files to computers managed online
-
2.12.2 Distribution enforced as an automatic countermeasure for security
-
2.12.5 Types of software that can be uninstalled by the distribution function
-
2.12.7 Postponing download or installation on a computer to which a package is distributed
-
2.12.12 Judging the result of software installation executed by the distribution function
-
-
4.3 Prerequisites for functions
-
4.4 Examining the system configuration
-
-
4.5.5 Guidelines for disk space requirements for backing up operation logs
-
4.5.6 Guidelines for disk space requirements for the operation log database
-
4.5.7 Guidelines for disk space requirements for revision history archive
-
4.5.8 Guidelines for disk space requirements for revision history database
-
4.5.10 Acquiring operation logs when the connection destination of the agent is turned off
-
-