Hitachi

Job Management Partner 1 Version 10 Job Management Partner 1/IT Desktop Management Overview and System Design Guide


Summary of amendments

The following table lists changes in this manual (3021-3-337-10(E)) and product changes related to this manual.

Changes

Location

By linking with Job Management Partner 1/NETM/Network Monitor - Manager, you can now, from Job Management Partner 1/IT Desktop Management, control network connections that are monitored by the appliance products on which Job Management Partner 1/NETM/Network Monitor is installed.

1.2, 1.3.9, 2.8.18, 4.4, 4.4.13, A.4(21), B

In the Security module and the Device module, it is now possible to create groups to which managed computers are automatically sorted according to given conditions.

1.3.1, 1.3.3, 1.3.5, 1.3.9, 2.3.5, 2.5.3, 2.6.2(20), 2.6.2(22), 2.9.3, 2.9.3(2), 2.9.4(1), 2.14.1, 4.6.4, A.6

It is now possible to use the Software License Status view to manage the usage status of software licenses for all management software programs.

1.3.4, 2.3.5, 2.3.7, 2.11.3, 2.11.6, 2.15.1

It is now possible to collect the revision history for device information.

1.3.5, 1.3.9, 2.3.5, 2.3.7, 2.6.2(17), 2.6.2(18), 4.5.1, 4.5.2, 4.5.3, 4.5.7, 4.5.8, A.4(3), A.4(13), A.5(2), A.6, A.7, B

The scope of displayed software licenses and contracts can now be limited in accordance with the administration scope specified for the user account.

2.3.5, 2.11.1, 2.11.3(3), 2.11.7(2), 2.11.7(4)

The descriptions of the differences in operation windows when administration scopes are restricted were changed.

2.3.7

The following description was added: To conduct an intensive search for devices in the network by specifying a discovery period, you must specify 50,000 or fewer IP addresses in the discovery range.

2.4.2

The maximum number of managed devices in a basic configuration system is indicated as follows:

  • When collecting operation logs: 3,000

  • When using the distribution function but collecting no operation logs: 5,000

  • When neither collecting operation logs nor using the distribution function: 10,000

2.6, 4.4

The following description was added: The Agentless Management (Authentication Successful) icon indicates a device that has undergone successful authentication via a Windows administrative share or via SNMP.

2.6.2(2)

Descriptions for SNMP authentication and smart devices were added in the descriptions of Name (Computer) and Description (Computer) in the computer information.

The descriptions of the amount of free space in the computer information were changed as follows:

  • A description stating that the type of logical drive is a local disk was added to the description of the hard disk.

  • A description was added stating that the total amount of free space on the local disk that exceeds 9,223,372,036,854,775,807 bytes is displayed as 9,223,372,036,854,775,807 bytes.

2.6.2(3)

The following products whose purchasing status and GUID can be collected for installed software information were added:

Japanese versions of Microsoft Office products

  • Microsoft Office Access 2003

  • Microsoft Office Excel 2003

  • Microsoft Office FrontPage 2003

  • Microsoft Office Outlook 2003

  • Microsoft Office Personal Edition 2003

  • Microsoft Office PowerPoint 2003

  • Microsoft Office Professional Edition 2003

  • Microsoft Office Professional Enterprise Edition 2003

  • Microsoft Office Project Professional 2003

  • Microsoft Office Project Standard 2003

  • Microsoft Office Publisher 2003

  • Microsoft Office Standard Edition 2003

  • Microsoft Office Visio 2003 Professional

  • Microsoft Office Visio 2003 Standard

  • Microsoft Office Word 2003

Japanese versions, English versions, and Chinese versions of Microsoft Office products

  • Microsoft Access 2013

  • Microsoft Excel 2013

  • Microsoft InfoPath 2013

  • Microsoft Lync 2013

  • Microsoft Office Professional Plus 2013

  • Microsoft Office Standard 2013

  • Microsoft OneNote 2013

  • Microsoft Outlook 2013

  • Microsoft PowerPoint 2013

  • Microsoft Project Professional 2013

  • Microsoft Project Standard 2013

  • Microsoft Publisher 2013

  • Microsoft Visio Professional 2013

  • Microsoft Visio Standard 2013

  • Microsoft Word 2013

2.6.2(5)

A cautionary note on the software that appears only in the Programs and Features section of the Windows Control Panel was added.

2.6.2(5)

It is now possible to select whether balloon tips for the icons of Job Management Partner 1/IT Desktop Management in the task bar and the user information entry window are displayed on user computers.

2.6.2(12), 2.9.4(11), 2.9.5, 2.11.2(3), 2.21, 2.21.1, 2.21.2, 2.21.5, A.4(7)

System administrators can now use the Settings module to specify the date and time to allow users to start entering user information.

2.6.2(12), 2.11.2(3), 2.21.1, A.7

All groups corresponding to a hierarchy that was deleted from the definitions of departments or locations can now be deleted at one time from the groups displayed in the menu area.

2.6.2(21)

Required AMT versions were changed.

2.6.3(2)

The following description was deleted: If computers that can be authenticated at discovery by SNMP are registered as managed devices, you can set up authentication information to use Windows Administrative Shares on those managed devices following discovery.

2.6.5(3)

The description of system information in the device information that can be acquired from MDM systems was changed. The description for when an underscore (_) is used in the host name of an MDM server to be linked was deleted.

2.6.6(2)

The cautionary notes that apply to the remote control feature were corrected.

2.7.14(7)

Descriptions about the cases in which exclusive communication destinations must be specified and examples of Exclusive Communication Destination for Access-Denied Devices settings were added.

A procedure for preventing the Remote Access feature of RRAS (Routing and Remote Access Service) from reserving ten IP addresses leased by the DHCP server was also added.

2.8.2

A cautionary note that applies when blocked devices are permitted to access the network was added.

2.8.3

Windows 8 and Windows Server 2012 were added as applicable OSs for the following programs:

  • Job Management Partner 1/IT Desktop Management - Manager

  • Job Management Partner 1/IT Desktop Management - Remote Site Server

  • Job Management Partner 1/IT Desktop Management - Network Monitor

2.8.3, 2.8.16, 4.2.1, 4.2.2, 4.2.4, 4.2.6, A.5(3)

For the Network Filter List, you can now specify whether to enable automatic updates for all items or only for additional items.

2.8.8, 2.8.10, 2.8.14, 2.8.15, 4.6.6, A.4(11)

The description that the network monitor agent must be installed on computers registered in the Exclusive Communication Destination for Access-Denied Devices list was deleted.

2.8.16

A policy related to the computer's security settings can now be added to the security policies to allow security evaluation based on user-specified conditions.

2.9.3(2), 2.9.3(11), 2.9.3(12), 2.9.4(1), 2.9.4(3), 2.9.4(7), 2.14.1, A.6

The descriptions of supported anti-virus products were changed as follows:

  • The following products were added to the list of supported anti-virus products:

    • ESET Endpoint AntiVirus (32-bit and 64-bit)

    • ESET File Security for Microsoft Windows Server (32-bit and 64-bit)

  • The following versions were added to the list of supported anti-virus products:

    • Japanese versions of Forefront Client Security

    • English versions of Forefront Client Security

  • The following versions were corrected in the list of supported anti-virus products:

    • ウイルスバスター コーポレートエディション

    • ウイルスバスター コーポレートエディション アドバンス

    • ウイルスバスター コーポレートエディション サーバ版

    • ウイルスバスター コーポレートエディション サーバ版 アドバンス

    • Japanese versions of Forefront Client Security

    • OfficeScan Corporate Edition

    • English versions of Forefront Client Security

  • A description stating the following was added: When a complete scan is performed for one of the following products, the last scanned date and time can be collected only when all hard disks, system memory, and startup objects are scanned.

    Japanese versions of anti-virus products

    • Kaspersky Open Space Security Server (32-bit and 64-bit)

    • Kaspersky Open Space Security Workstation (32-bit and 64-bit)

    • Kaspersky Endpoint Security 8 for Windows (32-bit and 64-bit)

    English versions of anti-virus products

    • Kaspersky Open Space Security Server 6.0.4 (32-bit and 64-bit)

    • Kaspersky Open Space Security Workstation 6.0.4 (32-bit and 64-bit)

    • Symantec Endpoint Protection 12.1 (32-bit and 64-bit)

  • A cautionary note that applies when the anti-virus product is ServerProtect for Windows NT/NetWare was added.

2.9.3(14)

The minimum judgement values that can be entered for user-defined security settings were added.

2.9.4(1)

The following note was added: If version information for the executable file of the target program is corrupted or contradicted, the program might not be blocked even if the Original File Name setting in Windows Explorer matches the File Name setting for the program.

2.9.5(4)

Windows Internet Explorer 11 was added as Web browsers for which operation logs can be acquired.

2.10.1, 2.10.8(3), 2.10.8(5), 2.10.8(8), 4.2.1, 4.3.5

Firefox was deleted as a web browser that can be used to collect operation logs for Web access, file uploads, and file downloads.

2.10.1, 2.10.8(3), 2.10.8(5), 4.3.5

Microsoft Office Outlook 2013 and Windows Live Mail 2012 were added as email clients that can be used to collect operation logs.

2.10.1, 2.10.8(6), 2.10.8(7), 4.3.5

Descriptions of conditions for a file to be monitored were added.

2.10.4(1)

The following note was added: If processing is forcibly terminated after operation log data was sent from an agent-installed computer to the management server and before the operation log is deleted from the computer, the same operation log data might be collected twice.

2.10.8(1)

The following note was added: For Internet Explorer 10, operation logs for file uploads might not be collected.

2.10.8(5)

The following descriptions were added:

  • Access permissions for distributed packages are inherited from the distribution-destination folder.

  • Access permissions for distributed packages can be changed on the distribution-destination computer by the user.

2.12.1(1)

The descriptions of reducing load by distribution were changed.

2.12.4, 2.12.8, A.4(7)

A note on distribution was added.

2.12.6

The description about the linkage with Job Management Partner 1/IM was changed. The Job Management Partner 1/IM event console is now able to monitor major events in addition to error events that occurred on managed computers.

2.13.4, 4.4.11

The description about the assessment levels in Security Diagnosis Reports was added.

2.14.2

Definitions of shared management items and added management items can now be exported and imported in CSV format.

2.20.1

Prerequisites for a computer on which an agent is to be installed were corrected.

4.2.3

Android was added as an OS required for managing smart devices by linking with the MDM system.

4.3.6

It is now stated that the site server configuration must be used in the following cases:

  • To manage more than 3,000 devices and collect operation logs

  • To manage more than 5,000 devices by using the distribution function but no operation logs will be collected

It is also stated that the maximum number of managed devices on a single site server is as follows:

  • When collecting operation logs: 1,000

  • When collecting no operation logs: 3,000

4.4, 4.4.4, 4.6.5

MobileIron 5.8 was added as an MDM system that can be linked.

4.4.8

If free space in data folders on a site server is insufficient, the system now outputs an event based on the free space size or automatically stops part of the Job Management Partner 1/IT Desktop Management features.

4.5.4

The guidelines for disk space requirements for the operation log database were changed.

4.5.6

The guidelines for recommended disk space were changed.

4.5.9

The description about port settings was modified. In addition, a description about the network between Job Management Partner 1/IT Desktop Management - Remote Site Server and agentless computers was added.

A.3

The values that can be specified for the following items in the Settings module were changed:

  • Items of the USB Device Registration Setting view (under Agent Configuration Items) that opens from the Agent Configurations view (under Agent)

  • Items of the AMT Settings view that opens from Device

  • Items of the Active Directory view (under General)

  • Items of the MDM Linkage Settings view (under General)

A.4(7), A.4(12), A.4(18), A.4(20)

The memory requirements for the following servers were changed:

  • Management server for a single-server configuration system

  • Database server for a multi-server configuration system

A.5(1)

The description about how agent updates are automatically checked was deleted.

A.7

In addition to the above changes, minor editorial corrections were made.