Hitachi

Job Management Partner 1 Version 10 Job Management Partner 1/IT Desktop Management Overview and System Design Guide


2.10.8 Prerequisites and notes on collecting operation logs

Organization of this subsection

(1) Notes on collecting operation logs

(2) Information and notes about operation logs for startup and blockage of programs

Programs that are determined to be illegal by the administrator or for which use is restricted can be blocked from startup. If the administrator sets programs in a security policy, startup of the programs can be allowed or blocked. The following provide information and notes about when operation logs are collected for the startup and blockage of programs:

Information about operation logs to be collected

The startup of the programs that have any of the following file name extensions can be blocked:

Startup and blocking of the following programs in the JP1/IT Desktop Management - Agent-installation-folder\bin folder will not be collected in operation logs.

Notes

Related Topics:

(3) Prerequisites for and notes on collecting web access operation logs

The following describes the prerequisites and notes when operation logs are collected for web accesses.

Prerequisites

Tip

An add-on for monitoring is added to the web browser on the agent-installed computer. This add-on detects web accesses. Uploads, downloads, sending, and receiving of files are monitored and detected by the agent.

Notes

Related Topics:

(4) Information and notes about operation logs collected for file/folder operations

When a user copys, moves, or deletes a folder, information about the operations for all the files and subfolders in the folder can be collected. Note that when a folder is renamed, information about the operation cannot be collected.

Operation logs are collected for the operations performed using Windows Explorer. Therefore, operations performed at the command prompt or by the COPY command cannot be collected.

The following describes information about operation logs and notes when operation logs are collected for file or folder operations.

If a user performs an undo operation (by selecting the Undo menu or pressing the Ctrl + Z keys) immediately after a file or folder operation, any of the operation logs in the following table is collected.

Operation performed before an undo operation

Operation log collected during an undo operation

Copy

Indicates that the copied file or folder has been deleted.

Move

Indicates that the moved file or folder has been moved back to the original location.

Rename

Indicates that the file or folder has been renamed to the original name.

Delete

Indicates that the deleted file or folder has been moved back to the original location

When a file operation is performed, operation logs for file creation or deletion that is not directly related to the user's operations (such as operations in the Windows Recent Items folder) might be output. Therefore, operation logs that satisfy all the following conditions are not collected:

Also, for operations (on files or folders under the agent installation folder) that satisfy all the following conditions, operation logs are not collected:

Notes

When the OS is Windows 7, Windows Server 2008, or Windows Vista, in addition to the above notes, the following notes are also applied:

Notes (for Windows 8, Windows Server 2012, Windows 7, Windows Server 2008, or Windows Vista)

Related Topics:

(5) Notes on collecting operation logs for file uploads and downloads

Operations for uploading or downloading files on a web browser can be monitored, and the operation logs for those operations can be collected. The following describes the notes you must keep in mind when collecting operation logs for uploading or downloading files.

Note that to detect file uploads and downloads add-ons for monitoring are added to the web browser on an agent-installed computer.

Notes

Related Topics:

(6) Information and notes about operation logs collected when emails are sent and received

Among the emails sent and received by users via email clients, you can collect operation logs for the operations of sending and receiving emails with attachments. The following provide information and notes about when operation logs are collected for the operations of sending and receiving emails.

The following table shows the email clients for which operation logs can be collected.

Email client

Version

Microsoft Outlook Express

6

Microsoft Outlook

2002

2003

2007

2010

2013

Windows Mail

6

Windows Live Mail

2009, 2011, or 2012

The table below shows the email operations for which operation logs can be collected. Note that when multiple attached files are sent or received, operation logs are collected for individual attached files.

Email operation that can be collected

Protocol

Receive

POP3, APOP, or IMAP4

Send

SMTP or ESMTP

Notes

Related Topics:

(7) Notes on collecting operation logs when attached files are saved

You can collect operation logs when attached files are saved from an email a user received using a specific mailer to a local disk or another location. Listed below are some notes on operation logs that are collected for the operations of saving attached files.

The following table shows the email clients for which operation logs can be collected.

Email client

Version

Microsoft Outlook Express

6

Microsoft Outlook

2002

2003

2007#

2010#

2013#

Windows Mail

6

Windows Live Mail

2009, 2011, or 2012

#: If attached files are saved with the network drive specified as the destination, file names that are different from the saved file names will be collected as the destination file names in the operation logs.

Notes

Related Topics:

(8) Notes on collecting operation logs when files are sent and received

You can collect operation logs when a user accesses an FTP site via a web browser and sends or receives files. For the supported web browsers, see the table of prerequisites in 2.10.1 Types of operation logs that can be collected. The following are notes on when operation logs are collected for the operations of sending and receiving files.

Notes

Related Topics:

(9) Information about, prerequisites for, and notes on operation logs collected for print operations

You can collect operation logs for print operations. The table below shows the printers for which operation logs for print operations can be collected. Note that only the printers set in the Devices and Printers dialog box are supported. Note that the printers displayed in the Devices and Printers dialog box can be commonly used by all users.

Printer type

Collection of operation logs for print operations

Local printer

Y

Network shared printer or printer connected to another computer

Y#

Internet printer

N

Virtual printer

Y

Legend: Y: Operation logs can be collected for this type of printer. N: Operation logs cannot be collected for this type of printer.

#: Information about the number of print pages cannot be collected.

Prerequisites

Notes

Related Topics:

(10) Notes on collecting operation logs for external media operations

You can collect operation logs of attaching external media to or detaching external media from devices. These types of operation logs are collected when drives are added, but they are not collected when media (such as CDs, DVDs, SD cards) are inserted or ejected from drives. The followings are notes on collecting operation logs of external media operations.

Notes

Related Topics:

(11) Notes on collecting operation logs for window operations

You can collect operation logs for window OS operations in the following cases:

The followings are notes on collecting operation logs for window operations.

Notes

Related Topics:

(12) Prerequisite for collecting source information when checking incoming files and notes on suspicious out-movement of files

You can collect information about the input source of a file when the file is moved to an agent-installed computer. The following are a prerequisite for collecting source information when checking incoming files and notes on suspicious out-movement of files.

Prerequisite

Notes

Related Topics: