Hitachi

Job Management Partner 1 Version 10 Job Management Partner 1/IT Desktop Management Administration Guide


9.6 Suppressing the use of external media

You can suppress writing to or reading from external media by establishing policies regarding prohibited operations.

To suppress the use of external media:

  1. Display the Security module.

  2. In the menu area, select Security Policy and Security Policy List.

  3. In the information area, select the security policy to edit, and then click Edit.

    To add a new security policy, click Add.

  4. Select Other Access Restrictions, which is a security configuration item.

    The suppression of device operations are disabled if the view is disabled. To enable it, click the Enabled button in the top-left corner.

  5. In External Device Restriction, configure the external media settings that should be suppressed.

    Tip

    The external media that can be suppressed depends on the OS of the computer. Select the tab for the OS and then check the external media to be suppressed. If the Operating System column is blank after checking, you cannot suppress external media on that particular OS.

  6. Click OK.

The use of external media is suppressed according to the established policy regarding prohibited operations.

If hardware asset information about specific USB devices is registered, the USB devices will not be suppressed if you check Allow registered USB device usage. For details on how to register USB devices, see 9.7 Registering USB devices.

Tip

The timing when the External Device Restriction settings take effect differs for each device as follows:

  • USB or IEEE 1394 devices:

    The settings take effect when a security policy is applied to the target computer. However, the settings do not take effect on devices already connected to the computer (but the settings will take effect if the devices are reconnected).*

    *: The Restrict reading/writing settings on USB devices also take effect on the devices being connected.

  • Other devices:

    If you assign a security policy that has External Device Restriction items configured, a message appears prompting the user to restart the computer. The settings take effect when the computer is restarted.