Hitachi

Job Management Partner 1 Version 10 Job Management Partner 1/IT Desktop Management 2 Overview and System Design Guide


2.1 List of features

Feature

Description

System summary

You can use the home module and dashboards to view the status of the system from a variety of perspectives.

User account management

By setting permissions, task allocations, and administration scopes, you can create user accounts suited to the role and responsibilities of each administrator who manages JP1/IT Desktop Management 2.

Setup wizard

A wizard is provided that guides you through the process of setting up JP1/IT Desktop Management 2.

Agent installation

You can register a user's computer as a management target of JP1/IT Desktop Management 2 by installing the agent program on the computer. This allows you to use the features of JP1/IT Desktop Management 2 to manage that computer.

There are several ways to install the agent. For example, an administrator can install the agent program manually, or you can distribute the program automatically from a management server.

Device management

When a device becomes a management target, you can use the features of JP1/IT Desktop Management 2 to manage the device. These include collecting and displaying device information, and monitoring and controlling whether devices are on or off. Managed devices can also be assessed against a security policy and contribute data to reports.

You can use the search function and network monitoring function to discover the devices in your organization and automatically designate them as management targets.

Remote control

You can use the controller program to access the desktop of a user's computer and control it remotely. You can also use this program to send and receive files, record and play back screen activity, and chat with users.

Network connection management

JP1/IT Desktop Management 2 can monitor the network, preventing access by unauthorized devices and automatically isolating computers that are identified as a security risk.

Security management

You can determine the security status of the computers in your organization by creating a security policy to assess them against.

You can also implement security measures automatically and remotely on computers that might pose a security risk, and send messages notifying users of potential issues.

Operation log management

You can acquire operation logs that record the history of tasks a user has performed, and view this information in the operation window.

This feature allows you to scrutinize the log data closely when suspicious operations are detected that might lead to information being disclosed.

Asset management

You can manage the operating status of your system by keeping an inventory of the hardware assets and software licenses in your organization. There are two asset information management methods provided by JP1/IT Desktop Management 2.

  • Managing assets by using Asset Console

    You use Asset Console to manage assets. This is recommended if you want to manage asset information in more detail than when you use the JP1/IT Desktop Management 2 operation window: for example, if you want to customize an asset information search window, or manage asset information that uses Items.

  • Managing assets using the JP1/IT Desktop Management 2 operation window

    Use the JP1/IT Desktop Management 2 - Manager operation window (Assets module) to manage assets. This is recommended when you want to manage assets easily by using information collected by JP1/IT Desktop Management 2.

Software and file distribution

Administrators can distribute software and files on users' computers without needing to be on site. Distribution can be performed in the following two ways:

  • Distribution using Remote Installation Manager

    You use Remote Installation Manager for distribution. In this way, you can specify detailed conditions and operations on the distribution-destination computer. You can also use commands to distribute the software and files managed by Remote Installation Manager. The commands enable regular distribution using a batch file or automatic distribution in response to a specific event linking with JP1/AJS. This type of distribution is recommended if you want to specify detailed distribution conditions, or if you want to perform distribution every day.

  • Distribution using the operation window (ITDM-compatible distribution)

    You use Distribution (ITDM-compatible) modules of the operation window for distribution. Unlike distribution using Remote Installation Manager, you cannot specify detailed conditions or operations. Instead, you can let the installer automatically install MSI-file-based software on the distribution-destination computer with simple steps using a wizard. You can also uninstall some of the software installed on a user's computer. This type of distribution is recommended when you want to distribute software with an MSI-file installer a few times in a week or month.

Distribution using Remote Installation Manager and ITDM-compatible distribution are different functions. Therefore, the data for a function can only be used by that function. For example, software managed by Remote Installation Manager cannot be distributed using ITDM-compatible distribution.

File collection

You can collect files stored in users' computers. You can collect data (created by users) and error logs (output by software used by users) in a single operation.

Event viewer

You can view events that record the nature and results of actions performed by JP1/IT Desktop Management 2 features.

Report viewer

You can display all manner of reports describing aspects of your system such as the overall system status, the results of security diagnoses, power savings, and asset costs.

Filters

You can use filters to refine the information displayed in the modules. You can also save filter conditions for later use.

Use in cluster systems

You can use JP1/IT Desktop Management 2 in a cluster system.

Database management

You can use the database manager provided by JP1/IT Desktop Management 2 to back up and maintain the database.

Command line interface

You can use commands to perform a variety of tasks, such as importing and exporting management information and backing up and maintaining the database.

Operations on user computers

Users of managed computers will sometimes interact with JP1/IT Desktop Manager on their computers. This might entail viewing messages received from the management server, or entering user information.

Smart device control

By linking with an MDM system, JP1/IT Desktop Management 2 can lock, wipe, and otherwise control smart devices.