2.1 List of features
Feature |
Description |
---|---|
System summary |
You can use the home module and dashboards to view the status of the system from a variety of perspectives. |
User account management |
By setting permissions, task allocations, and administration scopes, you can create user accounts suited to the role and responsibilities of each administrator who manages JP1/IT Desktop Management 2. |
Setup wizard |
A wizard is provided that guides you through the process of setting up JP1/IT Desktop Management 2. |
Agent installation |
You can register a user's computer as a management target of JP1/IT Desktop Management 2 by installing the agent program on the computer. This allows you to use the features of JP1/IT Desktop Management 2 to manage that computer. There are several ways to install the agent. For example, an administrator can install the agent program manually, or you can distribute the program automatically from a management server. |
Device management |
When a device becomes a management target, you can use the features of JP1/IT Desktop Management 2 to manage the device. These include collecting and displaying device information, and monitoring and controlling whether devices are on or off. Managed devices can also be assessed against a security policy and contribute data to reports. You can use the search function and network monitoring function to discover the devices in your organization and automatically designate them as management targets. |
Remote control |
You can use the controller program to access the desktop of a user's computer and control it remotely. You can also use this program to send and receive files, record and play back screen activity, and chat with users. |
Network connection management |
JP1/IT Desktop Management 2 can monitor the network, preventing access by unauthorized devices and automatically isolating computers that are identified as a security risk. |
Security management |
You can determine the security status of the computers in your organization by creating a security policy to assess them against. You can also implement security measures automatically and remotely on computers that might pose a security risk, and send messages notifying users of potential issues. |
Operation log management |
You can acquire operation logs that record the history of tasks a user has performed, and view this information in the operation window. This feature allows you to scrutinize the log data closely when suspicious operations are detected that might lead to information being disclosed. |
Asset management |
You can manage the operating status of your system by keeping an inventory of the hardware assets and software licenses in your organization. There are two asset information management methods provided by JP1/IT Desktop Management 2.
|
Software and file distribution |
Administrators can distribute software and files on users' computers without needing to be on site. Distribution can be performed in the following two ways:
Distribution using Remote Installation Manager and ITDM-compatible distribution are different functions. Therefore, the data for a function can only be used by that function. For example, software managed by Remote Installation Manager cannot be distributed using ITDM-compatible distribution. |
File collection |
You can collect files stored in users' computers. You can collect data (created by users) and error logs (output by software used by users) in a single operation. |
Event viewer |
You can view events that record the nature and results of actions performed by JP1/IT Desktop Management 2 features. |
Report viewer |
You can display all manner of reports describing aspects of your system such as the overall system status, the results of security diagnoses, power savings, and asset costs. |
Filters |
You can use filters to refine the information displayed in the modules. You can also save filter conditions for later use. |
Use in cluster systems |
You can use JP1/IT Desktop Management 2 in a cluster system. |
Database management |
You can use the database manager provided by JP1/IT Desktop Management 2 to back up and maintain the database. |
Command line interface |
You can use commands to perform a variety of tasks, such as importing and exporting management information and backing up and maintaining the database. |
Operations on user computers |
Users of managed computers will sometimes interact with JP1/IT Desktop Manager on their computers. This might entail viewing messages received from the management server, or entering user information. |
Smart device control |
By linking with an MDM system, JP1/IT Desktop Management 2 can lock, wipe, and otherwise control smart devices. |