Hitachi

Job Management Partner 1 Version 10 Job Management Partner 1/IT Desktop Management 2 Overview and System Design Guide


2.6.4 Managing offline computers

Besides network-accessible computers, JP1/IT Desktop Management 2 can manage computers that it cannot access over the network, including standalone computers and computers connected to an isolated network at a remote site.

The management of computers that cannot be accessed over a network is achieved by using external media to install the agent on the computer and collect device information.

This process of using external media to manage computers that the management server cannot access over the network is called offline management, in contrast toonline management which involves the management of computers that are connected to the management server by a network.

Storage capacity required on external storage devices

Device information is collected from offline-managed computers by an information collection tool stored on external media. The following free space must be available on the external media:

5 MB + (50 KB x the number of computers for which device information is collected)

There are some differences in management server capabilities depending on whether a computer is managed online or offline. For details on these differences, see (1) Functional differences between agent/agentless management.

Organization of this subsection

(1) Functional differences between agent/agentless management

There are some differences in management server capabilities depending on whether the managed computers have an agent installed or are agentless. In the case of computers with an installed agent, other differences arise depending on whether the computers are managed online or offline.

The following table describes functional differences by configuration type:

Function

Managed computers

Agent installed

Agentless

Online management

Offline management

Acquisition of device information#1

Y

Y

D

Security diagnostics

Assign security policies

Y

Y

Y

Evaluate security

Y

Y

D#2

Actions at security policy violation

Automatic security measures

Y

N

N

Restrict printing

Y

N

N

Disable data export

Y

N

N

Disable software startup

Y

N

N

Acquire operation logs

Y

N

N

Send warning messages

Y

N

N

Power on/off

Y

N

N

Management of asset information

Manage hardware

Y

Y#3

D

Manage software licenses

Y

Y

D

Manage software

Y

Y

Y

Manage contracts

Y

Y

Y

Distribution of software and files

Distribute software

Y

Y#4

N

Distribute files

Y

Y#4

N

Uninstall software

Y

N

N

Remote control of devices

Remote control of computers

Y

N

D#5

Connection requests from computers

Y

N

N

File transfer

Y

N

N

Chat

Y

N

N

Management of device network connections

Enable network access control

Y

N

N

Control network connections

Y

N

Y

Report creation

Y

Y

D

Legend: Y: Supported. D: Depends on the collectable device information. N: Not supported.

#1: The device information that can be collected depends on whether the computers have installed agents or are agentless. See the following for details on the information collected from each type of computer.

#2: Use the Windows Administrative Share feature to evaluate the security of agentless computers. Screensaver security cannot be determined on a per-account basis when using agentless management.

#3: USB devices cannot be registered.

#4: Only distribution using Remote Installation Manager can be performed. ITDM-compatible distribution cannot be performed.

#5: RFB protocol must be used for remote control.