Hitachi

Job Management Partner 1 Version 10 Job Management Partner 1/IT Desktop Management 2 Overview and System Design Guide


B. Glossary

This section explains the terminology used in JP1/IT Desktop Management 2.

A

Active Directory server

A server with Active Directory installed. An Active Directory server connects to Job Management Partner 1/IT Desktop Management 2 in systems that manage devices by linking with Active Directory.

added management item

A custom management item added to the asset information managed by JP1/IT Desktop Management 2. By creating added management items, administrators can manage information tailored to their needs.

Administration scope

A user account parameter that defines the scope of the administrator's responsibility within the organization.

administrator computer

The computer a JP1/IT Desktop Management 2 administrator uses to log in to JP1/IT Desktop Management 2.

agent

A program installed on computers managed by JP1/IT Desktop Management 2. The agent reports information to JP1/IT Desktop Management 2 - Manager, and controls the computer based on instructions received from JP1/IT Desktop Management 2 - Manager. The program name is JP1/IT Desktop Management 2 - Agent.

agent configurations

The settings used to set up the agent on a managed computer. Agent configurations are kept on the management server. You can remotely change how an agent is configured by creating agent configurations from an operation window and assigning them to the agent.

agentless

A managed device without JP1/IT Desktop Management 2 - Agent installed.

Asset management using Asset Console

A feature that manages assets by using Asset Console, which is a JP1/IT Desktop Management 2 component. Asset management using an operation window is called as such.

B

blacklist method

A method of controlling network access by specifying devices that are not allowed to connect to the network. Devices not specified in the list are allowed to connect to the network.

C

chat server

A connection destination for computers that will be taking part in a chat session.

connection list

A feature that lets you manage connection-destination computers for the remote control function independently, without using the JP1/IT Desktop Management 2 operation module.

contract company information

A class of asset information managed by JP1/IT Desktop Management 2. Contract company information consists of contact information for companies from which an organization has licensed software or entered into an agreement regarding a device (hardware asset).

contract company list

A list used to manage contract company information.

contract information

A class of asset information managed by JP1/IT Desktop Management 2. Contract information consists of information about contracts related to devices (hardware assets) and licensed software.

controller

A program that remotely controls a managed computer.

custom group

A group created by an administrator for a specific purpose. You can use custom groups to group the information managed by JP1/IT Desktop Management 2 in meaningful ways.

D

database manager

A tool used to back up and restore the database, and reorganize the database area.

default agent configuration

A group of agent settings provided by JP1/IT Desktop Management 2. These settings include the connection-target management server, installation parameters, and other settings needed to set up the agent.

default policy

A security policy provided by JP1/IT Desktop Management 2. This policy contains the basic settings required to maintain a secure environment.

The default policy is assigned to managed computers by default. It is also assigned if you remove a security policy from a managed computer to which no other security policies are assigned.

device information

Information that JP1/IT Desktop Management 2 collects from managed devices. Device information is required for managing computers, and includes the hardware usage and installed software types on the managed computers. You can view device information in the Device Inventory view of the Device module.

diagnosis

The process of evaluating a system by assessing its security status. You can view the results of a diagnosis in a report.

Distribution using Remote Installation Manager

A feature of distribution using Remote Install Manager (which is a JP1/IT Desktop Management 2 component). You can also use a command for distribution. This is one of the two distribution features provided by JP1/IT Desktop Management 2, and the other is ITDM-compatible distribution.

E

external media

Writable media such as USB memory and external hard drives. You can use external media to install offline management agents and to collect device information from computers that are being managed offline.

H

hardware asset information

A class of asset information managed by JP1/IT Desktop Management 2. Information about the devices (hardware assets) held by an organization is registered as hardware asset information.

I

information area

An area that appears in the right side of the operation window. The information displayed in this area depends on the menu item selected in the menu area on the left side of the window.

information collection tool

A tool that collects device information from computers being managed offline. The information collection tool consists of the getinv.vbs command and files containing the information needed to collect device information.

installation set

A program that helps users install and set up JP1/IT Desktop Management 2 - Agent in one operation. An installation set is created on a management server, and provides an installer that handles the installation and setup of the agent.

installed software

The software installed on a managed computer. JP1/IT Desktop Management 2 automatically collects information about installed software as device information.

ITDM-compatible distribution

A feature of distribution using the Distribution (ITDM-compatible) operation window, which is one of the two distribution features provided by JP1/IT Desktop Management 2. The other distribution feature is one that uses Remote Installation Manager.

J

JCR file

A file used by JP1/IT Desktop Management 2 to store video information. Video recorded during a remote control session is saved as a JCR file with the extension JCR. You can play back JCR files in the remote control player.

Job Management Partner 1/IT Desktop Management 2

A system that manages IT assets from device management, security management, and asset management perspectives.

Job Management Partner 1/IT Desktop Management 2 - Agent

A program installed on computers managed by Job Management Partner 1/IT Desktop Management 2.

Job Management Partner 1/IT Desktop Management 2 - Asset Console

A program installed on the asset management server.

Job Management Partner 1/IT Desktop Management 2 - Manager

A program that provides the server functionality of Job Management Partner 1/IT Desktop Management 2.

Job Management Partner 1/IT Desktop Management 2 - Network Monitor

A program installed on a computer that monitors the network.

JP1/NETM/Network Monitor

A program that monitors the network and controls the network connections of devices. JP1/NETM/NM is installed on a network control appliance.

JP1/NETM/Network Monitor - Manager

A program that centrally manages JP1/NETM/NM. JP1/NETM/NM - Manager is installed on the management server in systems that link with JP1/NETM/NM - Manager.

judgment

The process of assessing the device information collected from each computer by JP1/IT Desktop Management 2 against a security policy, and assigning a security level (violation level) for each item in the security policy and for the computer in general.

judgment-excluded user settings file

A file that specifies OS user accounts to exclude from security status judgment.

L

license key file

A file provided to purchasers of JP1/IT Desktop Management 2 licenses. A license key file is used to activate a license.

M

managed-software information

A class of asset information managed by JP1/IT Desktop Management 2. JP1/IT Desktop Manager uses managed-software information to keep track of software licenses. You can display the number of software licenses for each piece of managed software, and see how many of those licenses are in use. You can also manage several versions of the same software as one set of managed-software information.

management server

A computer on which JP1/IT Desktop Management 2 - Manager is installed. This can be also called a distribution management system or manager in a description regarding distribution using Remote Installation Manager.

mandatory software

Software that must be installed on every computer in an organization. Mandatory software is one aspect of a security policy.

MDM product

A product that manages smart devices. An MDM product is installed on an MDM server, and links with Job Management Partner 1/IT Desktop Management 2 to manage smart devices.

MDM server

A server with an MDM solution installed. An MDM server connects with Job Management Partner 1/IT Desktop Management 2 when you manage smart devices by linking with an MDM product.

MDM system

A generic name for the MDM products that manage smart devices.

menu area

An area that appears in the left side of the operation window. The menu displayed in this area depends on the selected module. Select a menu item to display the corresponding information in the information area on the right side of the operation window.

N

network control appliance

An appliance product with JP1/NETM/NM installed. By linking with JP1/NETM/NM - Manager, you can use JP1/IT Desktop Management 2 to control the network connections in network segments that are monitored by a network control appliance.

network control list

Settings that define whether individual devices are allowed to connect to the network. You can also permit a device to access the network for a set period of time.

network monitor

A feature that automatically detects when a device without permission (a device that is not registered as a management target or exclusion target) is connected to the network, and controls the network connection.

network monitor agent

A program installed on a computer that monitors the network. The network monitor agent is installed automatically when you select a computer that is managed online in the operation module and enable the network monitor. The program name is Job Management Partner 1/IT Desktop Management 2 - Network Monitor.

network monitor settings

Settings that define how network monitor controls the network connections of devices that establish new connections to network segments with the network monitor feature enabled.

O

offline management

A method of using external media to manage computers that the management server cannot access over the network. In contrast to online management.

offline management agent

An agent that is configured to not connect to the management server in the agent configurations. Install an offline management agent on computers that you want to manage offline. In contrast to an online management agent.

offline management framework

A framework used to manage computers that the management server cannot access over the network. This includes standalone computers and computers connected to an isolated network at a remote site.

online management

A way to manage computers that are connected to the management server by a network. In contrast to offline management.

online management agent

An agent that is configured to communicate with the higher systems in the agent configurations. Install an online management agent on computers that you want to manage online. In contrast to offline management agent.

operation log

Log information about operations performed on managed computers. You can collect operation logs from computers that are managed online.

P

package (for ITDM-compatible distribution)

A set of software programs or files to be distributed to other computers, which is registered in JP1/IT Desktop Management 2 from the Distribution (ITDM-compatible) window. You can also use this window to distribute a package.

prohibited software

Software whose use is prohibited within an organization. Prohibited software is one aspect of a security policy.

R

recommended security policy

A security policy provided by JP1/IT Desktop Management 2. The settings in this policy are designed to create a robust security environment.

Relay system

A server on which JP1/IT Desktop Management 2 - Agent is installed as a relay system. Using a relay system can reduce the load caused by remote installation and remote collection on the management server and the network. The program name is JP1/IT Desktop Management 2 - Agent.

Remote collection

A feature of batch collection of files stored in the managed computers by using Remote Installation Manager.

remote control agent

A component of the agent program. All remote control functions become available when a standard connection is used between the remote control agent and the controller.

remote control feature

A feature that allows a user to connect to a remote computer and control it using keyboard and mouse operations.

remote control player

A video player that plays back video recorded in a remote control session. The remote control player lets you pause and skip the video as needed.

Remote installation

A feature of batch distribution of software programs and files from the management server to users' computers via the network.

Remote Installation Manager

A component of JP1/IT Desktop Management 2. Install this component if you want to perform distribution using Remote Installation Manager.

removable disk

A recordable disk that can be removed from a disk drive.

report

A window that presents information compiled from the JP1/IT Desktop Management 2 database for a certain purpose. You can then print the information displayed on the screen.

request server

A feature that processes connection requests for the remote control function.

revision history

Information that serves as a record of changes made to the device information of a managed computer. You can view revision history from the operations module, or output it to a CSV file for archival purposes.

revision history archive

Revision history entries output as a CSV file for archival purposes.

RFB

A communication protocol used to access remote computers over a network. RFB is primarily used in Virtual Network Computing (VNC), and supports communication between computers running different operating systems. JP1/IT Desktop Management 2 uses RFB to remotely control agentless computers and computers running OSs other than Windows.

S

search

The process of discovering devices connected to the network in a specified network range, and devices registered with Active Directory.

security policy

A set of rules that define the criteria for determining danger levels, and actions to perform when certain conditions are met. You can define security policies on the management server and assign them to managed computers.

In a security policy, you can set criteria for determining the danger level of a computer, and define actions that take place automatically under certain conditions. You can also configure the system to warn the user when a computer reaches a particular danger level.

smart device

A small, portable terminal device such as a smartphone, tablet PC, or PDA.

software license information

A class of asset information managed by JP1/IT Desktop Management 2. Software license information is used to manage software licenses for individual purchases (at the asset level).

support information file

A file used to register information about the latest program updates information in JP1/IT Desktop Management 2.

support service site

A Web site to provide support services. JP1/IT Desktop Management 2 can acquire the latest updates for the OS and Internet Explorer by connecting to the support service site over the Internet.

suspicious file transfer

A suspicious operation detected when the following actions are deemed suspicious in a security policy:

Send/Receive E-mail with Attachments

Use Web/FTP Server

Copy/Move the File to External Device

suspicious print operation

A suspicious operation detected when Large Number of Printing Jobs is selected as a target of suspicious activity monitoring in a security policy.

system administrator permission

A permission you can assign when you create a user account in JP1/IT Desktop Management 2. A user with this permission has full access to the management features of JP1/IT Desktop Management 2, with the exception of user account management.

T

task

An single act of installing software distributed from the management server, distributing files, or uninstalling software. Each software or file distribution task involves the distribution of a specific package.

task allocation

A user account parameter that defines the tasks for which an administrator is responsible. By setting up user accounts with the appropriate combination of task allocations and permissions, you can limit the operations an administrator can perform to those appropriate to his or her role.

U

update group

A group of update programs to be applied or removed together. By specifying an update group in a security policy, you can apply or remove the update programs in that group to or from all computers that are subject to the security policy.

user management permission

A permission you can assign when you create a user account in JP1/IT Desktop Management 2. A user with this permission is able to add and delete user accounts in JP1/IT Desktop Management 2.

V

view permission

A permission assigned when you create a user account in JP1/IT Desktop Management 2. A user with this permission is able to view modules other than the Settings module, but cannot add new information or change existing settings.

violation level

A rating that indicates the security risk posed by a computer. A computer's violation level is determined by assessing it against a security policy. There are six violation levels: Critical, Important, Warning, Safe, Unknown, and Out of Target.

VNC

Software used to remotely control another computer over a network.

W

whitelist method

A method of controlling network access by specifying devices that are allowed to connect to the network. Devices not specified in the list are blocked from connecting to the network.

Windows Update

A program that applies updates to Windows, Internet Explorer, and other products provided by Microsoft.