Hitachi

Job Management Partner 1 Version 10 Job Management Partner 1/IT Desktop Management 2 - Asset Console Administration Guide


2.5.1 Checking for unauthorized software installations (Unauthorized Install List)

By using the Unauthorized Install List job menu, you can check for installation of unauthorized software assets.

To set the permission to install registered software assets, use the Installed Software window. To register the name of newly installed software from JP1/IT Desktop Management 2 - Manager's management information, use the ITDM2 management information acquisition job menu.

For details about the setup method in the Installed Software window, see 4.7 Changing information about installed software (Installed Software).

To determine whether the installation of software is permitted, check the Unauthorized Install List window that is displayed by clicking the Unauthorized Install List job menu. The following figure shows the Unauthorized Install List window.

Figure 2‒54: Unauthorized Install List window

[Figure]

Organization of this subsection

(1) Displaying a breakdown by group

In totaled results, clicking a link under Installed software name displays the number of devices on which that software asset has been installed for each group.

The following figure shows the window that displays a breakdown by group of the number of devices on which a software asset has been installed.

Figure 2‒55: Window displaying a breakdown by group (Unauthorized Install List)

[Figure]

(2) Displaying a list of devices on which software is installed

In the window that displays a breakdown by group, clicking a link under Group name displays a list of devices on which the corresponding software has been installed. The following figure shows the window that displays the devices on which the software asset has been installed.

Figure 2‒56: Window displaying the devices on which a software asset has been installed (Unauthorized Install List)

[Figure]

(3) Downloading the search results

You can download the search results list as a CSV file. To do this, select the check box for the desired software, and then click the CSV button. The search results are downloaded as a CSV file.

The information that is downloaded to a CSV file includes Installed software name, Install software version, File name, File size, File date, Group name, Asset No., and User name.