Hitachi

JP1 Version 12 Asset and Distribution Management: Getting Started


2.4.1 Understanding the cycle for guaranteeing the basic security level

The following figure shows the cycle for guaranteeing the basic security level.

[Figure]

This manual describes, based on the above cycle, how to set up the environment for basic operation, understand the status, and then check the report and implement measures. This subsection provides an example of how to check the report and take measures by using the Timeframe Diagnosis report.

Operation procedure

  1. Click the Reports button.

    [Figure]

    The Reports module appears.

  2. Select Security Diagnosis Reports, and then Timeframe Diagnosis.

    This week's security diagnostic report is displayed.

  3. According to the information displayed in Total Security Assessment and Category Assessment Status, take measures as follows:

    • Compare the Total Security Assessment value with the value of the previous week

      If the value has increased: Correct weak points to improve the security level.

      If the value has decreased: Check the degraded category, find the cause of degradation, and take measures promptly.

      If the value has not changed: Review and improve the current security measures

    • Check Category Assessment Status

      If a bias exists: Reinforce the weak points.

      If a bias does not exist: Raise the overall security level.

      [Figure]

      Tip

      After you have instructed computer users to take virus protection measures, check whether the measures have been taken properly, as described below. This will enable thorough virus protection.

      • Use the Security module or Reports module to confirm that the number of computers in Critical status has decreased.

      • After a certain period has passed since you instructed users to take virus protection measures, if there are still computers on which virus protection measures have not been taken, warn and re-instruct the users of those computers.

      Note

      Some security measures can be automatically taken by changing the security policy settings. Individual computer users do not need to manually specify settings for the security measures that are automatically taken. For details, see the description Countermeasures for security policy violations in the JP1/IT Desktop Management 2 Overview and System Design Guide.

What you do next

Now you can continue basic operations for security management. To distribute files to user computers, proceed to 3. Task 2: Distribute Files. If you do not need to distribute files or if you are using JP1/IT Desktop Management 2 - Operations Director, see Appendixes.