Hitachi

JP1 Version 12 JP1/IT Desktop Management 2 Overview and System Design Guide


1.3.3 Working with the Security module

In the Security module, you can create security policies (security rules). Once you assign security policies to computers, you can manage security throughout the system and take action if any computer is insecure. You can also manage operation logs and investigate suspicious operations, and check whether Windows updates have been applied.

The Security module provides the following views:

Each view is described next.

Overview view

The panels in this view provide a summary of the security of the managed computers in the organization.

[Figure]

Security Policies view

In this view you can create security policies and assign them to groups. By using computer policies you can manage the system security according to the assigned security rules.

[Figure]

Details about compliance with the security policy you select in the upper pane of the information area is shown in the tabs in the lower pane. You can check compliance with each security setting and take measures if any device has violated the security policy.

Computer Security Status view

In this view you can check the security of each computer, and send the user a message or enforce security measures if a computer violates the security policy. You can also assign security policies to individual computers.

[Figure]

Security compliance for the computer you select in the upper pane of the information area is shown in the tabs in the lower pane. You can check the computer's compliance with each security setting.

Windows Update view

In this view you can check whether Windows updates have been applied to computers. You can also manage the Windows updates that are required under the particular security policy and automatically distribute and apply Windows updates that have not been implemented.

[Figure]

Information about the Windows update you select in the upper pane of the information area is shown in the tabs in the lower pane. You can check whether the update is built into the security policy and identify computers where updates have not been applied.

Operation Logs view

In this view you can check the operation logs collected on the management server.

You can view a listing of operation logs and investigate suspicious operations. You can track file movements to and from the system and identify the computers involved, enabling early detection and response to information leaks.

[Figure]

This view appears only if operation logs are being acquired on the management server.