2.1 List of features
- Tip
-
For JP1/IT Desktop Management 2 - Operations Director, some functions in the following lists are not supported. For details, see A.13 Functional restrictions in JP1/IT Desktop Management 2 - Operations Director.
Feature |
Description |
---|---|
System summary |
You can use the home module and dashboards to view the status of the system from a variety of perspectives. |
User account management |
By setting permissions, task allocations, and administration scopes, you can create user accounts suited to the role and responsibilities of each administrator who manages JP1/IT Desktop Management 2. |
Setup wizard |
A wizard is provided that guides you through the process of setting up JP1/IT Desktop Management 2. |
Agent installation |
You can register a user's computer as a management target of JP1/IT Desktop Management 2 by installing the agent program on the computer. This allows you to use the features of JP1/IT Desktop Management 2 to manage that computer. There are several ways to install the agent. For example, an administrator can install the agent program manually, or you can distribute the program automatically from a management server. |
Device management |
When a device becomes a management target, you can use the features of JP1/IT Desktop Management 2 to manage the device. These include collecting and displaying device information, and monitoring and controlling whether devices are on or off. Managed devices can also be assessed against a security policy and contribute data to reports. Note that agents for UNIX or Mac are excluded from the power management. You can use the search function and network monitoring function to discover the devices in your organization and automatically designate them as management targets. |
Remote control |
You can use the controller program to access the desktop of a user's computer and control it remotely. You can also use this program to send and receive files, record and play back screen activity, and chat with users. Note that agents for UNIX are excluded from the remote operation. In addition, for a computer running Mac OS, only remote control via RFB connections can be used. |
Network connection management |
JP1/IT Desktop Management 2 can monitor the network, preventing access by unauthorized devices and automatically isolating computers that are identified as a security risk. Enabling or disabling network connections of agents for UNIX must be performed manually. |
Security management |
You can determine the security status of the computers in your organization by creating a security policy to assess them against. You can also implement security measures automatically and remotely on computers that might pose a security risk, and send messages notifying users of potential issues. Note that agents for UNIX are excluded from the security status assessment based on security policy, and from automatic countermeasure enforcement in response to a security-related problem. Agents for Mac are excluded from the automatic countermeasure enforcement in response to a security-related problem. |
Operation log management |
You can acquire operation logs that record the history of tasks a user has performed, and view this information in the operation window. This feature allows you to scrutinize the log data closely when suspicious operations are detected that might lead to information being disclosed. Note that agents for UNIX or Mac are excluded from the collection of operation log data. |
Asset management |
You can manage the operating status of your system by keeping an inventory of the hardware assets and software licenses in your organization. There are two asset information management methods provided by JP1/IT Desktop Management 2.
|
Software and file distribution |
Administrators can distribute software and files on users' computers without needing to be on site. Distribution can be performed in the following two ways:
Distribution using Remote Install Manager and ITDM-compatible distribution are different functions. Therefore, the data for a function can only be used by that function. For example, software managed by Remote Install Manager cannot be distributed using ITDM-compatible distribution. Note that you must use Remote Install Manager to distribute data to agents for UNIX or Mac and to check the execution status. |
File collection |
You can collect files stored in users' computers. You can collect data (created by users) and error logs (output by software used by users) in a single operation. Note that files cannot be collected from agents for Mac OS. |
Event viewer |
You can view events that record the nature and results of actions performed by JP1/IT Desktop Management 2 features. |
Report viewer |
You can display all manner of reports describing aspects of your system such as the overall system status, the results of security diagnoses, power savings, and asset costs. |
Filters |
You can use filters to refine the information displayed in the modules. You can also save filter conditions for later use. |
Management of a large system comprised of multiple departments or networks |
You can install multiple management servers depending on the scale and network configuration of the system to be managed, to perform load distribution among administrators or management servers, or support operation in a NAT environment. |
Use in cluster systems |
You can use JP1/IT Desktop Management 2 in a cluster system. |
Database management |
You can use the database manager provided by JP1/IT Desktop Management 2 to back up and maintain the database. |
Command line interface |
You can use commands to perform a variety of tasks, such as importing and exporting management information and backing up and maintaining the database. |
Operations on user computers |
Users of managed computers will sometimes interact with JP1/IT Desktop Manager on their computers. Note that for agents for UNIX or Mac OS, messages received from the management server cannot be viewed, and user information cannot be entered. |
Smart device control |
By linking with an MDM system, JP1/IT Desktop Management 2 can lock, wipe, and otherwise control smart devices. |
Management of computers via the Internet |
You can manage users' computers connected via the Internet. The management of computers is possible not only when the management server and users' computers are connected to one another by using VPN but also when a VPN connection is not used. |