Hitachi

JP1 Version 12 JP1/IT Desktop Management 2 Overview and System Design Guide


2.1 List of features

Tip

For JP1/IT Desktop Management 2 - Operations Director, some functions in the following lists are not supported. For details, see A.13 Functional restrictions in JP1/IT Desktop Management 2 - Operations Director.

Feature

Description

System summary

You can use the home module and dashboards to view the status of the system from a variety of perspectives.

User account management

By setting permissions, task allocations, and administration scopes, you can create user accounts suited to the role and responsibilities of each administrator who manages JP1/IT Desktop Management 2.

Setup wizard

A wizard is provided that guides you through the process of setting up JP1/IT Desktop Management 2.

Agent installation

You can register a user's computer as a management target of JP1/IT Desktop Management 2 by installing the agent program on the computer. This allows you to use the features of JP1/IT Desktop Management 2 to manage that computer.

There are several ways to install the agent. For example, an administrator can install the agent program manually, or you can distribute the program automatically from a management server.

Device management

When a device becomes a management target, you can use the features of JP1/IT Desktop Management 2 to manage the device. These include collecting and displaying device information, and monitoring and controlling whether devices are on or off. Managed devices can also be assessed against a security policy and contribute data to reports. Note that agents for UNIX or Mac are excluded from the power management.

You can use the search function and network monitoring function to discover the devices in your organization and automatically designate them as management targets.

Remote control

You can use the controller program to access the desktop of a user's computer and control it remotely. You can also use this program to send and receive files, record and play back screen activity, and chat with users. Note that agents for UNIX are excluded from the remote operation. In addition, for a computer running Mac OS, only remote control via RFB connections can be used.

Network connection management

JP1/IT Desktop Management 2 can monitor the network, preventing access by unauthorized devices and automatically isolating computers that are identified as a security risk. Enabling or disabling network connections of agents for UNIX must be performed manually.

Security management

You can determine the security status of the computers in your organization by creating a security policy to assess them against.

You can also implement security measures automatically and remotely on computers that might pose a security risk, and send messages notifying users of potential issues. Note that agents for UNIX are excluded from the security status assessment based on security policy, and from automatic countermeasure enforcement in response to a security-related problem. Agents for Mac are excluded from the automatic countermeasure enforcement in response to a security-related problem.

Operation log management

You can acquire operation logs that record the history of tasks a user has performed, and view this information in the operation window.

This feature allows you to scrutinize the log data closely when suspicious operations are detected that might lead to information being disclosed. Note that agents for UNIX or Mac are excluded from the collection of operation log data.

Asset management

You can manage the operating status of your system by keeping an inventory of the hardware assets and software licenses in your organization. There are two asset information management methods provided by JP1/IT Desktop Management 2.

  • Managing assets by using Asset Console

    You use Asset Console to manage assets. This is recommended if you want to manage asset information in more detail than when you use the JP1/IT Desktop Management 2 operation window: for example, if you want to customize an asset information search window, or manage asset information that uses Items.

  • Managing assets using the JP1/IT Desktop Management 2 operation window

    Use the JP1/IT Desktop Management 2 - Manager operation window (Assets module) to manage assets. This is recommended when you want to manage assets easily by using information collected by JP1/IT Desktop Management 2.

Software and file distribution

Administrators can distribute software and files on users' computers without needing to be on site. Distribution can be performed in the following two ways:

  • Distribution using Remote Install Manager

    You use Remote Install Manager for distribution. In this way, you can specify detailed conditions and operations on the distribution-destination computer. You can also use commands to distribute the software and files managed by Remote Install Manager. The commands enable regular distribution using a batch file or automatic distribution in response to a specific event linking with JP1/AJS. This type of distribution is recommended if you want to specify detailed distribution conditions, or if you want to perform distribution every day.

  • Distribution using the operation window (ITDM-compatible distribution)

    You use Distribution (ITDM-compatible) modules of the operation window for distribution. Unlike distribution using Remote Install Manager, you cannot specify detailed conditions or operations. Instead, you can let the installer automatically install MSI-file-based software on the distribution-destination computer with simple steps using a wizard. You can also uninstall some of the software installed on a user's computer. This type of distribution is recommended when you want to distribute software with an MSI-file installer a few times in a week or month.

Distribution using Remote Install Manager and ITDM-compatible distribution are different functions. Therefore, the data for a function can only be used by that function. For example, software managed by Remote Install Manager cannot be distributed using ITDM-compatible distribution.

Note that you must use Remote Install Manager to distribute data to agents for UNIX or Mac and to check the execution status.

File collection

You can collect files stored in users' computers. You can collect data (created by users) and error logs (output by software used by users) in a single operation.

Note that files cannot be collected from agents for Mac OS.

Event viewer

You can view events that record the nature and results of actions performed by JP1/IT Desktop Management 2 features.

Report viewer

You can display all manner of reports describing aspects of your system such as the overall system status, the results of security diagnoses, power savings, and asset costs.

Filters

You can use filters to refine the information displayed in the modules. You can also save filter conditions for later use.

Management of a large system comprised of multiple departments or networks

You can install multiple management servers depending on the scale and network configuration of the system to be managed, to perform load distribution among administrators or management servers, or support operation in a NAT environment.

Use in cluster systems

You can use JP1/IT Desktop Management 2 in a cluster system.

Database management

You can use the database manager provided by JP1/IT Desktop Management 2 to back up and maintain the database.

Command line interface

You can use commands to perform a variety of tasks, such as importing and exporting management information and backing up and maintaining the database.

Operations on user computers

Users of managed computers will sometimes interact with JP1/IT Desktop Manager on their computers. Note that for agents for UNIX or Mac OS, messages received from the management server cannot be viewed, and user information cannot be entered.

Smart device control

By linking with an MDM system, JP1/IT Desktop Management 2 can lock, wipe, and otherwise control smart devices.

Management of computers via the Internet

You can manage users' computers connected via the Internet. The management of computers is possible not only when the management server and users' computers are connected to one another by using VPN but also when a VPN connection is not used.