Hitachi

JP1 Version 12 JP1/IT Desktop Management 2 Overview and System Design Guide


2.8 Managing network connections

With the proliferation of wireless LANs and mobile devices, there is a risk of employees or outsiders bringing their personal devices onto company premises and connecting to your company network. Unsecured devices are a potential source of virus infections and a way to remove data without authorization. To avoid these and other issues, you need to have a clear picture of the devices that connect to your network, and manage them proactively.

By using the network monitor feature, you can protect your corporate network by blocking unauthorized devices. You can also use this feature to detect, in real time, attempts by unknown devices to connect to the network.

[Figure]

To use the network monitor feature, you select a computer in a segment and install the network monitor agent on that computer. Installing the network monitor agent enables the network monitor feature, allowing connections among computers in that segment to be allowed or blocked as needed. Because network monitor agents are managed at the segment level, you will need to install a network monitor agent in each segment in environments that consist of multiple segments.

Note that you cannot block the network connection of a management server, a relay system, or a computer with the network monitor agent installed. In the case of an agent for UNIX or Mac, you can manually grant or deny network connection.

Organization of this section