Hitachi

JP1 Version 12 JP1/IT Desktop Management 2 Overview and System Design Guide


2.9.5 Restricting prohibited operations

You can set a security policy so that some computer operations will be restricted. By doing so, you can prevent information leakage.

Important

The restriction of prohibited operations is not available for API-controlled devices.

Restricting printing

You can restrict print operations. This can help you prevent information (for internal use only) from being taken out in printed form.

You can set a password for allowing printing. This will let you restrict the users who are allowed print operations to those that you disclose the password to.

Important

You cannot restrict output to a printer connected via the Internet. You cannot restrict output to a local printer when using a File port or a LAN Manager port. Also, you might not be able to restrict output to a Windows network shared printer.

When the printing function is used to output a file such as a PDF file, the file might be output even if a message indicating that the printing is restricted appears on the user's computer.

Suppression of Device Usage

You can restrict usage of a device. This prevents information from being taken out via the device. Use of the following devices can be restricted:

  • USB devices (normal USB devices)

  • USB devices (USB devices that are recognized as UASP-enabled devices in Windows 8 and later)

  • Built-in CD/DVD drives

  • Built-in FD drives

  • IEEE1394 devices

  • Built-in SD cards

  • Bluetooth devices

  • Imaging devices

  • Windows portable devices

You can display a message indicating that use of a device is restricted on the user's computer.

If you restrict the use of USB devices, you can permit the use of some registered USB devices or limit assets that can use the USB device based on the department, location, or associated asset. You can also create a list of files stored on the USB devices.

In addition, you can restrict only the writing operation to the following devices:

  • Removable disks

  • CD/DVD drives

  • FD drives

Write-only restrictions can only be applied to permitted devices.

Tip

The write restrictions are enabled after the computer to which a security policy is assigned restarts. After a security policy is applied to a computer, balloon tips regularly appear, prompting the user to restart the computer. Whether balloon tips are displayed depends on the specification in the User notification settings view for the agent configuration.

Restricting startup of software programs

You can block the startup of the software programs that might cause information leakage (for example, file sharing software or messenger software).

You can block the startup of software programs with the following extensions:

  • exe

  • com

  • scr

Note that if the character string made up of the execution file name and the folder name has 260 or more characters, startup of the software program cannot be blocked.

Important

If a software program finishes its processing immediately after it starts up, startup of the program might not be blocked because it might finish before it is blocked.

Important

Do not block startup of the execution files related to the OS and JP1/IT Desktop Management 2. If you block startup of such execution files, the OS or JP1/IT Desktop Management 2 might not operate properly.

Important

If 16-bit software is used, you cannot block the startup of the software program.

Important

If an agent's OS is Windows 7, suppression on the use of devices, printing restriction and collection of operation logs cannot be performed on Windows XP Mode.

Organization of this subsection

(1) Devices whose use can be restricted

By setting prohibited operations in a security policy, you can restrict the use of devices on an agent-installed computer.

The following table shows the devices whose use can be restricted, and conditions for the deterrence targets.

Tip

Devices which have been accessed by a user before the security policy settings are enabled are not subject to the restriction.

Devices that can be restricted

Condition for the deterrence targets#1#6

USB devices (normal USB devices)

Devices to which data can be stored via USB connection#2.

The target devices must satisfy the following two conditions when connected:

  • The device must be displayed under a USB controller in Device by type in the Device Manager window.

  • The device must be displayed under one of the Disk drives, DVD/CD-ROM drives, or Floppy disk drives in the Device Manager window.

In addition, the enumerator of a device that is displayed under one of the Disk drives, DVD/CD-ROM drives, or Floppy disk drives in the Device Manager window must be USBSTOR.

USB devices (USB devices that are recognized as UASP-enabled devices in Windows 8 and later)

Devices to which data can be stored via USB connection#2

The target devices must satisfy the following two conditions when connected:

  • The device must be displayed under USB Attached SCSI (UAS) Mass Storage Device in the Storage controllers in the Device Manager window.

    The service displayed for the device must be UASPStor.

  • The device must be displayed under one of the Disk drives, DVD/CD-ROM drives, or Floppy disk drives in the Device Manager window.

    The enumerator displayed for the device must be SCSI.

Built-in CD/DVD drives

The target devices are CD/DVD drives built in a computer.

These drives are displayed under DVD/CD-ROM drives in Device by type in the Device Manager window. The enumerator of the DVD/CD-ROM drive must be IDE or SCSI.

Built-in FD drives

The target devices are FD drives built in a computer.

These drives are displayed under Floppy disk drives in Device by type in the Device Manager window. The enumerator of the floppy disk drive must be FDC.

IEEE1394 devices

The target devices are the devices connected to the computer with IEEE1394#3.

These drives are displayed under Disk drives in Device by type in the Device Manager window. The enumerator of the disk drive must be SBP2.

Built-in SD cards

The target devices are SD cards connected to the computer via a built-in SD card slot#3.

A device other than an SD card connected via the SD card slot might be regarded as a built-in SD card and subject to restriction.

These drives are displayed under Disk drives in Device by type in the Device Manager window. The enumerator of the disk drive must be SD or RIMMPTSK, or PCISTOR.

Note that an SD card slot that is built in a computer but uses a USB controller might not be regarded as a built-in SD card.

Bluetooth devices

The target devices are Bluetooth devices connected to the computer via USB.

These drives are displayed under Bluetooth in Device by type in the Device Manager window. The enumerator of the Bluetooth must be USB, and the class of the device must be BTW or BTM.

Imaging devices

The target devices are imaging devices connected to the computer via USB#4.

These devices are displayed under Imaging Devices in Device by type in the Device Manager window. The enumerator must be USB.

Windows portable devices

The target devices are Windows portable devices connected to the computer#5.

These devices are displayed under Portable Devices in Device by type in the Device Manager window.

#1: The displayed items might differ depending on the OS settings and other configurations.

#2: The target devices are devices that have one of the following device setup classes:

Class

ClassGuid

CDROM

{4d36e965-e325-11ce-bfc1-08002be10318}

DiskDrive

{4d36e967-e325-11ce-bfc1-08002be10318}

FloppyDisk

{4d36e980-e325-11ce-bfc1-08002be10318}

The Class and ClassGuid device setup classes are, in Windows 7, the text string displayed by opening the properties of the device from the Device Manager window, clicking the Details tab, and selecting Device class or Device class guid from the pulldown menu.

If you cannot find the Class and ClassGuid device setup classes, ask the developer of the device.

#3: The target devices are devices that have one of the following device setup classes:

Class

ClassGuid

DiskDrive

{4d36e967-e325-11ce-bfc1-08002be10318}

The Class and ClassGuid device setup classes are, in Windows 7, the text string displayed by opening the properties of the device from the Device Manager window, clicking the Details tab, and selecting Device class or Device class guid from the pulldown menu.

If you cannot find the Class and ClassGuid device setup classes, ask the developer of the device.

#4: The target devices are devices that have one of the following device setup classes:

Class

ClassGuid

Image

{6bdd1fc6-810f-11d0-bec7-08002be2092f}

The Class and ClassGuid device setup classes are, in Windows 7, the text string displayed by opening the properties of the device from the Device Manager window, clicking the Details tab, and selecting Device class or Device class guid from the pulldown menu.

If you cannot find the Class and ClassGuid device setup classes, ask the developer of the device.

#5: The target devices are devices that have one of the following device setup classes:

Class

ClassGuid

WPD

{eec5ad98-8080-425f-922a-dabf3de3f69a}

The Class and ClassGuid device setup classes are, in Windows 7, the text string displayed by opening the properties of the device from the Device Manager window, clicking the Details tab, and selecting Device class or Device class guid from the pulldown menu.

If you cannot find the Class and ClassGuid device setup classes, ask the developer of the device.

#6: Regardless of the device's outer shape, judgment of the restricted device is performed based on whether the device, as recognized by Windows, matches the condition.

Related Topics:

(2) Devices on which only the write operations can be restricted

In prohibited operation settings in the security policy, only write operations can be restricted on an agent-installed computer. You must restart the computer after you change the write restriction security policy.

The following table shows the devices on which only write operations can be restricted, the relevant device type, and conditions for the deterrence targets.

Device

Example applicable device#1

Condition for the deterrence targets#2

Removable disk

  • USB-connected hard disk

  • USB-connected flash memory (such as USB memory device and USB-connected card reader)

  • IEEE1394-connected hard disk

The target drives include a drive whose drive type is displayed as Removable Disk in Windows Explorer, and a drive whose drive type is displayed as Local Disk in USB or IEEE1394 connections.

The target includes both the built-in drives and USB or IEEE1394-connected drives.

CD/DVD drive

  • USB-connected CD/DVD drive

  • Built-in CD/DVD drive

The target drives are drives that are displayed under DVD/CD-ROM drives in Device by type in the Device Manager window. The target includes both the built-in drives and USB-connected drives.

FD drive

  • USB-connected FD drive

The target drives are drives that are displayed under Floppy disk drives in Device by type in the Device Manager window.

The target includes both the built-in drives and USB-connected drives.

#1: If an applicable device is recognized by the OS as a different device, the device is treated according to the OS recognition and not subject to the write-operation restriction.

#2: The displayed items may vary depending on the OS settings or other configurations.

Tip
  • Write operation to DVD-RAM might not be restricted.

  • If a tool tries to access a device under write-operation restriction, the tool might encounter an error, or an event or error dialog box may appear.

  • If write-operation restriction is enforced, some devices including encryption-supported USB devices, might not be started or used.

  • By writing restriction of CD/DVD, it might not be able to suppress the write operation to CD/DVD by the third-party software. In order to prevent file transfering by these softwares, please use Blocking startup of software of prohibited-operation suppression function, and block startup of third-party softwares.

Devices on which write operations can be restricted differ depending on the OS. The following table shows the relationship between the restricted devices and the OSs.

Device

Windows 8.1, Windows 8

No edition

Windows 10, Windows 8.1, Windows 8

Pro, Enterprise

Windows Server 2019, Windows Server 2016, Windows Server 2012

Windows 7, Windows Server 2008, Windows Vista

Windows Server 2003

Windows XP (Service Pack 2 or later)

Removable disk

N

Y #1, #2

Y#1, #2

Y #1

N

S#4

CD/DVD drive

N

Y #1, #2

Y#1, #2

Y #1

S#3

S#3

FD drive

N

Y #1, #2

Y#1, #2

Y #1

N

N

Legend: Y: Can be restricted. S: Some devices might not be restricted. N: Cannot be restricted.

#1: The Windows service, Portable Device Enumerator Service, must be set to Manual or Automatic.

#2: Writing operation will not be restricted if a USB device is assigned to a memory pool.

#3: Whether the write operation can be restricted or not depends on the writing software. Only software programs that support Windows IMAPI are subject to restriction.

#4: USB devices, including USB-connected hard disks, CD/DVD drives, and FD drives, can be restricted.

When the use of USB devices are restricted

If write restriction for CD/DVD drives, FD drives, or removable disks is set on a computer that restricts the use of USB devices, enabled restriction item and JP1/IT Desktop Management 2 behavior vary depending on the registration status of the connected device. The following table describes the details.

Behavior when USB-connected hard disks, CD/DVD drives, FD drives are connected to a computer that is set to restrict the use of USB devices

Restriction item

Registration status of a connected device (USB device)

Behavior of JP1/IT Desktop Management 2

Write restriction of CD/DVD drive, removable disk, or FD drive

Not registered

Read and write operations are restricted (a restriction event is sent, and a restriction message is displayed).

Registered

Write operation is restricted.

Related Topics:

(3) Types of USB devices that can be allowed for use

When the use of USB devices has been restricted by the setting of prohibited operations in a security policy, you can configure the settings so that only USB devices registered as hardware assets are allowed for use.

Tip

The device instance ID (which is acquired when a USB device is registered) is used for identifying a USB device. The device instance ID is an ID set to a USB device. Some USB devices have unique IDs that can be identified individually, and other USB devices have IDs that change depending on the connecting ports or environments.

You can allow the use of the following two types of USB devices:

USB devices that can be allowed for individual devices

The USB devices that have unique device instance IDs can be allowed for use for individual devices.

Note that, when you display the Details tab of the device properties (from the Windows Device Manager) and select Capabilities from the pull-down menu, the USB devices that have unique IDs are displayed as CM_DEVCAP_UNIQUEID.

USB devices that can be allowed for individual products

The USB devices whose device instance IDs change depending on the connecting ports or environments can be registered and allowed for use for individual products. For example, if you have multiple USB memory devices of the same model of the same manufacturer, and if the device instance IDs for those USB memory devices are not unique, registering one of those devices allows the use of all of those devices.

A USB device whose device instance ID may change is identified based on a part of the ID. If the beginning part of the device instance ID for a USB device matches the registered device instance ID (which was specified when another USB device was registered), the two devices are regarded as the same product. Note that for a USB device that can be allowed for use for individual products, a message is displayed when the USB device is registered.

[Figure]

You can use the following conditions to limit assets that can use the USB device based on the hardware asset information items of the USB device:

With these conditions configured, you can specify USB devices to be allowed for use for each department, location, or asset (device).

Important

Use a computer managed online to register USB devices to be allowed for use.

Important

If you have registered a USB device to be allowed for each product, another device of the same product is treated as the same hardware asset when it is registered. Therefore, if the use of USB devices is restricted in a security policy, the use of USB devices is allowed for individual products.

Important

When a device has multiple ways for connecting to a computer (for example, connecting interfaces and modes), the device might be identified differently depending on the connection method.

Important

To allow the use of a USB device that connects to a computer via multiple devices, you must allow the use of all the devices on the connection path.

Important

When you connect a device with no device instance ID to a computer, the OS generates an arbitrary device instance ID. The device instance ID for such a device changes depending on the connecting computer or port, so the use of the device might not be allowed.

Tip

If you connect a USB device that has already been registered and is individually identified to a computer managed offline, information about the files stored in the USB device is collected. The collected information is displayed on the Title File List tab of the Hardware Assets view (of the Assets module). Note that the Title File List tab is displayed only when the Device Type is USB Device. However, if acquisition of a list of files is prohibited by the security policy, Title File List displays a message that a file list cannot be acquired.

(4) Notes on when prohibited operations are restricted

The following are notes on individual restriction targets when you set a policy for prohibited operations in a security policy.

Related Topics:

(5) Notes on restricting startup of software

(6) Notes on restricting printing

For the network shared printer, the following notes are added.

(7) Notes on restricting the use of devices

Notes on restricting the use of USB devices

Notes on restricting the use of Bluetooth devices

Notes on restricting the use of Windows portable devices

A USB device, identified as a Windows portable device on a computer on which a Windows portable device is configured as a deterrence target, is restricted as a Windows portable device. (In this case, registered USB devices whose use is allowed and USB devices connected with USB Device Registration are also restricted as Windows portable devices.)