Hitachi

JP1 Version 12 JP1/IT Desktop Management 2 Overview and System Design Guide


2.10.6 Conditions for checking for large numbers of print jobs

JP1/IT Desktop Management 2 can detect operations that might lead to information leakage through printing as suspicious operations. In a security policy, specify the suspicious operations to be reported and set the conditions for reporting suspicious operations.

Suspicious operations to be reported

In print operations that were submitted by a user within one hour, if the total number of print pages exceeds the number of pages set in the security policy, those print operations are detected as suspicious operations. When suspicious operations are detected, the counter for the print pages is cleared. Therefore, if suspicious operations submitted by a user were detected within the previous hour, the count of print pages for the user restarts from the next print operation without including the print operations that were detected as suspicious.

As the number of print pages reported in an event, the total number of print pages in the previous hour is displayed regardless of whether suspicious print operations were detected.

If a computer is shut down, the page count for the print operations performed by a user before the shutdown is cleared and is not included in the total count of the number of print pages for suspicious operations or for an event after the computer restarts.