Hitachi

JP1 Version 12 JP1/IT Desktop Management 2 Overview and System Design Guide


2.10.7 Prerequisites and notes on collecting operation logs

Organization of this subsection

(1) Notes on collecting operation logs

(2) Notes on power-on/shut-down operation logs

Related Topics:

(3) Information and notes about operation logs for startup and blockage of programs

#: In the case of a management relay server in a multi-server configuration, the folder is JP1/IT Desktop Management 2 - Manager-installation-folder.

Related Topics:

(4) Prerequisites for and notes on collecting web access operation logs

The following describes the prerequisites and notes when operation logs are collected for web accesses.

Prerequisites

Tip

The following add-ons are added to Internet Explorer on the agent-installed computer:

- Add-on for Web access monitoring

- Add-on for file upload monitoring (in the case of Internet Explorer 10 or later)

Web accesses are monitored and detected by the add-on for web access monitoring. File uploads via HTML forms or Javascript are monitored and detected by the agent if the Internet Explorer version is 9 or earlier. Alternatively, file uploads are monitored and detected by the add-on for file upload monitoring if the Internet Explorer version is 10 or later.

Note that downloads, sending, and receiving of files are monitored and detected by the agent.

Notes

Tip

When an add-on is registered, a confirmation message asking whether to enable the add-on is displayed. To avoid the behavior of displaying the message, perform the following steps and restart Internet Explorer.

  1. Log in to an agent computer with a user that has administrator privileges, type gpedit.msc in Run, and start Group Policy Editor.

  2. Open the Add-on List settings in the following location:

    Local Group Policy Editor - Computer Configuration - Administrative Templates - Windows Components - Internet Explorer - Security Features - Add-on Management - Add-on List.

  3. In the Add-on List dialog box, select Enable. In the activated Options, click Display in the Add-on List.

  4. Add the following settings:

    Value name: {90CA397B-DA51-47EB-9299-0B7041857FCB}

    Value: 1

If the add-on is set to Disable, perform the following steps:

  1. Perform the steps as described above.

  2. In the Internet Explorer, Tools - Internet Options - Programs - Manage Add-ons, change the setting for JP1/IT Desktop Management 2 BHO to Enable.

Related Topics:

(5) Information and notes about operation logs collected for file/folder operations

When a user copies, moves, or deletes a folder, information about the operations for all the files and subfolders in the folder can be collected. Note that when a folder is renamed, information about the operation cannot be collected.

Operation logs are collected for the operations performed using Windows Explorer. Therefore, operations performed at the command prompt or by the COPY command cannot be collected.

The following describes information about operation logs and notes when operation logs are collected for file or folder operations.

If a user performs an undo operation (by selecting the Undo menu or pressing the Ctrl + Z keys) immediately after a file or folder operation, any of the operation logs in the following table is collected.

Operation performed before an undo operation

Operation log collected during an undo operation

Copy

Indicates that the copied file or folder has been deleted.

Move

Indicates that the moved file or folder has been moved back to the original location.

Rename

Indicates that the file or folder has been renamed to the original name.

Delete

Indicates that the deleted file or folder has been moved back to the original location

When a file operation is performed, operation logs for file creation or deletion that is not directly related to the user's operations (such as operations in the Windows Recent Items folder) might be output. Therefore, operation logs that satisfy all the following conditions are not collected:

Also, for operations (on files or folders under the installation folder for agent and agent for management relay server) that satisfy all the following conditions, operation logs are not collected:

Notes

When the OS is Windows Server 2019, Windows Server 2016, Windows 10, Windows 8.1, Windows 8, Windows Server 2012, Windows 7, or Windows Server 2008 R2, in addition to the above notes, the following notes also apply:

Notes (Windows Server 2019, Windows Server 2016, Windows 10, Windows 8.1, Windows 8, Windows Server 2012, Windows 7, or Windows Server 2008 R2)

Related Topics:

(6) Notes on collecting operation logs for file uploads and downloads

Operations for uploading or downloading files on a web browser can be monitored, and the operation logs for those operations can be collected. The following describes the notes you must keep in mind when collecting operation logs for uploading or downloading files.

Prerequisites

Notes

Tip

When the add-on is registered in Internet Explorer, a confirmation message asking whether to enable the add-on is displayed. To avoid this behavior of displaying the message, perform the following steps and restart Internet Explorer.

  1. Log in to a computer as a user that has administrator privileges, type gpedit.msc in Run, and start Group Policy Editor.

  2. Open the Add-on List settings in the following location:

    Local Group Policy Editor - Computer Configuration - Administrative Templates - Windows Components - Internet Explorer - Security Features - Add-on Management - Add-on List

  3. In the Add-on List dialog box, select Enable. In the activated Options, click Display in the Add-on List.

  4. Set the following values in the displayed dialog box.

    Value name: {A36BDD30-8AF5-48AE-AFB9-866F89D167A5}

    Value: 1

If the add-on is set to Disable, enable the add-on by performing either of the following steps:

  1. Perform the above steps which avoid this behavior of displaying the message.

  2. In the Internet Explorer, Tools - Internet Options - Programs - Manage Addons, change the setting of JP1/IT Desktop Management 2 FUO to Enable.

Related Topics:

(7) Information and notes about operation logs collected when emails are sent and received

Among the emails sent and received by users via email clients, you can collect operation logs for the operations of sending and receiving emails with attachments. The following provide information and notes about when operation logs are collected for the operations of sending and receiving emails.

The following table shows the email clients for which operation logs can be collected.

Email client

Version

Microsoft Outlook

2002

2003

2007

2010

2013

2016

2019

Windows Live Mail

2009, 2011, or 2012

The table below shows the email operations for which operation logs can be collected. Note that when multiple attached files are sent or received, operation logs are collected for individual attached files.

Email operation that can be collected

Protocol

Receive

POP3, APOP, or IMAP4

Send

SMTP or ESMTP

Notes

Related Topics:

(8) Notes on collecting operation logs when attached files are saved

You can collect operation logs when attached files are saved from an email a user received using a specific mailer to a local disk or another location. Listed below are some notes on operation logs that are collected for the operations of saving attached files.

The following table shows the email clients for which operation logs can be collected.

Email client

Version

Microsoft Outlook

2002

2003

2007#

2010#

2013#

2016#

2019#

Windows Live Mail

2009, 2011, or 2012

#: If attached files are saved with the network drive specified as the destination, file names that are different from the saved file names will be collected as the destination file names in the operation logs.

Notes

Related Topics:

(9) Notes on collecting operation logs when files are sent and received

You can collect operation logs when a user accesses an FTP site via a web browser and sends or receives files. For the supported web browsers, see the table of prerequisites in 2.10.1 Types of operation logs that can be collected. The following are notes on when operation logs are collected for the operations of sending and receiving files.

Notes

Related Topics:

(10) Information about, prerequisites for, and notes on operation logs collected for print operations

You can collect operation logs for print operations. The table below shows the printers for which operation logs for print operations can be collected. Note that only the printers set in the Devices and Printers dialog box are supported. Note that the printers displayed in the Devices and Printers dialog box can be commonly used by all users.

Printer type

Collection of operation logs for print operations

Local printer

Y

Network shared printer

Y #

Internet printer

N

Virtual printer

Y

Legend: Y: Operation logs can be collected for this type of printer. N: Operation logs cannot be collected for this type of printer.

#: Information about the number of print pages cannot be collected.

Prerequisites

In the properties for each printer, Print and Manage Documents must be allowed for all logged on users.

For the network shared printer, the following prerequisites are added.

Notes

For the network shared printer, the following notes are added.

Related Topics:

(11) Notes on collecting logs for device operations

If prohibited operations are set, you can also collect operation logs for device connection suppression and device connection permission.

Logs of inserting or ejecting media (such as CDs, DVDs, SD cards) into or from drives cannot be collected. The following notes are about collecting operation logs of device operations.

Notes

Related Topics:

(12) Notes on collecting operation logs for window operations

You can collect operation logs for window OS operations in the following cases:

The followings are notes on collecting operation logs for window operations.

Notes

Related Topics:

(13) Prerequisite for collecting source information when checking incoming files and notes on suspicious out-movement of files

You can collect information about the input source of a file when the file is moved to an agent-installed computer. The following are a prerequisite for collecting source information when checking incoming files and notes on suspicious out-movement of files.

Prerequisite

Notes

Related Topics: