Hitachi

JP1 Version 12 JP1/IT Desktop Management 2 Overview and System Design Guide


4.1.2 Operation procedure

After setting up an environment, you can operate the system as determined during system design. The following describes the operation procedure for the JP1/IT Desktop Management 2 system.

  1. Specify the settings required for operation

    Use the operation windows of JP1/IT Desktop Management 2 to specify the search schedule and search range for devices and the security policy based on the results of the examination performed before operation.

  2. Collect device information

    Search for devices from the management server to automatically collect the latest IT device information. If necessary, install agents on the computers.

  3. Monitor and control the network

    Monitor the network for any new computers connected, and prevent unauthorized computers or computers with insufficient security measures from connecting to the network.

  4. Determine and diagnose security status

    Confirm that the computers observe the predefined security policy to check for any computers with insufficient security measures. JP1/IT Desktop Management 2 can output a report containing the collected information that you can use to diagnose security status.

  5. Take security measures

    Take security measures based on the diagnostic results. If you need to review the policy, return to step 1 and change the security policy.

  6. Manage asset information

    Manage all information about the assets owned by the organization, including the devices, software licenses, and contracts. You can keep track of the usage status of hardware assets and software licenses, and check the resources' contract information and costs.