Hitachi

JP1 Version 12 JP1/IT Desktop Management 2 Overview and System Design Guide


4.6.3 Analyzing management targets

JP1/IT Desktop Management 2 allows device management, security control, and asset management. The range of target devices varies depending on the management methods. Before starting operation, you need to determine which devices in the organization you want to manage.

In addition, you can use online management for computers that can be connected to the network, and use offline management for computers that cannot be connected to the network. For details about functional differences between online management and offline management, see (1) Functional differences between agent/agentless management.

Target devices for device management

For device management, you can view the device status and many types of information by collecting information from devices connected to the network. Examine the devices for which you want to view the current status in the organization.

Device management is applicable to devices that have IP addresses, such as computers with OSs, network printers, and routers. To perform device management, you must register the devices as JP1/IT Desktop Management 2 management targets. One license is used to manage one device.

You can search for any device having an IP address in the network to automatically collect information. Therefore, even if devices in a department are unknown, you can use JP1/IT Desktop Management 2 to collect information for the devices in the organization and add them as management targets. For devices without IP addresses, such as offline computers, use offline management or manage them as assets.

Peripheral devices for computers, such as a mouse and keyboard, can be managed as part of device information by entering information for the peripheral devices as additional information. Therefore, no licenses are used for managing peripheral devices.

If you do not want to use JP1/IT Desktop Management 2 to manage some devices in the organization, register them as exclusion targets. For example, if you only want to manage the devices which are subject to security control, register devices such as network printers and routers as exclusion targets. This allows you to collect information only from the managed devices.

Device management targets are determined as follows:

Devices subject to security control

For security control, you can view the security status of devices and take corrective actions based on the information collected from the managed devices. Examine the devices for which you want to maintain security.

Security control is applicable to managed computers running Windows.

By installing agents in computers, you can judge and diagnose the security status and take security measures.

Agentless computers can also be subject to security control, provided that administrative share is enabled and you can log on as a member of the Administrators group. Note, however, that you can judge and diagnose the security status of an agentless computer only within the range of device information that can be acquired. Security judgement and diagnosis are not possible for some information. There are also functional restrictions. For example, the auto enforce function and the software startup suppression function cannot be used.

Security control targets are determined as follows:

Target devices for asset management

For asset management, you can manage the status of devices owned by the organization (hardware assets), no matter whether they are connected to the network. Analyze the devices which you want to manage as assets in the organization. No licenses are used for managing hardware assets.

Asset management is applicable to all devices owned by the organization. Because you can register any asset information, you can manage peripheral devices and devices without IP addresses.

Of the devices owned by the organization, register the devices you want to manage as hardware assets with asset numbers assigned. By registering the devices as hardware assets, you can manage the asset status (indicating whether the asset is in use or in stock), user name, contact phone number, and related contract information, in addition to asset numbers.

Hardware asset information is automatically registered for devices that are added asJP1/IT Desktop Management 2 management targets. To manage devices as assets rather than adding them as management targets, you must register hardware asset information manually.

Organization of this subsection

(1) Managing device information for online managed computers

To correctly manage device information in the organization where devices increase or decrease on a daily basis, you need to periodically perform a search and register all devices to be managed. The managed device information must be kept up to date.

To manage device information, you need to decide on a search range, search schedule, and whether to install agents on computers discovered by a search. You also need to set up an operation schedule to collect and update device information for computers.

Analyzing device search requirements

Consider the following items related to device search.

Deciding collection and update intervals for device information

Decide how to collect and update device information during operation. How device information should be updated varies depending on whether an agent is installed on a managed computer.

More detailed information can be collected and managed for a computer with an agent installed than for an agentless computer. Consider installing agents. Also, consider how to update device information.

(2) Applying security measures to online managed computers

Decide how to set security policies considering the organization's security rules. Also determine the judgment schedule based on the security policies, and set the calculation targets and storage period for reports created as a result of security diagnosis.

Applying security policies

By default, the default policy is applied to the managed computers. If there is only one set of rules in the organization, you can change the security policy settings for all computers by editing the default policy. If some computers require special security policies, mainly use the default policy and create special security policies.

In addition, decide security policy details (security configuration items and action items).

Deciding security judgment items and automatic application of security measures

Decide which judgement items should be set for a security policy based on the organization's rules, and determine which security measures should be automatically applied to violations.

Deciding actions to be taken against security policy violations

Decide the action to be taken if a security policy violation is found. You can select from the following actions.

  • Notify the user of a security policy violation.

  • Deny network connection of the computer that has a security problem.

Setting up the security judgment schedule

The security status is determined at a regular interval based on the specified security policy. Use the Settings module to specify the time of security status judgment appropriate for operations.

Considerations related to calculation of security diagnostic reports

The results of a security status judgment can be calculated in a security diagnostic report. Decide the calculation period and storage period for security diagnostic reports.

(3) Managing asset information

You can manage a variety of assets owned by the organization. Consider the management target for each type of asset information.

Hardware assets

Information about the devices, such as computers, servers, printers, network devices, and USB devices, can be managed as hardware asset information. In addition to detailed asset information, you can manage the status indicating that the asset is in use, in stock, or disposed of. Thus, you can see the status of the hardware assets in the organization.

Determine which hardware assets owned by the organization you want to manage by using JP1/IT Desktop Management 2. Then, provide information on the assets.

Tip

If you have an asset register at hand, you can register the asset information by importing the asset register.

In JP1/IT Desktop Management 2, assets are managed by using BIOS serial numbers to associate assets with device information. If multiple devices have the same BIOS serial number, device information cannot be correctly associated. For details on methods other than using BIOS serial numbers to associate device information, see the procedure for changing the device information association in the JP1/IT Desktop Management 2 Administration Guide.

Software licenses

You can manage information about the software licenses owned by the organization. Computers permitted to use them can also be managed.

To manage the software licenses, register information about software license certificates. Provide the certificates for the software licenses owned by the organization.

The software type can be used as a judgment condition when you consider whether to manage software licenses. For example, you can choose to manage only the licenses for the software whose software type is commercial software.

Managed software

You can register a software product corresponding to a software license to manage the license used for each software product. In addition to managing the total number of licenses, you can allocate a license to each computer to find computers that use licenses without permission.

You must confirm in advance which software products currently in use correspond to which software licenses.

Contracts

You can register contract information about hardware assets and software licenses, such as support contracts, rental contracts, and lease contracts, and then manage the contract information associated with asset information. Because you can view information about the contracts that are about to expire, you can create a work schedule.

To manage contract information, register information about contract documents. Provide contract documents related to the hardware assets and software licenses owned in the organization.

Handling management items

You can create original management items as additional management items. You can also add options to the existing management items. If you want to individually manage information in the organization, you must first determine which management items should be created.

Tip

Before you attempt to import and register asset information, confirm the management items contained in the data to be imported. To manage items that do not exist in JP1/IT Desktop Management 2, you need to create management items before importing asset information.