Hitachi

JP1 Version 12 JP1/IT Desktop Management 2 Overview and System Design Guide


B. Glossary

This section explains the terminology used in JP1/IT Desktop Management 2.

A

Active Directory server

A server with Active Directory installed. An Active Directory server connects to JP1/IT Desktop Management 2 in systems that manage devices by linking with Active Directory.

added management item

A custom management item added to the asset information managed by JP1/IT Desktop Management 2. By creating added management items, administrators can manage information tailored to their needs.

Administration scope

A user account parameter that defines the scope of the administrator's responsibility within the organization.

administrator computer

The computer a JP1/IT Desktop Management 2 administrator uses to log in to JP1/IT Desktop Management 2.

agent

A program installed on computers managed by JP1/IT Desktop Management 2. The agent reports information to JP1/IT Desktop Management 2 - Manager, and controls the computer based on instructions received from JP1/IT Desktop Management 2 - Manager. The program name is JP1/IT Desktop Management 2 - Agent.

Note that there are Windows, UNIX, Linux, and Mac versions for JP1/IT Desktop Management 2 - Agent. For the sake of identification, a computer on which the Windows version of the agent is installed is called a Windows agent, a computer on which the UNIX or Linux version of the agent is installed is called an agent for UNIX, and a computer on which the Mac version of the agent is installed is called an agent for Mac.

agent configurations

The settings used to set up the agent on a managed computer. Agent configurations are kept on the management server. You can remotely change how an agent is configured by creating agent configurations from an operation window and assigning them to the agent.

agentless

A managed device without JP1/IT Desktop Management 2 - Agent installed.

Asset management using Asset Console

A feature that manages assets by using Asset Console, which is a JP1/IT Desktop Management 2 component. Asset management using an operation window is called as such.

authentication server

A server used to manage access permissions for JP1 users. One authentication server must be installed for each user authentication block. This server can be used to manage all JP1 users.

B

blacklist method

A method of controlling network access by specifying devices that are not allowed to connect to the network. Devices not specified in the list are allowed to connect to the network.

C

chat server

A connection destination for computers that will be taking part in a chat session.

Citrix XenApp and Microsoft RDS server

A server on which Citrix XenApp and Microsoft RDS (Remote Desktop Services) are installed. You can install an agent on the server on which Citrix XenApp and Microsoft RDS have been installed and manage it with JP1/IT Desktop Management 2.

client workstation

An agent for UNIX or Mac that connects with a managing server via a relay system.

connection list

A feature that lets you manage connection-destination computers for the remote control function independently, without using the JP1/IT Desktop Management 2 operation module.

contract company information

A class of asset information managed by JP1/IT Desktop Management 2. Contract company information consists of contact information for companies from which an organization has licensed software or entered into an agreement regarding a device (hardware asset).

contract company list

A list used to manage contract company information.

contract information

A class of asset information managed by JP1/IT Desktop Management 2. Contract information consists of information about contracts related to devices (hardware assets) and licensed software.

controller

A program that remotely controls a managed computer.

custom group

A group created by an administrator for a specific purpose. You can use custom groups to group the information managed by JP1/IT Desktop Management 2 in meaningful ways.

D

database manager

A tool used to back up and restore the database, and reorganize the database area.

default agent configuration

A group of agent configurations provided by JP1/IT Desktop Management 2. These settings include the connection-target management server, installation parameters, and other settings needed to set up the agent.

default policy

A security policy provided by JP1/IT Desktop Management 2. This policy contains the basic settings required to maintain a secure environment.

The default policy is assigned to managed computers by default. It is also assigned if you remove a security policy from a managed computer to which no other security policies are assigned.

device information

Information that JP1/IT Desktop Management 2 collects from managed devices. Device information is required for managing computers, and includes the hardware usage and installed software types on the managed computers. You can view device information in the Device Inventory view of the Inventory module.

diagnosis

The process of evaluating a system by assessing its security status. You can view the results of a diagnosis in a report.

directly under

From the viewpoint of any management server, devices or settings that are managed by the management server are called directly under the server. For example, computers directly under the local server refers to the computers, the agent of which connects to the local server.

Distribution using Remote Install Manager

A feature of distribution using Remote Install Manager (which is a JP1/IT Desktop Management 2 component). You can also use a command for distribution. This is one of the two distribution features provided by JP1/IT Desktop Management 2, and the other is ITDM-compatible distribution.

E

end workstation

An agent for UNIX or Mac that connects with a managing server directly without passing through a relay system.

external media

Writable media such as USB memory and external hard drives. You can use external media to install offline management agents and to collect device information from computers that are being managed offline.

H

hardware asset information

A class of asset information managed by JP1/IT Desktop Management 2. Information about the devices (hardware assets) held by an organization is registered as hardware asset information.

HIBUN log

Logs that are recorded by HIBUN.

I

information area

An area that appears in the right side of the operation window. The information displayed in this area depends on the menu item selected in the menu area on the left side of the window.

information collection tool

A tool that collects device information from computers being managed offline. The information collection tool consists of the getinv.vbs command and files containing the information needed to collect device information.

installation set

A program that helps users install and set up JP1/IT Desktop Management 2 - Agent in one operation. An installation set is created on a management server, and provides an installer that handles the installation and setup of the agent.

installed software

The software installed on a managed computer. JP1/IT Desktop Management 2 automatically collects information about installed software as device information.

internet gateway server

The server used to keep track of the managed computers connected via the outside network such as the Internet by using JP1/IT Desktop Management 2. Place this server in the demilitarized zone (DMZ) of the corporate network.

ITDM2 authentication

A method for authenticating user accounts in the JP1/IT Desktop Management 2 system. User accounts are created in the JP1/IT Desktop Management 2 operation window. This is the standard method for authenticating user accounts in the JP1/IT Desktop Management 2 system.

ITDM2 user

A user account that is registered in and managed by JP1/IT Desktop Management 2. User accounts are created in the JP1/IT Desktop Management 2 operation window.

In contrast, user accounts that are registered in and managed by the JP1/Base authentication server are referred to as JP1 users.

ITDM-compatible distribution

A feature of distribution using the Distribution (ITDM-compatible) operation window, which is one of the two distribution features provided by JP1/IT Desktop Management 2. The other distribution feature is one that uses Remote Install Manager.

J

JCR file

A file used by JP1/IT Desktop Management 2 to store video information. Video recorded during a remote control session is saved as a JCR file with the extension JCR. You can play back JCR files in the remote control player.

JP1/IT Desktop Management 2

A system that manages IT assets from device management, security management, and asset management perspectives.

JP1/IT Desktop Management 2 - Agent

A program installed on computers managed by JP1/IT Desktop Management 2.

JP1/IT Desktop Management 2 - Asset Console

A program installed on the asset management server.

JP1/IT Desktop Management 2 - Manager

A program that provides the server functionality of JP1/IT Desktop Management 2.

JP1/IT Desktop Management 2 - Network Monitor

A program installed on a computer that monitors the network.

JP1/IT Desktop Management 2 - Operations Director

A system designed for small or middle-scale companies to manage no more than 1,000 computers. It has limited functionality compared with JP1/IT Desktop Management 2 - Manager.

JP1/IT Desktop Management 2 - Smart Device Manager

A program that enables operation management and security countermeasures for smart devices.

JP1/NETM/Network Monitor

A program that monitors the network and controls the network connections of devices. JP1/NETM/NM is installed on a network control appliance.

JP1/NETM/Network Monitor - Manager

A program that centrally manages JP1/NETM/NM. JP1/NETM/NM - Manager is installed on the management server in systems that link with JP1/NETM/NM - Manager.

JP1 authentication

A method for centrally managing and authenticating user accounts in JP1/Base. User accounts are created in JP1/Base and referred to as JP1 users. If another JP1 product is using JP1 authentication, the user account of that product can be used.

JP1 permission level

A permission level indicates the types of operations that a JP1 user can perform on a management target (resource). In JP1/IT Desktop Management 2, operations are defined by permissions and task allocations. The access permissions of JP1 users are managed as a combination of the type of management target (resource) and the operations that can be performed on that type of management target.

JP1 resource group

In JP1/IT Desktop Management 2, management targets (resources) are managed in groups referred to as JP1 resource groups. In JP1/IT Desktop Management 2, JP1 resource groups are managed separately for each instance of JP1/IT Desktop Management 2 - Manager.

JP1 user

A user account that is registered in and managed by the JP1/Base authentication server. User accounts are created in JP1/Base.

In contrast, user accounts that are registered in and managed by JP1/IT Desktop Management 2 are referred to as ITDM2 users.

judgment

The process of assessing the device information collected from each computer by JP1/IT Desktop Management 2 against a security policy, and assigning a security level (violation level) for each item in the security policy and for the computer in general.

judgment-excluded user settings file

A file that specifies OS user accounts to exclude from security status judgment.

L

license key file

A file provided to purchasers of JP1/IT Desktop Management 2 licenses. A license key file is used to activate a license.

local server

From the viewpoint of any management server, the management server itself.

M

managed-software information

A class of asset information managed by JP1/IT Desktop Management 2. JP1/IT Desktop Manager uses managed-software information to keep track of software licenses. You can display the number of software licenses for each piece of managed software, and see how many of those licenses are in use. You can also manage several versions of the same software as one set of managed-software information.

management relay server

The server on which JP1/IT Desktop Management 2 - Manager is installed as a management relay server. In a multi-server configuration system, a primary management server and management relay servers can be collectively called management servers.

Provide a management relay server when you want to operate JP1/IT Desktop Management 2 separately for each department or network configuration. Just as with a relay system, distribution using Remote Install Manager enables you to reduce the load that job execution or package distribution places on the network.

management server

A computer on which JP1/IT Desktop Management 2 - Manager is installed. This can be also called a managing server or manager in a description regarding distribution using Remote Install Manager.

managing device

From the viewpoint of any device or asset, the management server that manages the device or asset. For example, the managing device of a computer refers to the management server that is specified as a connection destination by the agent installed on the computer.

mandatory software

Software that must be installed on every computer in an organization. Mandatory software is one aspect of a security policy.

MDM product

A product that manages smart devices. An MDM product is installed on an MDM server, and links with JP1/IT Desktop Management 2 to manage smart devices.

MDM server

A server with an MDM solution installed. An MDM server connects with JP1/IT Desktop Management 2 when you manage smart devices by linking with an MDM product.

MDM system

A generic name for the MDM products that manage smart devices.

menu area

An area that appears in the left side of the operation window. The menu displayed in this area depends on the selected module. Select a menu item to display the corresponding information in the information area on the right side of the operation window.

multi-server configuration

A hierarchical system that consists of a primary management server and multiple management relay servers. The system might include a relay system as a component.

N

network control appliance

An appliance product with JP1/NETM/NM installed. By linking with JP1/NETM/NM - Manager, you can use JP1/IT Desktop Management 2 to control the network connections in network segments that are monitored by a network control appliance.

network control list

Settings that define whether individual devices are allowed to connect to the network. You can also permit a device to access the network for a set period of time.

network monitor

A feature that automatically detects when a device without permission (a device that is not registered as a management target or exclusion target) is connected to the network, and controls the network connection.

network monitor agent

A program installed on a computer that monitors the network. The network monitor agent is installed automatically when you select a computer that is managed online in the operation module and enable the network monitor. The program name is JP1/IT Desktop Management 2 - Network Monitor.

network monitor settings

Settings that define how network monitor controls the network connections of devices that establish new connections to network segments with the network monitor feature enabled.

O

offline management

A method of using external media to manage computers that the management server cannot access over the network. In contrast to online management.

offline management agent

An agent that is configured to not connect to the management server in the agent configurations. Install an offline management agent on computers that you want to manage offline. In contrast to an online management agent.

offline management framework

A framework used to manage computers that the management server cannot access over the network. This includes standalone computers and computers connected to an isolated network at a remote site.

online management

A way to manage computers that are connected to the management server by a network. In contrast to offline management.

online management agent

An agent that is configured to communicate with the higher systems in the agent configurations. Install an online management agent on computers that you want to manage online. In contrast to offline management agent.

operation log

Log information about operations performed on managed computers. You can collect operation logs from computers that are managed online.

P

package (for ITDM-compatible distribution)

A set of software programs or files to be distributed to other computers, which is registered in JP1/IT Desktop Management 2 from the Distribution (ITDM-compatible) window. You can also use this window to distribute a package.

primary management server

A server on which JP1/IT Desktop Management 2 - Manager is installed, and is located at the top of a multi-server configuration. In a multi-server configuration system, a primary management server and management relay servers can be collectively called management servers.

prohibited software

Software whose use is prohibited within an organization. Prohibited software is one aspect of a security policy.

R

recommended security policy

A security policy provided by JP1/IT Desktop Management 2. The settings in this policy are designed to create a robust security environment.

Relay system

A server on which JP1/IT Desktop Management 2 - Agent is installed as a relay system. Using a relay system can reduce the load caused by remote installation and remote collection on the management server and the network. The program name is JP1/IT Desktop Management 2 - Agent.

Remote collection

A feature of batch collection of files stored in the managed computers by using Remote Install Manager.

remote control agent

A component of the agent program. All remote control functions become available when a standard connection is used between the remote control agent and the controller.

remote control feature

A feature that allows a user to connect to a remote computer and control it using keyboard and mouse operations.

remote control player

A video player that plays back video recorded in a remote control session. The remote control player lets you pause and skip the video as needed.

Remote installation

A feature of batch distribution of software programs and files from the management server to users' computers via the network.

Remote Install Manager

A component of JP1/IT Desktop Management 2. Install this component if you want to perform distribution using Remote Install Manager.

removable disk

A recordable disk that can be removed from a disk drive.

report

A window that presents information compiled from the JP1/IT Desktop Management 2 database for a certain purpose. You can then print the information displayed on the screen.

request server

A feature that processes connection requests for the remote control function.

revision history

Information that serves as a record of changes made to the device information of a managed computer. You can view revision history from the operations module, or output it to a CSV file for archival purposes.

revision history archive

Revision history entries output as a CSV file for archival purposes.

RFB

A communication protocol used to access remote computers over a network. RFB is primarily used in Virtual Network Computing (VNC), and supports communication between computers running different operating systems. JP1/IT Desktop Management 2 uses RFB to remotely control agentless computers and computers running OSs other than Windows.

S

SAMAC software dictionary file for offline updates

A file used to register a software dictionary provided by SAMAC to the software dictionary in JP1/IT Desktop Management 2.

search

The process of discovering devices connected to the network in a specified network range, and devices registered with Active Directory.

security policy

A set of rules that define the criteria for determining violation levels, and actions to perform when certain conditions are met. You can define security policies on the management server and assign them to managed computers.

In a security policy, you can set criteria for determining the violation level of a computer, and define actions that take place automatically under certain conditions. You can also configure the system to warn the user when a computer reaches a particular violation level.

single-server configuration

A system in which JP1/IT Desktop Management 2 is operated with a single management server. The minimum configuration and basic configuration are categorized as single-server configurations.

smart device

A small, portable terminal device such as a smartphone, tablet PC, or PDA.

software dictionary

Software dictionary information that is provided by SAMAC and registered in JP1/IT Desktop Management 2. Software dictionary is a type of software information that is managed by JP1/IT Desktop Management 2.

software license information

A class of asset information managed by JP1/IT Desktop Management 2. Software license information is used to manage software licenses for individual purchases (at the asset level).

support information file

A file used to register information about the latest program updates information in JP1/IT Desktop Management 2.

support service site

A Web site to provide support services. JP1/IT Desktop Management 2 can acquire the latest updates for the OS and Internet Explorer, and anti-virus products by connecting to the support service site over the Internet.

suspicious file transfer

A suspicious operation detected when the following actions are deemed suspicious in a security policy:

Send/Receive E-mail with Attachments

Use Web/FTP Server

Copy/Move the File to External Device

suspicious print operation

A suspicious operation detected when Large Number of Printing Jobs is selected as a target of suspicious activity monitoring in a security policy.

system administrator permission

A permission you can assign when you create a user account in JP1/IT Desktop Management 2. A user with this permission has full access to the management features of JP1/IT Desktop Management 2, with the exception of user account management.

T

task

An single act of installing software distributed from the management server, distributing files, or uninstalling software. Each software or file distribution task involves the distribution of a specific package.

task allocation

A user account parameter that defines the tasks for which an administrator is responsible. By setting up user accounts with the appropriate combination of task allocations and permissions, you can limit the operations an administrator can perform to those appropriate to his or her role.

tool for applying policy offline

A tool used to apply a security policy to agents installed on offline-managed computers. The tool for applying policy offline consists of the setsecpolicy.vbs command and files containing the information needed to applying the security policy.

U

update group

A group of update programs to be applied or removed together. By specifying an update group in a security policy, you can apply or remove the update programs in that group to or from all computers that are subject to the security policy.

user management permission

A permission you can assign when you create a user account in JP1/IT Desktop Management 2. A user with this permission is able to add and delete user accounts in JP1/IT Desktop Management 2.

V

view permission

A permission assigned when you create a user account in JP1/IT Desktop Management 2. A user with this permission is able to view modules other than the Settings module, but cannot add new information or change existing settings.

violation level

A rating that indicates the security risk posed by a computer. A computer's violation level is determined by assessing it against a security policy. There are six violation levels: Critical, Important, Warning, Safe, Unknown, and Out of Target.

VNC

Software used to remotely control another computer over a network.

W

whitelist method

A method of controlling network access by specifying devices that are allowed to connect to the network. Devices not specified in the list are blocked from connecting to the network.

Windows Update

A program that applies updates to Windows, Internet Explorer, and other products provided by Microsoft.