5.11 Performing an overwrite installation from JP1/IT Desktop Management and other products to JP1/IT Desktop Management 2
You cannot run JP1/IT Desktop Management 2 on the same computer as its predecessor JP1/IT Desktop Management. However, you can perform an overwrite installation of JP1/IT Desktop Management 2 on a computer with JP1/IT Desktop Management installed.
Security policies in an overwrite installation from JP1/IT Desktop Management:
In JP1/IT Desktop Management 2 - Manager, for the setting values of Restriction of Device Usage of security polices, the setting values for JP1/IT Desktop Management 2 - Agent and for JP1/IT Desktop Management - Agent are retained. The settings that can be displayed and edited with the management window are only the settings for JP1/IT Desktop Management 2 - Agent.
-
For the security policies migrated from JP1/IT Desktop Management - Manager:
-
For JP1/IT Desktop Management - Agent, the setting value that has been specified in JP1/IT Desktop Management - Manager is passed.
-
There is no setting value for JP1/IT Desktop Management 2 - Agent. It is controlled with the setting for JP1/IT Desktop Management - Agent.
-
-
When you have edited the security policies migrated from JP1/IT Desktop Management - Manager:
-
For JP1/IT Desktop Management - Agent, the setting value specified in JP1/IT Desktop Management - Manager is retained.
-
For JP1/IT Desktop Management 2 - Agent, the setting value is changed to the value specified in the edit window of JP1/IT Desktop Management 2 - Manager.
-
-
When you duplicate the security policies migrated from JP1/IT Desktop Management - Manager:
-
For JP1/IT Desktop Management - Agent, the setting value specified in JP1/IT Desktop Management - Manager from which the duplication is performed.
-
For JP1/IT Desktop Management 2 - Agent, the setting value of the environment from which the duplication is performed is retained.
-
-
When you create security policies in JP1/IT Desktop Management 2 - Manager:
-
For JP1/IT Desktop Management - Agent, All the setting values of Restriction of Device Usage are disabled. Using devices is not suppressed.
-
For JP1/IT Desktop Management 2 - Agent, the setting value is the value specified in the edit window of JP1/IT Desktop Management 2 - Manager.
-
To use Restriction of Device Usage in JP1/IT Desktop Management 2 - Manager, install JP1/IT Desktop Management 2 - Agent. In JP1/IT Desktop Management 2 - Manager, the procedure to switch the control of Restriction of Device Usage for JP1/IT Desktop Management - Agent is shown as follows:
-
To switch the assignment of security policies:
By changing the assignment of security policies on which the setting of Restriction of Device Usage is different for JP1/IT Desktop Management - Agent, the control of Restriction of Device Usage is switched. Note that you can perform this procedure when you have created multiple security policies in which the setting of Restriction of Device Usage is different in JP1/IT Desktop Management - Manager and perform a migration to JP1/IT Desktop Management - Manager.
Running JP1/Software Distribution and JP1/IT Desktop Management 2 on the same computer
Although you can run JP1/Software Distribution and JP1/IT Desktop Management 2 on the same computer, you cannot perform an overwrite installation from JP1/Software Distribution to JP1/IT Desktop Management 2. The table below describes the specific components that can coexist on the same computer. Note that in environments where both products are present, they cannot connect with each other (that is, JP1/Software Distribution cannot manage the devices managed by JP1/IT Desktop Management 2 and vice versa).
JP1/NETM |
JP1/IT Desktop Management 2 |
|||||||
---|---|---|---|---|---|---|---|---|
Management server |
Agent |
Relay system |
Controller |
Remote control agent |
Network monitor |
Asset Console |
||
JP1/Software Distribution Manager (including remote control manager) |
Manager |
N |
Y |
Y |
Y |
Y |
Y |
Y |
Relay manager |
N |
Y |
Y |
Y |
Y |
Y |
Y |
|
JP1/Software Distribution Client (including remote control agent) |
Relay system# |
Y |
Y |
Y |
Y |
Y |
Y |
Y |
Client |
Y |
Y |
Y |
Y |
Y |
Y |
Y |
|
JP1/Software Distribution Manager (Asset Information Manager Limited) |
Manager |
N |
Y |
Y |
Y |
Y |
Y |
N |
Relay manager |
N |
Y |
Y |
Y |
Y |
Y |
N |
|
JP1/Asset Information Manager |
N |
Y |
Y |
Y |
Y |
Y |
N |
|
JP1/Client Security Control |
Manager |
N |
Y |
Y |
Y |
Y |
Y |
N |
Agent |
Y |
Y |
Y |
Y |
Y |
Y |
Y |
|
JP1/NM |
Manager |
Y |
Y |
Y |
Y |
Y |
Y |
Y |
Agent |
Y |
Y |
Y |
Y |
Y |
N |
Y |
Legend: Y: Can coexist. N: Cannot coexist.
#: Includes JP1/Software Distribution SubManager.
For details about how to perform an overwrite installation from JP1/IT Desktop Management to JP1/IT Desktop Management 2, see 5.6 Overview of upgrading the entire JP1/IT Desktop Management 2 system.
Automatically acquiring JP1/IT Desktop Management operation log data during overwrite installation
You can automatically acquire a maximum of 30 days of operation log data from the online area of the JP1/IT Desktop Management operation log database during an overwrite installation to JP1/IT Desktop Management 2. This data is imported into the JP1/IT Desktop Management 2 operation log database. In the window indicating that setup is complete, select the Automatically import the operation logs of old products to the database check box. The automatically acquired operation log data is automatically deleted when the period specified in Storage period for operation logs to be automatically acquired in the Operation Log Settings view of the Settings module has elapsed.
- Important
-
-
To automatically acquire operation log data from JP1/IT Desktop Management, you need to set a storage location in the setup of JP1/IT Desktop Management before performing the overwrite installation.
-
The acquisition of operation log data from JP1/IT Desktop Management might take a day or longer.
-
You can view the progress of operation log acquisition in the Background Task panel of the Home module, or the Manual Acquisition of Stored Operation Logs dialog box of the Security module.
-
Because the acquisition of JP1/IT Desktop Management operation log data uses the manual acquisition function of JP1/IT Desktop Management 2, the associated events and messages will refer to manual acquisition.
-
Because the management methods of operation logs differ between JP1/IT Desktop Management and JP1/IT Desktop Management 2, for operation logs of JP1/IT Desktop Management, on the time chart of the upper part of the Operations Log List view, the dates that are a day before and after the dates on which operation logs exist might be displayed as activated.
-
- Tip
-
If there is no storage location specified for operation log data in the JP1/IT Desktop Management setup, the data in the online area of the JP1/IT Desktop Management database is output to the database backup folder during the overwrite installation of JP1/IT Desktop Management 2. The output destination for the data is displayed on the window indicating that setup is complete. To import the data into the JP1/IT Desktop Management 2 operation log database, you need to set the storage location for operation log data in the setup of the JP1/IT Desktop Management 2 management server. Then, import the data manually by copying the following files:
-
OPR_CATALOG_YYYYMMDD.csv
-
OPR_DATA_YYYYMMDD.zip
-
OPR_OTHER.zip
-
A version upgrade of an environment where a site server is used
When you use a site server of JP1/IT Desktop Management (JP1/IT Desktop Management - Remote Site Server is installed.), perform the following operation before performing a version upgrade to JP1/IT Desktop Management 2 - Manager. If you do not perform it, you cannot perform ITDM-compatible distribution and collect operation logs.
-
Before performing a version upgrade from JP1/IT Desktop Management - Manager to JP1/IT Desktop Management 2 - Manager, change the setting of Package distribution relay site and Storage Location for Operation Logs from the site server to the management server with the Server Configuration Settings window.
- Important
-
If you need to install a relay system on a computer that was being used as a JP1/IT Desktop Management site server (a computer with JP1/IT Desktop Management - Remote Site Server installed), uninstall JP1/IT Desktop Management - Remote Site Server from the computer before installing the relay system.
Settings that cannot be inherited from JP1/IT Desktop Management
If you perform an overwrite installation of JP1/IT Desktop Management 2 on a computer that has JP1/IT Desktop Management installed, the following display items and display order settings are not inherited and are initialized:
-
Security - Computer Security Status - Device List
-
Assets - Managed Software - Managed Software List - Installed Software
-
Inventory - Device Inventory - Device List
-
Inventory - Device Inventory - Device List - Installed Software Detail
-
Inventory - Software Inventory - Software List
-
Setting - Discovery - Last Discovery - IP Address Range