Hitachi

JP1 Version 12 JP1/IT Desktop Management 2 Administration Guide


1.1 Installing agents

Install agents on computers to be managed by JP1/IT Desktop Management 2.

When you install an agent on a computer, that computer automatically becomes a management target and device information about the computer will be collected. Using agents, you can do the following to manage your computers:

Keep track of security status.

By assigning a security policy, you can determine the security status of computers. Using a security policy, you can automatically correct any detected security problem.

On agents for UNIX, you cannot determine the security status or automatically correct any detected security problems. On agents for Mac, problems cannot be corrected automatically.

Manage assets.

When computers become the management targets, their hardware asset information is automatically registered. Information collected from devices is automatically reflected in the asset information. This information, combined with other information that is not collected from the devices, such as asset management numbers and user information, allows you to keep the hardware assets of the entire organization up-to-date. You can also keep track of the usage status of software licenses.

Distribute software and files.

After installing agents on computers, you can use the management server to distribute and install software on, to distribute files to, or to uninstall software from the computers. This allows you to efficiently maintain software used in your organization.

For distribution of software or files to agents for UNIX or Mac, use the Remote Install Manager.

If you are using JP1/IT Desktop Management 2 to manage devices used in your organization, we recommend that you install agents on all the computers in your organization.

Tip

A device that is not a computer can be managed without installing an agent on the device.

The following figure shows you how to install agents on computers:

[Figure]

1. Identify all devices used in your organization.

To determine the computers on which to install agents, you need to have the latest information about all the devices currently used in your organization.

If such information is not available (for example, the management ledger is not kept up-to-date or not available), use JP1/IT Desktop Management 2 to search for devices used in your organization.

You can skip the above step if you have the latest information about the devices used in your organization (for example, you manage all the computers by using Active Directory, or the management ledger is kept up-to-date).

2. Plan the installation of agents.

Determine which computers in your organization need to have agents installed, and how to install the agents.

Using JP1/IT Desktop Management 2, you can install the agents in two ways: install them using the installer provided with the agents, or distribute them for automatic installation.

3. Install agents.

Install agents according to your installation plan.

You can perform the following management tasks for agentless computers: acquire detailed computer information, apply security policies to them, determine their security status, and create security diagnostic reports.

However, you cannot perform some functions for agentless computers, such as using a security policy to automatically correct problems or to send message notifications, and distributing software or files.

Related Topics:

Organization of this section