Hitachi

JP1 Version 12 JP1/IT Desktop Management 2 Administration Guide


1.7 Managing the security status

To manage the security status of computers in your organization, you need to determine the security rules and make each computer user observe such rules. You also need to keep track of the current security status and correct security problems if necessary.

By using JP1/IT Desktop Management 2, you can do the following to efficiently manage computer security:

You can perform security management operations in the Security module. To manage the security status, set a security policy, keep track of the status of computers, and take measures against any detected security problem. By repeating the cycle of status tracking and taking measures against security problems, improve the security status of your organization. The following figure shows how to manage the security status:

[Figure]

Based on the security rules of your organization, set a security policy by using JP1/IT Desktop Management 2.

By assigning a security policy to computers, you can check the status of security policy compliance in a list or report. If you find any problem, take necessary measures. If you set automatic enforcement to the security policy, necessary measures are taken at the time when you assign the security policy to computers.

You can also use the security policy settings to deter the use of some software or devices or obtain an operation log from each computer to detect a suspicious operation.

This section explains how to use JP1/IT Desktop Management 2 in the operations described below. See the description of the operation that suits your purpose.

Set a security policy.

Set a security policy by using JP1/IT Desktop Management 2 based on the security rules of your organization. By applying the set security policy to computers, you can check the status of security policy compliance (security status).

Take necessary measures against a security policy violation.

You (administrator) can set the configuration in such a way that if a security policy violation occurs, you are informed of that violation by email. Based on the email, you can take necessary measures against the security policy violation. There are two methods for taking measures against security policy violations: automatic enforcement and manual enforcement.

Automatically apply updates to computers.

JP1/IT Desktop Management 2 obtains updates released by Microsoft and automatically distributes and applies them to computers. It takes a certain period time for JP1/IT Desktop Management 2 to apply updates to computers after the updates have been released.

Manually apply updates to computers.

You (administrator) obtain updates released by Microsoft and then register them in JP1/IT Desktop Management 2 to distribute and apply them to computers. You can immediately apply released updates to computers.

Check the anti-virus status when a virus infection occurs.

When the anti-virus product detects a virus, you can check the anti-virus status of computers.

Permit the use of authorized software only.

By checking the software installed on each computer, you can register and manage any software unnecessary for work as unauthorized software.

Check for information leakage.

If a suspicious operation is detected, you can check for information leakage.

Restrict the use of devices.

You can permit data to be read from and written to authorized devices only. You can also prohibit the use of USB devices in your entire organization and permit users in your organization to read data from and write data to a USB device only on the specific computer.

Respond to a security audit.

For a security audit to be conducted, you can provide proof that the security status in your organization is properly managed based on the security policy.

Important

The following notes apply to agents for UNIX or Mac:

For agents for UNIX

  • Because security status determination is not provided, [Figure] (Unknown) is always displayed as the violation level.

  • Neither automatic correction of security problems (automatic distribution of OS patches) nor email security notification is provided.

  • Automatic control of enabling or disabling network access is not provided. You need to enable or disable network access on demand.

  • You need to use Remote Install Manager to distribute and apply OS patches.

For agents for Mac OS

  • Security status determination is provided for items listed below. For excluded items, Out of Target is displayed as the violation level.

    • Windows Update (Automatic Update)

    • Software use

    • OS Security (Guest Account, Days Since Last Password Change, Auto Logon, Firewall, and Password (Screen Saver))

    • User-Defined Security Settings

  • Neither automatic correction of security problems (automatic distribution of OS patches) nor email security notification is provided.

  • Network access can be enabled or disabled automatically depending on the results of security status evaluation.

  • To distribute or apply OS patches, you must use distribution with Remote Installation Manager.

Tip

You can package and distribute Windows updates and a feature update to Windows 10 by using Remote Install Manager. For details, see the description of managing updates in the manual JP1/IT Desktop Management 2 Distribution Function Administration Guide.

Organization of this section