Hitachi

JP1 Version 12 JP1/IT Desktop Management 2 Administration Guide


1.7.7 General procedure for permitting the use of authorized software only

Various types of software used for work are installed on computers in your organization. If you do not manage the software allowed for use in your organization, software that potentially causes information leakage and computer virus infection might be installed on a particular computer. To eliminate this danger, keep track of what software is installed on computers in your organization and permit the use of authorized software only.

Using JP1/IT Desktop Management 2, you can manage information about software installed on computers. You can also register software unauthorized in your organization and monitor the installation status of the unauthorized software. For computers managed online, you can deter unauthorized software from starting or automatically uninstall such software.

Tip

In addition to unauthorized software, you can register mandatory software and monitor the installation status of the mandatory software. For computers managed online, you can automatically install mandatory software on such computers.

To manage software by checking the software installed on computers in your organization and permitting the use of authorized software only:

1. Check any software installed recently.

Using JP1/IT Desktop Management 2, check whether any new software is recently installed on computers. If there is newly installed software, investigate whether the new software is necessary for work.

2. Restrict the use of software.

If the new software is not necessary for work, register it in JP1/IT Desktop Management 2 as unauthorized software and restrict its use.

In addition, set the configuration in such a way that any unauthorized software installed on the relevant computers from now on is automatically uninstalled.

Then, only the authorized software is used in your organization.

Related Topics:

Organization of this subsection

(1) General procedure for checking recently installed software

Check whether any file-sharing software that causes a security problem or software that is not related to work is installed on computers in your organization. If any of such software is installed, information leakage or computer virus infection might occur. For that reason, periodically check whether any new software is installed on computers to keep track of the software installed on computers in your organization.

If there is any newly installed software, investigate information about the software, and then ask the user about the intended use.

1. Check newly installed software.

Check whether any new software is recently installed on computers in the New Software panel. To open the New Software panel, in the Inventory module, select Overview and then Dashboard to display the Dashboard view. If there is newly installed software, investigate whether the new software is necessary for work.

2. Investigate information about software.

New software that is recently installed on a particular computer is displayed in the New Software panel in the Dashboard view, which is displayed by selecting Overview in the Inventory module and Dashboard. Click the link of the software name to navigate to the Software Inventory view of the Inventory module. In the Software Inventory view, check information about the software and the computer where the software is installed.

Using the Internet or others, investigate whether the new software is necessary for work. If the new software is not necessary for work, ask the user about the intended use.

3. Ask the user about the intended use.

In the Software Inventory view of the Inventory module, select the Installed Computers tab. Inform the user of the displayed computer that software not necessary for work is installed on the computer, and ask the user about the intended use.

If the intended use is not justified, instruct the user to uninstall the software or use the distribution function to uninstall the software. In addition, advise the user not to install any unauthorized software from now on.

If the new software is not necessary for work, register it as unauthorized software and restrict its use.

Tip

If you set the configuration in such a way as to collect operation logs, you can investigate traces of software usage (program activation logs) in the Operations Logs view of the Security module.

Related Topics:

(2) General procedure for restricting the use of software

If you find that the software newly installed on a particular computer is not necessary for work, register the new software as unauthorized software and restrict the use of the new software.

1. Register software as unauthorized software.

To restrict the use of the software, in the Software Inventory view of the Inventory module, register the software in a security policy as unauthorized software.

Tip

You can also register unauthorized software when setting a security policy.

After registering the software as unauthorized software, you can check the installation status of the unauthorized software by using the Unauthorized Software Installation Status report in the Security Detail Reports view of the Reports module. For computers managed online, you can deter unauthorized software from starting or automatically uninstall unauthorized software.

2. Check the installation status of unauthorized software.

Check the Unauthorized Software Installation Status report in the Security Detail Reports view of the Reports module. Check the usage trends of unauthorized software and the status of countermeasures taken against unauthorized software, and if there is any problem, take action.

Tip

You can also register mandatory software in a software use policy. After registering mandatory software, you can check the installation status of the mandatory software by using the Mandatory Software Installation Status report. For computers managed online, you can automatically install mandatory software on such computers.

Then, only the authorized software is used in your organization.

Related Topics: