Hitachi

JP1 Version 12 JP1/IT Desktop Management 2 Administration Guide


1.8 Checking for the occurrence of information leakage

If information leakage occurs, not only important data in your organization leaks out, but also your organization's social reputation might be ruined.

If any suspicious operation that can lead to information leakage is performed, you need to quickly investigate the situation to see if there is any problem. JP1/IT Desktop Management 2 can detect the occurrence of a suspicious operation and automatically notify you (administrator) of that occurrence by email. Based on the received email, you can investigate the occurred suspicious operation in a timely manner.

Note that information data brought out by an outside intruder can cause information leakage. If such a situation occurs, you need to investigate traces of the information data brought out of a particular computer and quickly check whether there is any problem. Using JP1/IT Desktop Management 2, you can investigate operation logs collected from each computer, check traces of network connection for a computer brought in from outside, and check the status of the security settings related to illegal access for each computer.

Related Topics:

Organization of this section