Hitachi

JP1 Version 12 JP1/IT Desktop Management 2 Administration Guide


9.6 Suppressing the use of devices

You can specify policies regarding prohibited operations to suppress writing to or reading from devices.

To suppress the use of devices:

  1. Display the Security module.

  2. In the menu area, select Security Policy and Security Policy List.

  3. In the information area, select the security policy to edit, and then click Edit.

    To add a new security policy, click Add.

  4. Select Other Access Restrictions, which is a security configuration item.

    If the view is disabled, the suppression of device usage is disabled. To enable it, click the Enabled button in the top-left corner.

  5. In Suppression of Device Usage, specify the devices which you want to suppress the use of.

  6. If necessary, select devices to be displayed as suppressed on users' computers in List of devices to be displayed in the suppression message.

    The message can be displayed only for devices whose usage is suppressed.

  7. To suppress only writing to some devices, specify those devices in List of devices for which the write operation is suppressed.

    The devices must be permitted for use before you can suppress writing to them. Devices to which you can suppress only writing depends on the OS of the computer. For details about the devices that can be suppressed for each OS, see the JP1/IT Desktop Management 2 Overview and System Design Guide.

  8. Click OK.

The use of devices is suppressed according to the specified policy regarding prohibited operations.

If you select Permits the use of registered USB devices when setting the suppression of USB devices, the USB devices for which hardware asset information is registered will not be suppressed. In addition,You can also select Limit the assets that can be used to limit assets that can use the USB device, depending on the condition of the department, location, or associated asset.

Tip

If you assign a security policy with writing suppressed in List of devices for which the write operation is suppressed, a message that prompts a user to restart their computer appears. The security policy settings take effect when the user's computer is restarted in response to the message.

Tip

If you suppress the use of an internal CD or DVD drive or internal floppy disk drive, an event occurs on a computer that contains such devices. Therefore, security assessment of a prohibited operation might be temporarily degraded irrespective of user operation.

Tip

After blocking connection of a USB device with the function for prohibiting operation, allow the USB device to be connected, the OS might not recognize the USB device. In this case, enable the USB device with the following procedure:

  1. Open the Windows device manager on the PC where the phenomenon that a USB device is not recognized occurs.

  2. Expand Disk drives of the device manager.

  3. Connect the USB device to the PC.

  4. Confirm that the disk drive added under Disk drives of the device manager is disabled, when it is disabled, right-click the disk drive and then select Enable from the menu.

Related Topics: