Hitachi

JP1 Version 12 JP1/IT Desktop Management 2 Administration Guide


10.3 Specifying settings for detecting suspicious operations

To detect suspicious operations, specify settings for Suspicious Operations To Be Reported in the operation log policy.

To specify settings for suspicious operations:

  1. Display the Security module.

  2. In the menu area, select Security Policy and then Security Policy List.

  3. In the information area, select the security policy that you want to edit, and then click the Edit button.

    To add a security policy, click the Add button.

  4. In the security configuration items, click Operation Logs.

    If the view is inactive, the operation log policy is disabled. To enable the policy, click the Enabled button in the upper-left corner.

  5. Specify settings for suspicious operations in Suspicious Operations To Be Reported.

  6. Click OK.

If suspicious operations are detected, operation logs for suspicious file transfer operations are displayed in the Security module, and events for all suspicious operations are displayed in the Events module.

Related Topics: