Hitachi

JP1 Version 12 JP1/IT Desktop Management 2 Administration Guide


A.8 Cases in which settings are applied after a restart

You sometimes need to restart a computer to apply settings for JP1/IT Desktop Management 2. A restart is required in the following cases:

When a security policy is edited

If you edit any of the following items, restart the computer to which the edited security policy is assigned. The items inside the parentheses indicate the relevant security configuration items. After the computer is restarted, the edited security policy is applied to that computer.

# The settings of Suppression of Device Usage and Acquisition of Operation Logs are applied when a security policy is assigned. However, we recommend that you restart your computer, because some of settings related to the suppression of device usage or to operation logs take effect only after a restart.

The settings that take effect after a restart are as follows.

Classification

Setting Item

operation logs

operation logs

  • Copy file

  • Move file

  • Rename file

  • Create file

  • Delete file

  • Web Access (Upload)

  • Web Access (Download)

  • FTP (Send File)

  • FTP (Receive File)

  • Send Mail (Attachment File)

  • Receive Mail (Attachment File)

  • Save Attached File

  • Copy folder

  • Move folder

  • Rename folder

  • Create folder

  • Delete folder

Suspicious operations

  • Send/Receive E-mail with Attachments

  • Use Web/FTP Server

  • Copy/Move the File to External Device

Other Access Restrictions

Suppression of write operation

  • Removable disks

  • CD/DVD drives

  • FD drives

When a security policy is assigned

Restart the computer to which the security policy is assigned. After the computer is restarted, the assigned security policy is applied to that computer.

The settings of Suppression of Device Usage and Acquisition of Operation Logs are applied when a security policy is assigned. However, some settings of Suppression of Device Usage and Operation Logs might take effect after a restart.

When security measures are manually performed

If you specify any of the following configuration items, restart the computer for which the items have been specified. The items inside the parentheses indicate the relevant security configuration items. After the computer is restarted, the security measures are executed on the computer.