Hitachi

JP1 Version 12 JP1/IT Desktop Management 2 Administration Guide


A.11 Conditions where the tools must be re-executed on an offline-managed computer

After you modify a configuration of an offline-managed computer in the operation window, you need to re-execute a tool. The following table lists and describes which configuration tool must be re-executed depending on which configuration item is modified.

Configuration item

Condition

Configuration tool

Installation set

getinv.vbs (to collect offline management information)

setsecpolicy.vbs (to apply the security policy to the offline-managed computer and collect device information)

Agent configuration

  • If a configuration of the agent to be applied is modified

  • If an agent configuration that was applied to the offline-managed computer is updated

R

--

--

System policy

Extended inventory

- If one of the following configurations is modified:
  • Start Date for Entry of User Information

  • Field Order of Custom Fields on the User Input Window

- If one of the following configuration items is added or updated when the data source is End User or Registry:
  • Common Fields (Assets and Device Inventory)

  • Custom fields of hardware asset information

--

R

R

Software search condition

If a condition is added or modified

--

R

R

License information

If the software is changed from the evaluation version to the product version

--

R

R

Script to collect anti-virus product information

If the script to collect anti-virus product information is updated

--

R

R

Security policy

Security configuration item

Updates

If the Auto Enforce configuration in Automatic Windows Update is updated

--

--

R

Prohibited software

If the Restriction Setting for startup in Auto Enforce is updated

--

--

R

Anti-virus product

--

--

--

--

Mandatory software

--

--

--

--

User-Defined Security Settings

--

--

--

--

Unauthorized Windows Service

If a prohibited service is added or removed or the Auto Enforce configuration is updated

--

--

R

OS Security

If the Auto Enforce configuration is updated

--

--

R

Suppress item

Start of software

If a configuration is modified

--

--

R

Print

If a configuration is modified

--

--

R

Device Attach

If a configuration is modified

--

--

R

USB device list

If a registered USB device is changed

--

--

R

Legend: R: Re-execution is required, --: Not applicable

Tip

The configuration items for Security Policies, the Operations Logs, Common settings for prohibited operations and operation logs, Collect List of USB Device Files, and Action Items cannot be configured for the offline-managed computer.