A.11 Conditions where the tools must be re-executed on an offline-managed computer
After you modify a configuration of an offline-managed computer in the operation window, you need to re-execute a tool. The following table lists and describes which configuration tool must be re-executed depending on which configuration item is modified.
Configuration item |
Condition |
Configuration tool |
||||
---|---|---|---|---|---|---|
Installation set |
getinv.vbs (to collect offline management information) |
setsecpolicy.vbs (to apply the security policy to the offline-managed computer and collect device information) |
||||
Agent configuration |
|
R |
-- |
-- |
||
System policy |
Extended inventory |
|
-- |
R |
R |
|
Software search condition |
If a condition is added or modified |
-- |
R |
R |
||
License information |
If the software is changed from the evaluation version to the product version |
-- |
R |
R |
||
Script to collect anti-virus product information |
If the script to collect anti-virus product information is updated |
-- |
R |
R |
||
Security policy |
Security configuration item |
Updates |
If the Auto Enforce configuration in Automatic Windows Update is updated |
-- |
-- |
R |
Prohibited software |
If the Restriction Setting for startup in Auto Enforce is updated |
-- |
-- |
R |
||
Anti-virus product |
-- |
-- |
-- |
-- |
||
Mandatory software |
-- |
-- |
-- |
-- |
||
User-Defined Security Settings |
-- |
-- |
-- |
-- |
||
Unauthorized Windows Service |
If a prohibited service is added or removed or the Auto Enforce configuration is updated |
-- |
-- |
R |
||
OS Security |
If the Auto Enforce configuration is updated |
-- |
-- |
R |
||
Suppress item |
Start of software |
If a configuration is modified |
-- |
-- |
R |
|
|
If a configuration is modified |
-- |
-- |
R |
||
Device Attach |
If a configuration is modified |
-- |
-- |
R |
||
USB device list |
If a registered USB device is changed |
-- |
-- |
R |
Legend: R: Re-execution is required, --: Not applicable
- Tip
-
The configuration items for Security Policies, the Operations Logs, Common settings for prohibited operations and operation logs, Collect List of USB Device Files, and Action Items cannot be configured for the offline-managed computer.