Contents
-
1. Managing Computers by Using JP1/IT Desktop Management 2
-
1.3 General procedure for dividing tasks among administrators
-
1.11 General procedure for managing asset contract information
-
1.12 General procedure for considering the asset cost savings
-
1.14 Updating department definitions upon an organizational change
-
1.15 Configuring a VPN connection of a PC for use outside the company
-
-
-
6.12 Changing the association between device information and assets
-
6.14 Notification of the device information collected by using the information collection tool
-
6.16 Procedure for changing the display order of user information
-
6.17 Setting the display interval for the End User Form view in the Inventory module
-
6.18 Setting the information acquired from Active Directory as an additional management item
-
6.19 Procedure for reporting device information to the higher management server
-
6.25 Uninstalling software from the computers in the Inventory module
-
6.35 Removing only hierarchies that were used in the old organizational system
-
6.38 Procedure for configuring device maintenance settings and checking detection results
-
7. Remotely Controlling Devices
-
7.4 Setting up an operational environment for the remote control agent
-
-
7.5.3 Starting remote control by directly specifying the host name or IP address
-
7.5.4 Starting remote control by using the connection history
-
7.5.8 Setting automatic disconnection for a remotely controlled computer
-
7.5.11 Remotely controlling a computer that has been turned off
-
7.5.14 Using the Ctrl, Alt, and Delete keys in remote control
-
7.5.17 Encrypting transferred data when performing remote control
-
7.5.18 Enlarging or reducing the views of a computer to match the size of the controller window
-
7.5.19 Remotely controlling a device by using the fullscreen display
-
7.5.26 Searching for connectable computers by using the Remote Controller window
-
7.5.27 Searching for connectable computers by using the connection list
-
7.5.28 Customizing the search method for computers available for remote control connections
-
9. Managing the Security Status
-
9.10 Setting the period for holding prohibited-operation suppression events and operation logs
-
-
11.1 Using hardware asset information
-
11.1.4 Setting the display interval for the End User Form view in the Assets module
-
11.1.12 Associating contract information with hardware asset information
-
11.1.13 Associating multiple items of hardware asset information
-
11.1.14 Changing the device information associated with the hardware asset information
-
11.1.15 Setting primary information associated with hardware asset information
-
11.1.16 Automatically changing the asset status of hardware assets associated with deleted devices
-
11.1.19 Removing the definition for a department or location
-
11.1.20 Removing only hierarchies that were used in the old organizational system
-
-
12. Software and File Distribution
-
-
-
17.6 ioutils exportassetassoc (exporting asset association information)
-
17.7 ioutils importassetassoc (importing asset association information)
-
17.13 ioutils exportdevicedetail (exporting device information details)
-
17.14 ioutils exportpolicy (exporting security policy settings)
-
17.15 ioutils importpolicy (importing security policy settings)
-
17.16 ioutils exportupdategroup (exporting update group settings)
-
17.17 ioutils importupdategroup (importing update group settings)
-
17.18 ioutils exportupdatelist (exporting the updated program list)
-
17.19 ioutils importupdatelist (importing the updated program list)
-
17.24 updatesupportinfo (uploading support service information)
-
17.31 getinstlogs (collecting troubleshooting information about installation)
-
17.34 getinv.vbs (collecting information about offline computers)
-
17.38 itdm2nodecount (counting the number of managed devices)
-
17.46 softwaresearch (searching for software installed in an agent device)
-
17.48 rlyigwsetconf (setting a management relay server with Internet Connectivity)
-
-
18.3 Actions to be taken when an authentication error occurs
-
18.5 Actions to be taken when a CSV file is displayed incorrectly
-
18.12 Troubleshooting problems when controlling network access
-
18.13 Troubleshooting problems during Active Directory linkage
-
18.18 Actions to be taken when a search target cannot be found with the softwaresearch command