Index
A
-
acquiring
-
acquiring (when connection destination of agent is turned off)
-
acquiring operation logs
-
acquiring Windows update
-
acquiring Windows updates
-
Active Directory
-
Active Directory linkage
-
Active Directory search
-
Active Directory searches
-
administration scopes
-
agent
-
agent/agentless management
-
agent configurations
-
agentless
-
agentless devices
-
Agent Manager window
-
allowed for use
-
allowing network access
-
AMT
-
analysis
-
analyzing
-
anti-virus product
-
applying asset field definitions
-
applying security measures
-
applying software search conditions
-
assessment level
-
asset association information
-
asset fields
-
asset field types
-
asset information
-
asset management
-
assets
-
Assets module
-
asset status
-
assigning
-
assignment
-
associating
-
attached files are saved
-
automated countermeasures
-
automatically registering
-
automatic control
-
automatic countermeasure
-
automatic execution
-
automatic information acquisition
-
automatic installation
-
automatic notification
-
automatic update
-
Automatic update
-
automatic updating
-
auto protect of anti-virus product
B
-
backing up
-
backing up operation logs
-
backup
-
balloon tips
-
behavior
-
blacklist
-
blocking network access
C
-
caching
-
calculating
-
calculation
-
calculation schedules
-
cautionary notes
-
cautions
-
changing
-
chat
-
chat server icon
-
Chat window
-
checking
-
checking status
-
cluster
-
cluster system
-
collecting
-
collecting files
-
collecting logs
-
collecting operation log
-
collecting operation logs
-
collecting operation logs for file downloads
-
collecting operation logs for file uploads
-
collecting revision history
-
collecting web access operation logs
-
commands
-
computers
-
computers managed offline
-
computers managed online
-
computers with software installed
-
conditions
-
configuration
-
configurations for management
-
configuring Active Directory searches
-
configuring authentication information for agentless devices
-
configuring automatic update of network control list
-
configuring network searches
-
connecting to remote computer
-
connection log
-
connection mode
-
connection modes
-
connection-target computers
-
considerations
-
contents of message
-
contract fields
-
contract information
-
contract status
-
contract vendor fields
-
contract vendor list
-
controller
-
controller connection status
-
controller files in user environments
-
controller program
-
controlling
-
controlling interface
-
costs
-
countermeasures
-
CPUs
-
creating
-
creating user account
D
-
database
-
data sources
-
data traffic
-
data types
-
defining
-
deleting
-
department definition
-
department group
-
detailed filter
-
detecting device
-
determining whether file is to be monitored
-
deterrence targets
-
device information
-
device information acquisition (agentless administrative shares)
-
device information collection
-
device information reporting to higher management server
-
device information which can be collected in revision history and conditions to detect change
-
device management
-
device operations
-
devices
-
device status
-
device status and product license
-
device statuses
-
device types
-
DHCP environments
-
difference
-
difference of security judgment
-
discovering
-
discovering networked devices
-
discovery
-
disk space
-
disk space requirements
-
disk space requirements guidelines
-
display
-
displaying
-
displaying connection status
-
distributed packages (ITDM-compatible distribution)
-
distributing
-
distributing files efficiently
-
distributing software and files
-
distributing Windows update
-
distributing Windows updates
-
distribution
-
Distribution (ITDM-compatible)
-
distribution function
-
distribution function (ITDM-compatible distribution)
-
downgrade licenses
E
-
editing device information
-
efficient internal controls
-
emails are sent and received
-
environment setup
-
event notification
-
events
-
Events module
-
examining
-
excluding user accounts from security status judgment target
-
exclusive communication destinations for blocked devices
-
executing task
-
expired contracts
-
exporting
F
-
features
-
fields
-
file/folder operations
-
files
-
files are sent and received
-
file transfer
-
File Transfer window
-
File Transfer window of Download Manager
-
filters
-
flow
-
folders
-
format
-
format of a user settings file excluded from security status judgment
-
formats
-
functional differences between agent/agentless management, [2]
-
functions
G
-
Getting Started
-
Green IT
-
group configuration
-
groups
-
guidelines
H
-
hardware asset fields
-
hardware asset information
-
hardware assets
-
Home module
I
-
identifying
-
imported CSV files
-
importing
-
incoming files
-
information and notes
-
information collected
-
information entered by users
-
installation
-
installation set
-
installing
-
internet gateway
-
Inventory module
-
investigating
-
ITDM-compatible distribution
-
items
J
-
JP1/IT Desktop Management 2
-
JP1/NETM/NM - Manager linkage
-
judging
-
judging criteria
-
judging result
-
judging results
-
judging security status
-
judging settings
-
judgment target
L
-
large numbers of print jobs
-
latest program update
-
license status
-
limit values
-
linkage
-
list of
-
load
-
location definition
-
location group
-
locking
-
logging in
-
lower versions
M
-
mail notification
-
mail server
-
managed computers
-
managed software fields
-
managed software information
-
management
-
management configuration
-
management targets
-
managing
-
managing assets
-
managing device information
-
managing devices
-
managing network connections
-
managing operation logs
-
managing packages and tasks
-
managing product licenses
-
mandatory software
-
manually registering
-
MDM linkage
-
MDM system
-
MDM systems
-
mechanism for acquiring device information from agentless devices
-
memory
-
menus
-
message notification
-
multi-server configuration, [2]
N
-
NAT environments
-
network
-
network access
-
network access control
-
network access control agent
-
network connection information
-
network connections
-
network control function
-
network control list
-
Network Filter Settings view
-
network monitor
-
network monitoring
-
network monitoring function
-
network monitoring requirements
-
network monitor settings
-
network search
-
network searches
-
notes
-
Notes
-
notification
-
notification target
-
NX NetMonitor/Manager linkage
O
-
online managed computers
-
online management
-
operating status
-
operation
-
operation log backup folder
-
operation log database
-
operation logs
-
operation log settings
-
operation logs for print operations
-
operations
-
operations are restricted on user computers
-
operation windows
-
output
-
output data
-
overview
P
-
package distribution
-
packages
-
panels
-
parameters
-
PDCA cycle
-
periodically exporting
-
periodic maintenance needs
-
permissions
-
playback
-
postponing
-
power control
-
preparation
-
prerequisite
-
prerequisites
-
prerequisites
-
prerequisites and notes
-
printing
-
print operations
-
procedure
-
process for
-
product
-
prohibited operations
-
prohibited operations are restricted
-
prohibited services
-
prohibited software
-
properties
-
purpose-built system configuration
R
-
recommended disk space
-
recording
-
recording files
-
recreating index
-
registering
-
registering licenses
-
registry information
-
relationship
-
-
Remote Control Player window
-
remote control sessions
-
remote control using Windows authentication
-
Remote Control window
-
Remote Install Manager
-
report duration and start date
-
reports
-
requirements
-
restart
-
restarting computers
-
restoring
-
restoring operation logs
-
restricting
-
restricting printing
-
restricting startup of software
-
restricting use of devices
-
restriction on character
-
restrictions
-
revision history
-
revision history
-
revision history configuration
S
-
searching
-
security
-
security control
-
security judgment
-
security management
-
Security module
-
security policies
-
security policy
-
security policy violation
-
security policy violations
-
security schedule
-
security status
-
security status judgment
-
security status judgment target
-
services and processes
-
setting
-
setting authentication information
-
setting connection destinations
-
setting security policy
-
settings for efficient video recording
-
setting user permissions
-
setup
-
severity
-
shared management items
-
shutdown
-
simple filter
-
smart devices
-
software
-
software information
-
software license fields
-
software license information
-
software licenses
-
software search conditions
-
software types
-
source information
-
specified program updates
-
startup and blockage of programs
-
summary report
-
supported anti-virus products
-
support service
-
support service linkage
-
suspicious file movements
-
suspicious movements of files
-
suspicious out-movement of files
-
suspicious print operations
-
system configuration
-
system information
-
system summary
T
-
task allocation
-
task allocations
-
tasks
-
Text type data
-
timing
-
timing
-
tracked date
-
transferring clipboard data
-
type of operation log
-
types
-
types of Windows updates
U
-
uninstallation
-
uninstallation of software
-
update groups
-
update list
-
updates
-
updating
-
updating update list
-
upgrade licenses
-
usage status
-
USB device types
-
user account
-
user accounts
-
user computer
-
user computers
-
user-defined groups
-
user-defined security settings
-
user entry
-
user information
-
user permissions
-
users
-
users are directed to restart computers
-
users are directed to turn off computers
-
using
V
-
viewing
-
viewing recording status
-
violation levels
-
virtual computers
W
-
whitelist
-
window operations
-
Windows update
-
Windows Update files
-
Windows updates
-
wizard
-
write operation restriction