HPE Intelligent Management Center

Size: px
Start display at page:

Download "HPE Intelligent Management Center"

Transcription

1 HPE Intelligent Management Center EAD Security Policy Administrator Guide Abstract This guide contains comprehensive information for network administrators, engineers, and operators working with the TAM service module. Part number: R Software version: IMC EAD 7.2 (E0402) Document version: 1.0

2 Copyright 2015 Hewlett Packard Enterprise Development LP The information contained herein is subject to change without notice. The only warranties for Hewlett Packard Enterprise products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. Hewlett Packard Enterprise shall not be liable for technical or editorial errors or omissions contained herein. Confidential computer software. Valid license from Hewlett Packard Enterprise required for possession, use, or copying. Consistent with FAR and , Commercial Computer Software, Computer Software Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under vendor s standard commercial license. Links to third-party websites take you outside the Hewlett Packard Enterprise website. Hewlett Packard Enterprise has no control over and is not responsible for information outside the Hewlett Packard Enterprise website. Acknowledgments Intel, Itanium, Pentium, Intel Inside, and the Intel Inside logo are trademarks of Intel Corporation in the United States and other countries. Microsoft and Windows are trademarks of the Microsoft group of companies. Adobe and Acrobat are trademarks of Adobe Systems Incorporated. Java and Oracle are registered trademarks of Oracle and/or its affiliates. UNIX is a registered trademark of The Open Group. i

3 Contents Overview 1 EAD functions 1 User Security Policy functions 2 Desktop Asset Management functions 2 EAD solution 2 EAD in the BYOD solution 3 Quick start guide 4 Accessing EAD 4 Classic mode 4 Desktop mode 11 Security check for PCs 13 Configuration procedure 13 Security check items 13 Security level and security mode 14 Isolation mode 14 Security check flow chart 15 Security check for smart devices 16 Configuration procedure 16 Security check items 17 Security level, security mode, and device action 17 Isolation mode 18 SCC collaboration 18 Desktop asset management 18 Desktop asset management procedure 18 Desktop asset grouping type 19 Desktop asset numbering mode 19 Desktop asset registration and approval 19 Desktop control scheme 20 Decentralized management of IMC functions 20 Operator role and group 20 Service group 20 Decentralized management by operator and service groups 20 Common operations 22 Navigating a list 22 Sorting a list 23 Configuring the security check for PCs 24 Security policy contents 24 Security level 24 Isolation mode 24 Security check items 25 Managing security policies 26 Security policy list contents 26 Security policy details 27 Viewing the security policy list 34 Viewing security policy details 34 Adding a security policy 34 Modifying a security policy 35 Deleting a security policy 36 Managing security levels 37 Making a security level action take effect 37 Security level list contents 37 Security level details 37 Viewing the security level list 40 Viewing security level details 41 Adding a security level 41 i

4 Modifying a security level 41 Deleting a security level 42 Managing client ACLs 42 Client ACL list contents 43 Client ACL details 43 Viewing the client ACL list 44 Viewing client ACL details 44 Adding a client ACL 44 Modifying a client ACL 44 Deleting a client ACL 45 Managing URL control policies 45 URL control policy list contents 46 URL control policy details 46 Viewing the URL control policy list 47 Viewing the URL control policy details 47 Adding a URL control policy 47 Modifying a URL control policy 48 Deleting a URL control policy 48 Managing domain URL groups 48 Domain URL group list contents 49 Domain URL group details 49 Domain URL item list contents 49 Viewing the domain URL group list 49 Viewing the domain URL group details 49 Adding a domain URL group 50 Configuring a domain URL group 50 Modifying a domain URL group 51 Deleting a domain URL group 51 Managing IP URL groups 51 IP URL group list contents 52 IP URL group details 52 Viewing the IP URL group list 52 Viewing the IP URL group details 52 Adding an IP URL group 52 Modifying an IP URL group 53 Deleting an IP URL group 54 Managing anti-virus software policies 54 Anti-virus software policy list contents 54 Anti-virus software policy details 54 Viewing the anti-virus software policy list 55 Viewing anti-virus software policy details 55 Adding an anti-virus software policy 56 Modifying an anti-virus software policy 57 Deleting an anti-virus software policy 59 Managing anti-spyware software policies 59 Anti-spyware software policy list contents 59 Anti-spyware software policy details 59 Viewing the anti-spyware software policy list 60 Viewing anti-spyware software policy details 60 Adding an anti-spyware software policy 60 Modifying an anti-spyware policy 62 Deleting an anti-spyware software policy 63 Managing firewall software policies 63 Firewall software policy list contents 63 Firewall software policy details 63 Viewing the firewall software policy list 64 Viewing firewall software policy details 64 Adding a firewall software policy 64 Modifying a firewall software policy 64 Deleting a firewall software policy 65 Managing anti-phishing software policies 65 Anti-phishing software policy list contents 65 ii

5 Anti-phishing software policy details 66 Viewing the anti-phishing software policy list 66 Viewing anti-phishing software policy details 66 Adding an anti-phishing software policy 66 Modifying an anti-phishing software policy 67 Deleting an anti-phishing software policy 67 Managing hard disk encryption software policies 68 Hard disk encryption software policy list contents 68 Hard disk encryption software policy details 68 Viewing the hard disk encryption software policy list 68 Viewing hard disk encryption software policy details 69 Adding a hard disk encryption software policy 69 Modifying a hard disk encryption software policy 69 Deleting a hard disk encryption software policy 70 Managing PC software control groups 70 PC software control group list contents 71 Viewing the PC software control group list 71 Querying PC software control groups 71 Deleting a PC software control group 72 Managing software-type PC software control groups 72 Managing process-type PC software control groups 75 Managing service-type PC software control groups 78 Managing file-type PC software control groups 80 Managing common software 83 Managing patch software 85 Patch software list contents 85 Configuring patch software management 85 Managing Windows patches 86 Windows patch list contents 86 Windows patch information details 86 Applicable Windows version list 86 Viewing the Windows patch list 87 Querying Windows patches 87 Adding a Windows patch 87 Modifying a Windows patch 87 Deleting a Windows patch 88 Managing Windows versions 88 Windows version list contents 88 Viewing a Windows version 88 Adding a Windows version 88 Deleting a Windows version 89 Managing registry control policies 89 Registry control list contents 89 Registry control list details 90 Viewing the registry control list 91 Viewing a registry control 91 Querying the registry control 91 Adding a registry control 91 Modifying a registry control 92 Deleting a registry control 92 Managing share control 92 Share control list contents 93 Share control details 93 Viewing the share control list 94 Viewing share control details 94 Adding a share control 94 Modifying a share control 94 Deleting a share control 94 Managing traffic control 95 Traffic control list contents 95 Traffic control details 95 Viewing the traffic control list 96 iii

6 Viewing traffic control details 96 Adding a traffic control 96 Modifying a traffic control 97 Deleting a traffic control 97 Managing password control 97 Modifying the password dictionary 97 Modifying the local password policy 98 Performing security check by using security policies 99 Configuring real-time monitoring 99 Configuring the default security policy for roaming users 100 Assigning security policies 101 Configuring Internet access control 102 Overview 102 Internet access control methods 102 Client ACLs 103 Audit of unauthenticated Internet access 103 Audit of authenticated Internet access 103 Internet access audit logs 103 Internet access logging parameters 103 Managing Internet access policies 103 Viewing the Internet access policy list 104 Viewing Internet access policy details 104 Adding an Internet access policy 105 Modifying an Internet access policy 106 Deleting an Internet access policy 106 Managing Internet access audit policies 107 Viewing the Internet access audit policy list 107 Viewing Internet access audit policy details 107 Adding an Internet access audit policy 108 Modifying an Internet access audit policy 108 Deleting an Internet access audit policy 109 Managing Internet access audit logs 109 Viewing the online audit log list 109 Querying online audit logs 110 Viewing online audit log details 111 Viewing the offline audit log list 111 Querying offline audit logs 112 Configuring Internet access logging parameters 112 Applying Internet access policies 113 Configuring the default Internet access policy for an access service 113 Assigning an Internet access policy to an access scenario 113 Configuring the security check for smart devices 114 Security policy contents 114 Security level 114 Isolation mode 115 Security check item 115 Managing MDM vendors 116 Configuring MDM vendor settings 116 Manually validating MDM vendor settings 116 Managing security policies 116 Security policy list contents 116 Security policy details 117 Viewing the security policy list 118 Viewing security policy details 118 Adding a security policy 118 Modifying a security policy 119 Deleting a security policy 119 Managing security levels 119 Security level contents 119 Security level list contents 120 iv

7 Security level details 120 Viewing the security level list 121 Viewing security level details 121 Adding a security level 121 Modifying a security level 122 Deleting a security level 123 Managing MDM collaboration policies 123 MDM collaboration policy list contents 123 MDM collaboration policy details 123 Viewing the MDM collaboration policy list 124 Viewing MDM collaboration policy details 124 Adding an MDM collaboration policy 125 Modifying an MDM collaboration policy 125 Deleting an MDM collaboration policy 126 Managing hierarchical EAD networks 127 Configuring the policy management mode 127 Managing nodes in a hierarchical EAD network 127 Child node list contents 128 Child node information 128 Parent node information 130 Viewing the child node list 130 Modifying the name of the current node 130 Viewing child node details 130 Adding a child node 131 Modifying a child node 131 Deleting a child node 132 Confirming the parent node 132 Deleting the parent node 132 Deploying services, security policies, and service parameters 133 Deployment contents 133 Specifying the services to be deployed to a child node 133 Scheduling automatic deployment tasks 133 Manually deploying configurations to a child node 134 Managing the deployment and receipt history 134 Deployment history list contents 134 Receipt history list contents 134 Viewing the deployment history list 134 Viewing the receipt history list 135 Querying the deployment history to a child node 135 Querying the receipt history of the current node 135 Managing the EAD node topology 136 Accessing the EAD node topology 136 Adding a node to the EAD node topology 137 Uploading a background picture 138 Using an existing picture as the background picture 138 Modifying a node icon 138 Managing desktop assets 140 Managing asset groups 140 Asset group list contents 140 Asset group details 141 Viewing the asset group list 142 Viewing asset group details 142 Adding asset groups 142 Modifying an asset group 143 Deleting an asset group 144 Granting an operator privileges to manage asset groups 144 Managing assets 144 Asset registration process 145 Asset list contents 145 Asset details 145 v

8 Viewing the asset list 150 Viewing asset details 150 Querying assets 154 Managing asset models 157 Adding an asset 158 Batch importing assets 159 Modifying an asset 160 Deleting an asset 162 Regrouping an asset 162 Verifying an asset 162 Viewing the asset verification list 162 Viewing asset details 163 Verifying an asset 163 Deleting asset records 164 Exporting asset information 164 Asset export function asset list 164 Exporting asset information 164 Asset export history list contents 165 Viewing the asset export history 165 Downloading the asset export history record 165 Deleting the asset export history record 166 Collecting asset statistics 166 Collecting statistics by asset type 166 Collecting statistics by CPU 167 Collecting statistics by hard disk 168 Collecting statistics by operating system 170 Collecting statistics by software installed 173 Managing export tasks 174 Viewing the export task management list 174 Configuring the export task 174 Configuring desktop control schemes and policies 176 Configuring desktop control schemes 176 Desktop control scheme list contents 176 Desktop control scheme details 176 Viewing the desktop control scheme list 177 Viewing desktop control scheme details 177 Adding a desktop control scheme 177 Modifying a desktop control scheme 178 Deleting a desktop control scheme 178 Configuring peripheral policies 178 Peripheral policy list contents 178 Peripheral policy details 179 Viewing the peripheral policy list 180 Viewing peripheral policy details 180 Adding a peripheral policy 180 Modifying a peripheral policy 181 Deleting a peripheral policy 182 Configuring energy-saving policies 182 Energy-saving policy list contents 182 Viewing the energy-saving policy list 182 Adding an energy-saving policy 183 Modifying an energy-saving policy 183 Deleting an energy-saving policy 183 Configuring monitoring alarm policies 184 Monitoring alarm policy list contents 184 Monitoring alarm policy details 184 Viewing the monitoring alarm policy list 185 Viewing monitoring alarm policy details 186 Adding a monitoring alarm policy 186 Modifying a monitoring alarm policy 187 Deleting a monitoring alarm policy 188 vi

9 Auditing desktop assets 189 Asset hardware change record audit 189 Asset hardware change information list contents 190 Asset hardware change record details 190 Viewing the asset hardware change information list 191 Viewing asset hardware change record details 191 Querying asset hardware change records 191 Asset software change record audit 192 Asset software change information list contents 193 Asset software change record details 194 Viewing the asset software change record list 195 Viewing the asset software change record details 195 Querying the asset software change records 195 USB file transfer log audit 196 USB file transfer log list contents 196 USB file transfer log details 197 Viewing the USB file transfer log list 197 Viewing the USB file transfer log details 198 Querying the USB file transfer logs 198 Exporting USB file transfer logs 199 Viewing the USB file transfer log export history 200 Printer use log audit 200 Printer use log list contents 200 Printer use log details 201 Viewing the printer use log list 201 Viewing the printer use log details 202 Querying the printer use logs 202 Exporting the printer use logs 203 Viewing the export history of the printer use logs 204 Printer use logs export history list contents 204 Unauthorized peripheral use record audit 204 Unauthorized peripheral use list contents 204 Unauthorized peripheral use log export history list contents 205 Viewing the unauthorized peripheral use record list 205 Viewing the export history of unauthorized peripheral use records 206 Querying the unauthorized peripheral use records 206 Exporting the unauthorized peripheral use records 207 Terminal file audit 208 Asset file check list contents 208 Asset file check list details 208 Viewing the terminal file audit task list 209 Querying terminal file audit tasks 209 Auditing the terminal files 210 Viewing the terminal file audit results 210 Exporting the terminal file audit results 211 Configuring software deployment 212 Preparing to use the software deployment function 212 Configuring software deployment server settings 212 Software server settings list contents 212 Software deployment server settings details 212 Viewing the software deployment server settings list 213 Viewing software deployment server settings details 213 Adding software deployment server settings 213 Modifying software deployment server settings 214 Deleting software deployment server settings 214 Configuring software deploy tasks 214 Software deploy task list contents 214 Software deploy task details 215 Task execution result details 217 Viewing the software deploy task list 217 vii

10 Viewing software deploy task details 217 Querying software deploy tasks 218 Adding a software deploy task 219 Modifying a software deploy task 220 Deleting software deploy tasks 220 EAD audit 221 Security logs 221 Security log list contents 221 Security log details 222 Viewing the security log list 222 Viewing security log details 223 Querying security logs 223 Client driver audit 225 inode driver list contents 225 Viewing client driver errors in the inode Driver list 225 Querying client driver errors 225 Security status audit for local and roaming online users 226 Local online user list contents 226 Roaming online user list contents 226 Viewing the local online user list 227 Viewing the roaming online user list 227 Customizing the local online user list 227 Performing a computer security check 228 Computer security check result details 228 Performing a computer security check 230 EAD service reports 231 Real-time reports 232 All-node online users 24-hour trend graph 233 Asset information report 234 Asset Report by Software 235 Asset type report 236 Asset usage report 237 CPU report 238 Hard Disk capacity report 239 Illegal peripheral use report 240 Insecurity category statistic report 242 Multi-node certain security policy statistics report Error! Bookmark not defined. Multi-node online users comparison chart Error! Bookmark not defined. Multi-node security check items report Error! Bookmark not defined. Multi-node single-security check item failures comparison chart Error! Bookmark not defined. Multi-node user counts comparison chart Error! Bookmark not defined. Multi-node user data statistics report 243 Online user security status report 244 OS language report 245 OS version report 247 Safe log gather statistic report 248 Single-node online users 24-hour trend graph 249 Single-node security check failure report 250 Software installation report 252 Software Report by Asset 253 Scheduled reports 254 Asset Report by Software 256 Asset type report 258 Asset usage report 260 CPU report 262 Hard disk capacity report 264 Illegal peripheral use report 266 Insecurity category statistic report 270 Online user security status report 272 OS language report 274 viii

11 OS version report 276 Safe log gather statistic report 278 Software installation report 281 Software Report by Asset 283 Configuring service parameters i User security policy service parameters i Configuring EAD service parameters ii Validating EAD service parameters ii DAM service parameters iii Configuring DAM service parameters v Validating DAM service parameters v ix

12 Overview As an IMC service component, EAD Security Policy (hereinafter referred to as EAD) works with the IMC UAM component to provide endpoint security checking and asset management. It plays an essential role in both the EAD solution and BYOD solution. As shown in Figure 1, a network deployed with IMC EAD typically has the following elements: UAM server Server deployed with IMC UAM to provide authentication, authorization, and accounting services for endpoint users. EAD server Server deployed with IMC EAD to provide security checking and asset management for endpoint devices. IMC operator Depending on the assigned administrative privileges, IMC classifies operators as administrators, maintainers, and viewers. Access device Access layer device that works with UAM to provide network access to endpoint users. Typically, switches with high port density serve as access devices in wired networks, and access controllers are used as access devices in wireless networks. Endpoint device Devices used by end user for network access. IMC classifies user endpoints into PCs and smart devices. PCs include desktop and laptop computers. Smart devices include mobile phones and tablets. Desktop asset Windows PC managed as a desktop asset in EAD. Desktop asset management helps monitor the assets' operating status and usage information. End user User who accesses the network from an endpoint device by using an access user account stored in UAM. Figure 1 Elements involved in a network deployed with EAD EAD functions EAD consists of the User Security Policy service module and the Desktop Asset Management (DAM) service module. 1

13 User Security Policy functions The User Security Policy module provides endpoint security and audit functions. It determines an access user's security status by performing pre-configured checks on the user endpoint. It also provides the ability to take proactive actions on insecure users, such as isolating, monitoring, and kicking out the users. Table 1 lists the functionality provided by the User Security Policy module. Table 1 User Security Policy module functions Function Security policy management Internet access control Hierarchical access service and security policy management Security audit Security policy service report Security policy service parameter configuration Description Provides the ability to customize security policies. Provides the ability to configure the Internet access audit function and Internet access control policies. Provides hierarchical management of access services and security policies, as well as the EAD global network monitoring function. Provides the ability to audit security check results. Provides the ability to generate reports based on security check results. Provides the ability to configure security policy service parameters. Desktop Asset Management functions DAM manages computers running a Windows operating system as assets. DAM centrally manages software and hardware of assets, controls and audits the assets' usage, and deploys other software products to assets. Table 2 lists the functionality provided by the DAM module. Table 2 DAM service module functions Function Desktop asset management Desktop control Asset audit Software deployment DAM service report DAM service parameter configuration Description Provides the ability to collect asset information for audit. Provides various functions to control the software and hardware of assets. Provides various functions to verify assets. Provides the ability to deploy software to assets. Provides the ability to generate reports based on asset usage statistics. Provides the ability to configure DAM service parameters. EAD solution The EAD solution enforces enterprise security policies on endpoint users to control network access, monitor network behavior, and build proactive defense capability. The solution requires cooperation of the inode client, security policy server, network access device, and third-party software. The EAD solution adopts a client-server model. 2

14 It includes IMC UAM on the server side, and the inode client on the client side. inode client Receives security policies and control schemes from the EAD server, performs security checking on the user endpoint, and reports the check results to the server. EAD server Controls the user's network access based on the check results, and collects information for audit. EAD in the BYOD solution The BYOD solution provides the technologies needed to bring mobile devices onboard (personal or company provided), and to consistently enforce access policies to safeguard the security for the network. It also provides device-specific monitoring, auditing, and reporting functions. In the BYOD solution, EAD works with a third-party MDM server to manage mobile devices. The device management functions are implemented through APIs provided by the MDM server. All mobile devices are managed by the MDM server through the MDM client running on them. 3

15 Quick start guide The following information guides you quickly through the main functions of the EAD component. Accessing EAD IMC provides the following EAD access modes: Classic Log in to the classic IMC interface. Operators access EAD functions through the navigation menu. It is the default access mode. Desktop Log in to the Web desktop. Operators add EAD functions to the Web desktop as applications, and click the application icons to use EAD functions. Operators can select the access mode on the IMC login page or on the upper right of an IMC operation page. This guide describes EAD functions in classic mode. Classic mode In classic mode, operators access EAD functions through the navigation menu. EAD provides a breadcrumb navigation menu and a navigation tree, which have the same navigation menu options (see "EAD navigation menu options"). Breadcrumb navigation menu Point to a menu option to display the submenu. Navigation tree Click a menu option to display the submenu. Unless otherwise stated, operation procedures in this guide use the navigation tree. Breadcrumb navigation menu EAD has separate breadcrumb navigation menus for User Security Policy and DAM, as shown in Figure 2 and Figure 3. Each breadcrumb navigation menu has three levels. 4

16 Figure 2 Breadcrumb navigation menu of User Security Policy 5

17 Figure 3 DAM breadcrumb navigation menu EAD navigation tree EAD has separate navigation trees for the User Security Policy and DAM modules, as shown in Figure 4. To expand the navigation menu: 2. From the navigation tree, click User Security Policy or Desktop Asset Manager. 6

18 Figure 4 EAD navigation tree 7

19 8

20 EAD navigation menu options The EAD navigation menu options are shown in Table 3; the DAM navigation menu options are shown in Table 4. Table 3 Navigation menu options of the User Security Policy module Navigation menu option Quick Start Security Policy Security Level Endpoint Access Control Traffic Control PC Security Software Policy Patch Control Software Control Group Registry Control Password Control MDM Collaboration Policy Share Control Hierarchical Node EAD Node Topology Task View the general operation process for the User Security Policy module and links to configuration tasks. View, add, modify, and delete security policies. View, add, modify, and delete security levels. Navigate to the following endpoint access control pages: Client ACL View, add, modify, and delete ACLs that are deployed to the inode client. Internet Access Audit View, add, modify, and delete policies for auditing Internet access behavior. Internet Access Policy View, add, modify, and delete Internet access policies. URL Control Policy View, add, modify, and delete URL control policies. Domain URL Group View, add, modify, and delete domain URL groups. IP URL Group View, add, modify, and delete IP URL groups. View, add, modify, and delete traffic control policies. Navigate to the following PC security software policy pages: Anti-Virus View, add, modify, and delete anti-virus software policies. Anti-Spyware View, add, modify, and delete anti-spyware software policies. Firewall View, add, modify, and delete firewall software policies. Anti-Phishing View, add, modify, and delete anti-phishing software policies. Hard Disk Encryption View, add, modify, and delete hard disk encryption software policies. Navigate to the following patch control pages: Windows Patches Query, add, modify, and delete Windows patches, and manage Windows versions. Patching Software Enable check for patch software products on Linux or Mac OS. Query, view, add, modify, and delete software control groups. View, add, modify, and delete registry control policies. View the current password dictionary and upload a new password dictionary. View, add, modify, and delete MDM collaboration policies. View, add, modify, and delete share control policies. View, add, modify, and delete child nodes and confirm management from the parent node. View monitoring information for the current EAD node and all its child EAD nodes. 9

21 Navigation menu option Service Parameters Task Navigate to the following service parameter configuration pages: System Settings Configure User Security Policy service parameters. MDM Vendor Config Configure the MDM vendor and server to collaborate with. Validate Validate the service parameter settings immediately. Table 4 DAM navigation menu options Navigation menu option Quick Start Asset Group All Assets Asset Hardware Change Asset Software Change Control Scheme Desktop Control Policy Desktop Control Audit Asset Statistics Software Deploy Task Software Server Settings Verify Asset Service Parameters Export Task Task View the general operation process for the DAM module and links to configuration tasks. Query, view, add, modify, and delete asset groups. Query, view, add, modify, and delete assets. Query and view assets' hardware changes. Query and view assets' software changes. View, add, modify, and delete desktop control schemes. Navigate to the following desktop control policy pages: Peripheral View, add, modify, and delete peripheral policies. Energy-Saving View, add, modify, and delete energy-saving policies. Monitoring Alarm View, add, modify, and delete monitoring alarm policies. Navigate to the following desktop control audit pages: USB File Transfer Query, view, and export USB file transfer logs. Printer Use Query, view, and export printer monitor logs. Peripheral Use Query, view, and export logs for unauthorized use of peripheral devices. Asset File Check Check suspicious files on assets in real time. Displays the asset statistics by asset type, CPU, hard disk, OS, and software. Query, view, add, modify, and delete software deploy tasks. View, add, modify, and delete servers for software distribution. Verify assets submitted for registration. This option appears when Verify Asset is enabled in DAM service parameters. Navigate to the following service parameter configuration pages: System Settings Configure DAM service parameters. Validate Validate the DAM service parameter settings immediately. Schedule a task to periodically export USB file transfer logs. 10

22 Desktop mode In desktop mode, click Add application to add EAD applications to the Web desktop. As shown in Figure 5, User Security Policy applications are enclosed by red lines and DAM applications are enclosed by orange lines. Figure 5 Web desktop Table 5 and Table 6 show the supported EAD applications. Table 5 User Security Policy applications Application Quick Start Security Policy Security Level Endpoint Access Control Traffic Control PC Security Software Task View the general operation process for the User Security Policy module and links to configuration tasks. View, add, modify, and delete security policies. View, add, modify, and delete security levels. Navigate to the following endpoint access control pages: Client ACL View, add, modify, and delete ACLs that are deployed to the inode client. Internet Access Audit View, add, modify, and delete policies for auditing Internet access behavior. Internet Access Policy View, add, modify, and delete Internet access policies. URL Control Policy View, add, modify, and delete URL control policies. Domain URL Group View, add, modify, and delete domain URL groups. IP URL Group View, add, modify, and delete IP URL groups. Security Policy View, add, modify, and delete security policies. View, add, modify, and delete traffic control policies. Navigate to the following PC security software policy pages: Anti-Virus View, add, modify, and delete anti-virus software policies. Anti-Spyware View, add, modify, and delete anti-spyware 11

23 Application Patch Control PC Software Control Group Registry Control Password Control MDM Collaboration Share Control Hierarchical Node EAD Node Topology Service Parameters Task software policies. Firewall View, add, modify, and delete firewall software policies. Anti-Phishing View, add, modify, and delete anti-phishing software policies. Hard Disk Encryption View, add, modify, and delete hard disk encryption software policies. Navigate to the following patch control pages: Windows Patches Query, add, modify, and delete Windows patches, and manage Windows versions. Patching Software Enable check for patch software products on Linux or Mac OS. Query, view, add, modify, and delete PC software control groups. View, add, modify, and delete registry control policies. View the current password dictionary and upload a new password dictionary. View, add, modify, and delete MDM collaboration policies. View, add, modify, and delete share control policies. View, add, modify, and delete child nodes and confirm management from the parent node. View monitoring information for the current EAD node and all its child EAD nodes. Navigate to the following service parameter configuration pages: System Settings Configure User Security Policy service parameters. MDM Vendor Config Configure the MDM vendor and server to collaborate with. Validate Validate the service parameter settings immediately. Table 6 Desktop asset applications Application Quick Start Asset Group All Assets Asset Hardware Asset Software Control Scheme Desktop Control Policy Desktop Control Audit Task View the general operation process for the DAM module and links to configuration tasks. Query, view, add, modify, and delete asset groups. Query, view, add, modify, and delete assets. Query and view assets' hardware changes. Query and view assets' software changes. View, add, modify, and delete desktop control schemes. Navigate to the following desktop control policy pages: Peripheral View, add, modify, and delete peripheral policies. Energy-Saving View, add, modify, and delete energy-saving policies. Monitoring Alarm View, add, modify, and delete monitoring alarm policies. Navigate to the following desktop control audit pages: USB File Transfer Query, view, and export USB file transfer logs. 12

24 Application Asset Statistics Software Deploy Task Software Server Verify Asset Service Parameters Export Task Task Printer Use Query, view, and export printer monitor logs. Peripheral Use Query, view, and export logs for unauthorized use of peripheral devices. Asset File Check Check suspicious files on assets in real time. Displays the asset statistics by asset type, CPU, hard disk, OS, and software. Query, view, add, modify, and delete software deploy tasks. View, add, modify, and delete servers for software distribution. Verify assets submitted for registration. This application is available only when Verify Asset is enabled in DAM service parameters. Navigate to the following service parameter configuration pages: System Settings Configure DAM service parameters. Validate Validate the DAM service parameter settings immediately. Schedule a task to periodically export USB file transfer logs. Security check for PCs Configuration procedure To configure security checking for PCs: 1. Install the inode client on PCs according to your operating system. 2. Configure check items to meet the network security requirements. 3. Select a security level and configure the security mode for each check item. The following security modes are supported for PCs: Kick out Isolate Inform Monitor 4. To isolate access users that fail the security check, configure an isolation mode and isolation rules. 5. Configure a remediation server and a knowledge base for users to access for remediation when users cannot access the network. 6. Configure a security policy to associate the selected security level with check items, isolation mode, and failure notifications. 7. To configure security policies for different access scenarios, repeat step 2 through step Configure access services and associate them with security policies. 9. Audit security logs and reports to identify any new trend of security threats in the network. 10. Adjust the security policies, security levels, and isolation rules based on audit result. Security check items The following security check items are available for a security policy that is to be assigned to a Windows, Linux, or Mac OS PC: 13

25 URL access control Anti-virus software control Anti-spyware software control Firewall software control Anti-phishing software control Hard disk encryption software control PC software control Patch software control Windows patch control Registry control Share control Asset registration status check Windows system restore settings check Traffic control OS password control Some of the check items also have sub items. Security level and security mode A security level for PCs contains check items and their respective security modes that define the actions to take in response to any detected security violations. EAD supports the following security modes in descending order of severity: Kick Out The EAD server works with the UAM server to log off noncompliant users and generates security logs for violations. Isolate The EAD server isolates noncompliant users in a restricted area, informs the users of the security vulnerability and remediation methods, and generates security logs for violations. Inform The EAD server informs noncompliant users of the security vulnerability and remediation methods on user endpoints, and generates security logs for violations. Monitor The EAD server monitors noncompliant users and generates security logs for violations. When the detected security violations of a single user require actions of different severities, the most severe action is taken. The Action After parameter can be configured as a tolerance interval during which network access is permitted before a noncompliant user is isolated or logged off. In this time interval, the user can fix any detected security vulnerabilities and trigger a new security check. Isolation mode PC user isolation is implemented based on ACLs or VLANs, which are deployed to the access device or inode client. ACLs and VLANs can be defined for network security or for isolation. Security ACLs and VLANs define the accessible areas for users who pass the security check. Isolation ACLs and VLANs define the quarantine areas for users who fail the security check to fix security vulnerabilities. EAD provides several isolation modes for PCs, as shown in Table 7. 14

26 Table 7 PC isolation modes Isolation mode Description Remarks Deploy ACLs to access device The EAD server deploys security and isolation ACLs to the access device for users' access control. The mechanism for processing ACLs depends on the device vendor and model. The access device must support the ACL deployment feature. Deploy ACLs to inode client Deploy VLANs to access device The EAD server deploys security and isolation ACLs to the inode client for users' access control. The mechanism for processing ACLs is not affected by the device vendor or model. The EAD server deploys security and isolation VLANs to the access device for users' access control. The mechanism for processing VLANs depends on the device vendor and model. The inode client must support the client ACL feature. The access device must support the VLAN deployment feature. Security check flow chart PC security check procedures depend on the security mode and isolation mode configured in the User Security Policy module. Figure 6 shows the process by which the EAD server performs a security check for PCs. 15

27 Figure 6 PC security check procedures Start Identity authentication succeeds (the user gets online) No Deploy security ACL/VLAN Whether or not the Action After value is 0 Yes Deploy isolation ACL/VLAN Security check Passed Deploy security ACL/VLAN Passed Security check Failed Failed Isolate Deploy isolation ACL/VLAN Security mode Kick out Monitor/inform Monitor/inform Security mode Kick out Isolate Isolate the user Allow the user to access the network Kick out the user End Security check for smart devices EAD can cooperate with a third-party MDM server and client to perform a security check on Android or ios smart devices. Configuration procedure To configure security checking for smart devices: 1. Obtain the MDM vendor information and permissions to use the MDM API. EAD supports Citrix and MobileIron. 2. Configure the MDM vendor in the User Security Policy service parameter settings. 3. Configure check items to meet the network security requirements and configure an MDM collaboration policy. 4. Select a security level and configure the security mode and device action for each check item. The following security modes are supported for smart devices: Kick out Isolate Inform Monitor 16

28 The following device actions are supported: Lock Wipe corporation data Wipe data 5. To isolate access users that fail the security check, configure an isolation mode and isolation rules. 6. Configure a security policy to associate the selected security level with check items, isolation mode, and MDM collaboration policy. 7. To configure security policies for different access scenarios, repeat step 3 through step Configure access services and associate them with security policies. 9. Audit MDM security logs to identify any new trend of security threats in the network. 10. Adjust the security policies, security levels, and isolation rules based on audit results. Security check items Security check items for smart devices vary with the MDM vendor. Citrix provides the following check items: Endpoint enrollment check Endpoint compliance check Jailbreak or root permission check Storage encryption check MobileIron provides the following check items: Endpoint registration check Endpoint compliance check GPS service check Auto-lock check Bluetooth service check Camera service check Jailbreak or root permission check Password lock check Storage encryption check Security level, security mode, and device action A security level for smart devices contains check items and their respective security modes and device actions. Security modes define actions to take in response to noncompliant users. Device actions are taken on any smart devices used by noncompliant users. EAD supports the following security modes in descending order of severity: Kick Out The EAD server works with the UAM server to log off noncompliant users and generates security logs for violations. Isolate The EAD server isolates noncompliant users in a restricted area, informs the users of the security vulnerability and remediation methods, and generates security logs for violations. No Action The EAD server only generates security logs for violations. EAD supports the following device actions in descending order of severity: 17

29 Wipe Data The EAD server works with the MDM server to wipe all data and restore factory settings on the smart device, and generates security logs for violations. Wipe Corporation Data The EAD server works with the MDM server to wipe the corporation data on the smart device and generates security logs for violations. Lock The EAD server works with the MDM server to lock the smart device and generates security logs for violations. When a smart device fails the security check, EAD immediately takes the configured actions for the noncompliant user and smart device, regardless of the Action After parameter setting. Isolation mode Smart device user isolation is implemented based on ACLs or VLANs, which are deployed to the access device. ACLs and VLANs can be defined for network security or for isolation. Security ACLs and VLANs define the accessible areas for users who pass the security check. Isolation ACLs and VLANs define the quarantine areas for users who fail the security check to fix security vulnerabilities. EAD provides several isolation modes for smart devices, as shown in Table 8. Table 8 Smart device isolation modes Isolation mode Description Remarks Deploy ACLs to access device The EAD server deploys security and isolation ACLs to the access device for users' access control. The mechanism for processing ACLs depends on the device vendor and model. The access device must support the ACL deployment feature. Deploy VLANs to access device The EAD server deploys security and isolation VLANs to the access device for users' access control. The mechanism for processing VLANs depends on the device vendor and model. The access device must support the VLAN deployment feature. SCC collaboration Security Control Center (SCC) is the network attack analyzer of the IMC platform, which generates attack alarms and takes action in response to the attack. EAD can work with SCC to isolate users when a network attack occurs. Enable the Isolates users by using EAD option for SCC to block the attack source. When a network attack occurs, SCC locates the endpoint IP address and notifies EAD of the IP address. EAD searches the online user by the IP address and isolates the user based on the assigned security policy. Desktop asset management The DAM module manages Windows PCs as desktop assets. Desktop asset management procedure To manage desktop assets: 18

30 1. Install the inode client on the PCs. 2. Create asset groups to manage desktop assets in different groups. 3. Identify owners of desktop assets, set the numbering mode of desktop assets, and register the assets to EAD. 4. Configure the desktop control schemes, and assign them to asset groups or assets to monitor the use and changes of assets. 5. Regularly audit asset logs and statistics reports, and check use and changes of assets. The owner of an asset is responsible for maintaining the security of the asset. The user of an asset might not be the owner of the asset. As a best practice, make asset usage regulations for desktop assets managed in DAM to clearly define the rights and responsibilities of users and owners. Desktop asset grouping type EAD supports the following ways of creating asset groups: Manually create asset groups Operators must manually create asset groups and subgroups in DAM. Assets are manually assigned to asset groups. Use user groups DAM automatically creates asset groups and subgroups based on existing user groups on the IMC Platform. Every asset is automatically added to the group to which its owner belongs. DAM automatically changes assets among asset groups when the user groups of asset owners are changed. Desktop asset numbering mode EAD supports the following modes of numbering desktop assets: Manual numbering Operators must manually number desktop assets and specify the asset information, such as owners, asset types, and physical locations in DAM. The user of an asset must enter the asset number specified by the operator to complete registration. Automatic numbering DAM automatically numbers desktop assets. A prefix can be specified for automatic numbering. The owner of an asset is the access user who registers the asset. Desktop asset registration and approval DAM manages only the registered assets. When an asset is registered, the hardware and software information of the asset is recorded by the EAD server. The asset registration process varies by asset numbering mode. If manual numbering is used, an access user is prompted to enter the asset number specified by the operator when the user comes online. After the asset number is entered, the inode client reports the asset information to the EAD server for registration. If automatic numbering is used, the inode client does one of the following, depending on whether Auto Register is enabled in the DAM service parameters: If Auto Register is enabled, DAM automatically reports the asset information to the EAD server for registration when an access user comes online. If Auto Register is disabled, an access user is prompted to enter the asset information when the user comes online. Then the inode client reports the asset information to the EAD server for registration. When automatic numbering is used, the asset information is sent for approval. An asset is registered successfully to the EAD server only after the asset information is approved. If the asset information is not approved, the operator can require the user to re-enter the asset information. 19

31 Desktop control scheme A desktop control scheme contains a set of desktop monitoring policies distributed by the DAM server to each inode client for controlling desktop assets. EAD supports the following types of desktop monitoring policies: Peripheral policy Allows you to manage peripherals, such as prohibiting use of peripherals and monitoring the use of USB storage devices and printers. Energy-saving policy Allows you to implement a scheduled shutdown of assets. At the scheduled time, the inode client displays a message that requires the user to shut down the asset. If the message is ignored, the inode client forcibly shuts down the asset. Monitoring alarm policy Allows you to monitor use and changes of assets, including software and hardware changes, unauthorized copying of files to USB storage devices, and printing of sensitive files. The monitoring information is converted to syslogs for triggering alarms. The desktop control scheme configuration can be managed on a group basis or asset basis. The group basis configuration applies to all assets in the same group, but it can be overridden by the asset basis configuration. The desktop control scheme configured for a subgroup has a higher priority than the desktop control scheme configured for the group that contains the subgroup. Decentralized management of IMC functions Operators can grant or restrict access to IMC functions based on operator groups and service groups. Operator role and group Access to IMC functions can be granted or restricted according to operator roles. IMC has the following operator roles with different management privilege levels: administrator, maintainer, and viewer. The administrator has the right of Operator Management to modify the management privileges of the maintainer and viewer roles. An operator group and all its operators are granted management privileges by the operator role. For more information about operator groups, see HPE Intelligent Management Center v7.0 Enterprise and Standard Administrator Guide. Service group The Service Group function is provided in UAM to grant or restrict access to IMC functions based on service groups. The service groups to which IMC functions are assigned can be configured with specific operators for group management. An administrator can specify a service group for a function module. A maintainer or viewer can only select a service group they can manage for a function module. For more information about service groups, see HPE IMC User Access Manager Administrator Guide. Decentralized management by operator and service groups The operator groups and service groups both affect operators' permissions. The management rights of an operator are determined by the following: Operator group to which the operator belongs. Service groups the operator can manage. 20

32 Table 9 and Table 10 are examples of operator and service groups. The service groups are created by Operator A. Table 9 Operator groups and management rights Operator Role Operator group Management rights The operator has the following management rights: IMC Platform > Resource > System > Operator Management Operator A Administrator Administrator group UAM > User > Service Group > View/Add/Modify/Delete EAD > User > User Security Policy > Security Policy > View/Add/Modify/Delete EAD > User > User Security Policy > Registry Control > View/Add/Modify/Delete The operator has the following management rights: Operator B1 Maintainer Maintainer group B1 EAD > User > User Security Policy > Security Policy > View/Modify EAD > User > User Security Policy > Registry Control > View/Add/Modify/Delete Operator B2 Viewer Viewer group B2 The operator has the following management rights: EAD > User > User Security Policy > Security Policy > View EAD > User > User Security Policy > Registry Control > View The operator has the following management rights: Operator C Maintainer Maintainer group C EAD > User > User Security Policy > Security Policy > View/Modify EAD > User > User Security Policy > Registry Control > View/Add/Modify/Delete Table 10 Service groups and functions Service group Operators Functions Service group B Service group C Operator B1 Operator B2 Operator C Security policy B Registry control policy B Security policy C Registry control policy C Table 11 displays each operator's management rights that are controlled by both the operator and service groups. Operator A is not listed because its management rights are not changed. Table 11 Management rights of each operator in decentralized management Operator Operator B1 Management rights The operator has the following management rights: EAD > User > User Security Policy > Security Policy > View/Modify security policy B. EAD > User > User Security Policy > Registry Control > View/Modify/Delete registry control policy B. EAD > User > User Security Policy > Registry Control > Add new registry control policies to service group B. Viewing all registry control policies in service group B and ungrouped registry control policies when modifying security policy B. 21

33 Operator Operator B2 Operator C Management rights The operator has the following management rights: EAD > User > User Security Policy > Security Policy > View security policy B. EAD > User > User Security Policy > Registry Control > View registry control policy B. The operator has the following management rights: EAD > User > User Security Policy > Security Policy > View/Modify security policy C. EAD > User > User Security Policy > Registry Control > View/Modify/Delete registry control policy C. EAD > User > User Security Policy > Registry Control > Add new registry control policies to service group C. Viewing all registry control policies in service group C and ungrouped registry control policies when modifying security policy C. Common operations Navigating a list If a list contains enough entries, use the following aids to navigate the list: Click the Next Page icon to page forward in the list. Click the Last Page icon to page forward to the end of the list. Click the Previous Page icon to page backward in the list. Click the First Page icon to page backward to the front of the list. Click a page number to display the page in the list. The list can display up to 10 page numbers. Select 8, 15, 50, 100, 200, or 1000 at the bottom of the list to configure how many items per page you want to display. Figure 7 List navigation aids 22

34 Sorting a list You can sort a list by every field that contains a Sort icon in the column label. When the list is sorted by a field in ascending order, the column label of the selected field is blue and contains an Ascending icon. When the list is sorted by a field in descending order, the column label of the selected field is blue and contains a Descending icon. Figure 8 Sorting a list 23

35 Configuring the security check for PCs EAD works with the inode client to perform security check on PCs. When a user accesses the network, the inode client requests security policies from the EAD server according to the access service of the user. The inode client then performs a security check on the user's PC and reports the check results to the EAD server. Security policy contents A security policy consists of a security level, an isolation mode, and security check items. Security level A security level specifies the security modes (actions) to implement in response to the detected security violations. When the detected security violations of a single user require security modes of different severities, the most severe security mode is implemented. EAD supports the following system-defined security levels in descending order of severity, as shown in Table 12. For more information about configuring security levels, see "Managing security levels." Table 12 Security levels and actions Security level Blacklist and Kick Out mode Kick out mode Guest mode Isolate mode VIP mode Monitor mode Actions in response to detected security violations Adds noncompliant users to the blacklist, logs off the users, generates security logs for violations, and informs the noncompliant users of the security vulnerability and remediation methods. Logs off noncompliant users and generates security logs for violations. Informs noncompliant users of the security vulnerability, logs off the users, and generates security logs for violations. Isolates noncompliant users in a restricted area, informs the users of the security vulnerability and remediation methods, and generates security logs for violations. Informs noncompliant users of the security vulnerability and remediation methods and generates security logs for violations. Generates security logs for violations. Isolation mode EAD provides the following isolation modes for PCs, as shown in Table 13. Table 13 Isolation modes Isolation mode Method Remarks Deploy ACLs to the access device Non-HP ProCurve devices EAD deploys the ACL number or name to the access device. HP ProCurve devices EAD deploys the name of an access ACL defined in UAM to the HP ProCurve device. For non-hp ProCurve devices: The ACLs must already exist on the access device. Otherwise, the user is logged off after ACLs are deployed. Configurations for ACLs vary by vendor and device model. For more information about configuring ACLs, see the configuration guide for the access 24

36 Isolation mode Deploy ACLs to the inode client Deploy VLANs to the access device Method EAD deploys the name of a client ACL to the Node client. EAD deploys the VLAN ID to the access device. Remarks device. For HP ProCurve devices, the access ACLs must already exist in UAM. For more information, see HPE IMC User Access Manager Administrator Guide. The inode client must support the client ACL feature. Otherwise, the user is logged off after ACLs are deployed. For more information about configuring client ACLs, see "Managing client ACLs." The VLANs must already exist on the access device. Otherwise, the user is logged off after ACLs are deployed. VLAN configurations vary by vendor and device model. For more information about configuring VLANs, see the configuration guide for the access device. Security check items EAD supports the following security check items for PCs, as shown in Table 14. Most of the security check items have sub-items and you can configure contents to be checked for them. Table 14 Security check items for PCs Security check item URL access control Anti-virus software control Anti-spyware software control Firewall software control Anti-phishing software control Hard disk encryption software control Sub-items and contents Configure the following sub-items in a URL control policy: IP URL check Configure the IP URL group. Domain URL check Configure the domain URL group. You can also configure the Hosts file check. Configure the following sub-items in an anti-virus software policy: Software installed required check Software running required check Software or engine version check Software virus signature version check Configure the following sub-items in an anti-spyware software policy: Software installed required check Software running check Software or engine version check Software virus signature version check Configure the following sub-items in a firewall software policy: Software installed required check Software running required check Configure the following sub-items in an anti-phishing software policy: Software installed required check Software running required check Configure a hard disk encryption software policy to require the software to be installed on the endpoints. 25

37 Security check item PC software control Patch software control Windows patch control Registry control Share control Asset registration status check Windows system restore settings check Traffic control Sub-items and contents Configure the following sub-items in a PC software control policy: Software installation status check for a software-type PC software control group Software running status check for a process-type PC software control group Software start status check for a service-type PC software control group Software existence status check for a file-type PC software control group You can also configure a list of common software products. Configure the following sub-items: Software installed required check Software running required check Configure the following sub-items: Collaboration with Windows patch server check Patch auto-installation results check Patch level check Configure the following contents in a registry control policy: Registry key existence check Registry key value match check Configure the following contents in a share control policy: Allow share check Share type check User share right check N/A N/A Configure the following sub-items in a traffic control policy: IP traffic check Broadcast packets number check Packets number check TCP/UDP connections number check Configure normal, abnormal, and severe thresholds for each sub-item. OS password control Configure a password dictionary. Managing security policies Security policy list contents The security policy list has the following parameters: Policy Name Name of the security policy. Click the name to view policy details. Security Level Name of the security level used by the security policy. Click the name to view detailed information. For more information, see "Security level details." Isolation Mode Isolation mode of the security policy: Not Deploy No isolation mode is specified. Deploy ACLs to Access Device Isolates illegal users by using access device ACLs. 26

38 Deploy ACLs to inode Client Isolates illegal users by using inode client ACLs. Deploy VLANs to Access Device Isolates illegal users by using VLANs. Security ACL or VLAN Security ACL or VLAN of the security policy. The security ACL or VLAN applies to all online users who are not isolated. The parameter is based on the configured isolation mode. To deploy ACLs to non-hp ProCurve devices, the parameter is an ACL number or name. To deploy ACLs to HP ProCurve devices, the parameter is the name of an access ACL defined in UAM. Click the ACL name to view the ACL rules deployed to the access device. To deploy ACLs to the inode client, the parameter is the name of a client ACL. Click the ACL name to view the ACL rules deployed to the inode client. To deploy VLANs to access devices, the parameter is a VLAN ID. Isolation ACL or VLAN Isolation ACL or VLAN of the security policy. The isolation ACL or VLAN applies to online users who must be isolated. The parameter can be an ACL number or name, access ACL name, client ACL name, or VLAN ID, based on the configured isolation mode. For more information, see the parameter descriptions for Security ACL or VLAN. Service Group Service group to which the security policy belongs. Modify Click the Modify icon to modify the security policy settings. Delete Click the Delete icon to delete the security policy. Security policy details The security policy details page has the following areas: Common Configuration Basic information about the security policy and the isolation mode configuration. PC Security check items for PCs. Smart Device Security check items for smart devices. UAM identifies the check items for PCs from smart device check items in the same security policy based on the endpoint type and access scenario. EAD performs the security check after it is informed of the check items by UAM. The following information describes security check items for PCs. For more information about configuring security check items for smart devices, see "Configuring the security check for smart devices." EAD supports security checks on IPv6 hosts only when the Enable IPv6 parameter is set to Yes in the UAM service parameter configuration. The default setting of this parameter is No. For more information, see HPE IMC User Access Manager Administrator Guide. Basic Information area Policy Name Unique name of the security policy. Service Group Service group to which the security policy belongs. Security Level Name of the security level used in the security policy. Click the name to view detailed information. For more information, see "Security level details." Monitor in Real Time When it is selected, this parameter enables real-time monitoring of user endpoints in the security policy. For more information, see "Configuring real-time monitoring." Process After The amount of time, in minutes, that the inode client waits before it isolates or kicks out an access user for whom a violation is detected during real-time monitoring. The inode client prompts the user to make the necessary remediation and initiate a new security check to avoid being isolated or kicked out. This parameter appears only when the Monitor in Real Time option is selected. 27

39 Isolation Mode area Set as Default Policy for Roaming Users When it is selected, this parameter makes the security policy the default security policy for roaming users. You can specify only one security policy as the default security policy for roaming users. For more information, see "Configuring the default security policy for roaming users." Description Description of the security policy. Check Passed Message Message that the inode client displays when an access user passes the security check. Configure Isolation Mode Indicates whether an isolation mode is configured. When this parameter is not selected, the security policy does not have an isolation mode. When this parameter is selected, the security policy can use any of the following isolation modes: Deploy ACLs to Access Device, Deploy ACLs to inode Client, or Deploy VLANs to Access Device. The following parameters appear only when the Configure Isolation Mode option is selected. The parameters vary by isolation mode. URL Control area Deploy ACLs to Access Device This isolation mode deploys ACLs to access devices. For non-hp ProCurve devices, EAD deploys ACL numbers or names through RADIUS packets. For HP ProCurve devices, EAD deploys access ACL rules through extended RADIUS packets. The isolation mode has the following parameters: Security ACL (for non-hp ProCurve) Number or name of the security ACL deployed to non-hp ProCurve devices. Isolation ACL (for non-hp ProCurve) Number or name of the isolation ACL deployed to non-hp ProCurve devices. Security ACL (for HP ProCurve) Name of the access ACL deployed to HP ProCurve devices as the security ACL. Click the ACL name to view the ACL rules in the access ACL. For information about access ACLs, see HPE IMC User Access Manager Administrator Guide. Isolation ACL (for HP ProCurve) Name of the access ACL deployed to HP ProCurve devices as the isolation ACL. Click the ACL name to view the ACL rules in the access ACL. For information about access ACLs, see HPE IMC User Access Manager Administrator Guide. Deploy ACLs to inode Client This isolation mode deploys ACL rules to the inode client through EAD messages. For more information about configuring client ACLs, see "Managing client ACLs." The isolation mode has the following parameters: Security ACL Name of the security ACL deployed to the inode client. Click the ACL name to view the ACL rules in the client ACL. Isolation ACL Name of the isolation ACL deployed to the inode client. Click the ACL name to view the ACL rules in the client ACL. Deploy VLANs to Access Device This isolation mode deploys VLAN IDs to access devices through RADIUS packets. The VLANs corresponding to the VLAN IDs must exist on the devices. The isolation mode has the following parameters: Security VLAN ID of the security VLAN deployed to access devices. Isolation VLAN ID of the isolation VLAN deployed to access devices. Enable URL Access Control Indicates whether to check URLs accessed by the access users. The following parameters appear only when the Enable URL Access Control option is selected: URL Control Policy Name of the URL control policy used in the security policy. The URL control policy controls user access to specified websites by domain name or IP address. 28

40 Check Hosts File Indicates whether to check the Hosts file on the user endpoint. When this option is enabled, the inode client checks the Hosts file against the IP address list next to the Check Hosts File field. When the Hosts file of a user endpoint contains an IP address that is not on the list, the inode client forces the user to log out. This feature prevents users from accessing unauthorized websites by modifying the Hosts file. The Hosts file check can serve as a supplement to the URL control policy. A user might bypass the URL control policy by modifying the Hosts file to access a prohibited URL. The Hosts file check applies only to access users using Windows. For example, the path of the Hosts file on Windows 7 is C:\WINDOWS\system32\drivers\etc\hosts. Anti-Virus Software Control area The anti-virus software check takes effect on Windows, Linux, and Mac OS PCs. Check Anti-Virus Software Indicates whether to check the anti-virus software on the user endpoint. The check items include the anti-virus definition version, engine version, software installation status, and software running status. The following parameters appear only when the Check Anti-Virus Software option is selected: PC Anti-Virus Software Policy Name of the anti-virus software policy used in the security policy. Server Address IPv4 address of a file server from which users can download anti-virus software and update packages. The IP address is sent only to IPv4 users who fail the anti-virus software check. IPv6 Server Address IPv6 address of a file server from which users can download anti-virus software and update packages. The IP address is sent only to IPv6 users who fail the anti-virus software check. Failure Notification Message that the inode client displays when an access user fails the anti-virus software check. Anti-Spyware Software Control area The anti-spyware software check takes effect on Windows and Mac OS PCs. Check Anti-Spyware Software Indicates whether to check the anti-spyware software on the user endpoint. The check items include the anti-spyware definition version, engine version, software installation status, and software running status. The following parameters appear only when the Check Anti-Spyware Software option is selected: Anti-Spyware Software Policy Name of the anti-spyware software policy used in the security policy. Server Address IPv4 address of a file server from which users can download anti-spyware software and update packages. IPv6 Server Address IPv6 address of a file server from which users can download anti-spyware software and update packages. Failure Notification Message that the inode client displays when an access user fails the anti-spyware software check. When an access user fails the anti-spyware software check, EAD sends the IPv4 address of the server to a user using IPv4 address, or the IPv6 address of the server to a user using IPv6 address. Operators can configure a file server, HTTP server, or FTP server to provide the download services. Firewall Software Control area The firewall software check takes effect only on Windows, Linux, and Mac OS PCs. Check Firewall Software Indicates whether to check the firewall software on the user endpoint. The check items include the firewall installation status and running status. The following parameters appear only when the Check Firewall Software option is selected: 29

41 Firewall Software Policy Name of the firewall software policy used in the security policy. Server Address IPv4 address of a file server from which users can download the firewall software. IPv6 Server Address IPv6 address of a file server from which users can download the firewall software. Failure Notification Message that the inode client displays when an access user fails the firewall software check. When an access user fails the firewall software check, EAD sends the IPv4 address of the server to a user using IPv4 address, or the IPv6 address of the server to a user using IPv6 address. Operators can configure a file server, HTTP server, or FTP server to provide the download services. Anti-Phishing Software Control area The anti-phishing software check takes effect only on Windows and Mac OS PCs. Check Anti-Phishing Software Indicates whether to check the anti-phishing software on the user endpoint. The check items include the anti-phishing software installation status and the software running status. The following parameters appear only when the Check Anti-Phishing Software option is selected: Anti-Phishing Software Policy Name of the anti-phishing software policy used in the security policy. Server Address IPv4 address of a file server from which users can download the anti-phishing software and update packages. IPv6 Server Address IPv6 address of a file server from which users can download the anti-phishing software and update packages. Failure Notification Message that the inode client displays when an access user fails the anti-phishing software check. When an access user fails the anti-phishing software check, EAD sends the IPv4 address of the server to a user using IPv4 address, or the IPv6 address of the server to a user using IPv6 address. Operators can configure a file server, HTTP server, or FTP server to provide the download services. Hard Disk Encryption Software Control area The hard disk encryption software check takes effect only on Windows PCs. Check Hard Disk Encryption Software Indicates whether to check the installation status of the hard disk encryption software on the user endpoint. The following parameters appear only when the Check Hard Disk Encryption Software option is selected: Hard Disk Encryption Software Policy Name of the hard disk encryption software policy used in the security policy. Server Address IPv4 address of a file server from which users can download the hard disk encryption software. IPv6 Server Address IPv6 address of a file server from which users can download the hard disk encryption software. Failure Notification Message that the inode client displays when an access user fails the hard disk encryption software check. When an access user fails the hard disk encryption software check, EAD sends the IPv4 address of the server to a user using IPv4 address, or the IPv6 address of the server to a user using IPv6 address. Operators can configure a file server, HTTP server, or FTP server to provide the download services. 30

42 PC Software Control area The PC software control check takes effect only on Windows, Linux, and Mac OS PCs. The check items include software, processes, services, and files. This area lists the configurations of PC software control groups, including the group name, PC software control type, and check type. Check PC Software Control Indicates whether to check the software, processes, services, and files on the PC. The following parameters appear only when the Check PC Software Control option is selected: Group Name Name of the PC software control group to be checked. Type Type of the PC software control group to be checked: Software, Process, Service, or File. Check Type Check type of the PC software control group. The check type options vary with the PC software control types, as shown in Table 15. Server Address IPv4 address of a file server from which access users can download the required software, update files, and repair tools. IPv6 Server Address IPv6 address of a file server from which access users can download the required software, update files, and repair tools. Failure Notification Message that the inode client displays when an access user fails the PC software control group check. When an access user fails the PC software control group check, EAD sends the IPv4 address of the server to a user using IPv4 address, or the IPv6 address of the server to a user using IPv6 address. Operators can configure a file server, HTTP server, or FTP server to provide the download services. Table 15 PC software control groups and check types Group type Software Check types Installed Forbidden Prohibits any software products in the control group from being installed on the user endpoint. Installed Required Requires all software products in the control group to be installed on the user endpoint. Installed Allowed Allows only the software products in the control group to be installed on the user endpoint. Only one control group can be set as Installed Allowed. Process Service File Running Forbidden Prohibits any processes in the control group from running on the user endpoint. Running Required Requires all processes in the control group to be running on the user endpoint. Started Forbidden Prohibits any services in the control group from being started on the user endpoint. Started Required Requires all services in the control group to be started on the user endpoint. Non-Existent Prohibits any files in the control group from being stored on the user endpoint. Existent Requires all files in the control group to exist on the user endpoint. Patch Software Control area The patch management software control check takes effect only on Linux and Mac OS PCs. Check Patch Software Indicates whether to check the patch software on the user endpoint. 31

43 Failure Notification Message that the inode client displays when an access user fails the patch software check. This parameter appears only when the Check Patch Software option is selected. Windows Patch Control area This area has the following option: Check Windows Patches Indicates whether to check the Windows patches on the user endpoint. The following methods appear only when the Check Windows Patches option is selected: Check Through Microsoft Server Enables the inode client to check for missing patches and patch severity levels by connecting to the Microsoft WSUS or SMS server. Patches are then downloaded and installed automatically. Check Manually Enables the inode client to check for missing patches and patch severity levels by connecting to the EAD server. The user can then download and install the required patches manually. The following parameters appear only when the Check Through Microsoft Server option is selected: Patch Check Interval Specifies the number of days to skip patch checking for an access user who has passed the patch check. When the Patch Check Interval is set to 0, EAD never skips patch checking. You can configure how many days the user can access the network when the PC fails the patch check. For more information about configuring the patch check interval and the grace days for patch noncompliance, see "User security policy service parameters." Flexible Patching Arranges the patch check and installation work for PCs at different time of the week to improve efficiency and reduce workload on the patch server. If patches are not checked on a user's PC in the recent 21 days, EAD performs patch checking as soon as the user comes online. When this option is selected, the Patch Check Interval parameter becomes invalid and disappears from the page. Server Address IPv4 address of the Microsoft WSUS or SMS server. IPv6 Server Address IPv6 address of the Microsoft WSUS or SMS server. When checking the Windows patches for an access user, EAD sends the IPv4 address of the WSUS or SMS server to a user using IPv4 address, or a IPv6 address of the server to a user using IPv6 address. The inode client checks and repairs Windows according to the address it receives. Microsoft WSUS patch server or SMS server address is in the format of or If you do not specify the protocol, the system automatically adds to the address during communication. The host string can be an IP address, computer name, or full computer name with a domain name. If you do not specify the port number, the system uses the default port setting, which is HTTP 80 or HTTPS Valid server addresses can be wsus.contoso.com (wsus is a computer name and contoso.com is a domain name), :8080, and Failure Notification Message that the inode client displays when an access user fails the Windows patch check. The following parameters appear only when the Check Manually option is selected: Patch Check Interval Specifies the number of days to skip patch checking for an access user after the user has passed the patch check. When the Patch Check Interval is set to 0, EAD never skips patch checking. Patch Level Severity levels of the Windows patches: Critical, Important, Moderate, and Low. EAD checks all patches of the selected severity levels. Patch Server Address IPv4 address of the server from which users can download the required patches. IPv6 Patch Server Address IPv6 address of the server from which users can download the required patches. 32

44 Registry Control area When an access user fails the Windows patch check, EAD sends the IPv4 address of the patch server to a user using IPv4 address, or the IPv6 address of the patch server to a user using IPv6 address. Operators can configure a file server, HTTP server, or FTP server to provide download services. Failure Notification Message that the inode client displays when an access user fails the Windows patch check. The registry control check takes effect only on Windows PCs. Check Registry Indicates whether to check the registries on the user endpoint. The following parameters appear only when the Check Registry option is selected: Share Control area Registry Control Name Name of the registry control policy used in the security policy. EAD checks registries on the user endpoint according to the selected registry control policies. Failure Notification Message that the inode client displays when an access user fails the registry control check. The share control check takes effect only on Windows PCs. Check Share Indicates whether to check the share directories on the user endpoint. The following parameters appear only when the Check Share option is selected: Share Control Name of the share control policy used in the security policy. Failure Notification Message that the inode client displays when an access user fails the share check. Asset Registration Status Check area The asset registration status check takes effect only on Windows PCs. Check Asset Registration Status Indicates whether to check the asset registration status of the user endpoint. Grace Days for Unregistered Assets Specifies how many days the system allows unregistered assets to pass the security check. The system sends a daily reminder for asset registration during the grace days. After the grace days expire, the system executes the specified security mode in the security level settings if the assets are still not registered. The value of 0 indicates that unregistered assets cannot pass the security check. Failure Notification Message that the inode client displays when an access user fails the asset registration status check. This parameter appears only when the Check Asset Registration Status option is selected. Windows System Restore area This area has the following parameters: Periodic Check area Check Windows System Restore Check whether Windows system restore is enabled. Enable Data Execution Prevention Checks whether data execution prevention is enabled. If the feature is disabled, the system automatically enables the feature on the user endpoint and the change takes effect after an operating system restart. Disable Guest Account Checks whether the guest account is disabled. If the feature is enabled, the system automatically disables the feature on the user endpoint. Failure Notification Message that the inode client displays when an access user fails the Windows system restore check, data execution prevention check, or guest account check. After a user comes online, the inode client checks the endpoint of the user at regular intervals. The periodic check monitors the traffic and OS password settings on Windows PCs. 33

45 Traffic Control Name of the traffic control policy used in the security policy. It determines whether traffic processed by the endpoint is reasonable. Check Operating System Password Indicates whether to periodically check the operating system password for the user endpoint. The following parameters appear only when the Check Operating System Password option is selected: Check All Local Users Select this option to check the operating system passwords of all local user accounts for the endpoint. If this option is not selected, EAD checks the password of the current login user only. An endpoint fails the security check if the operating system password of the user is included in the IMC password dictionary or meets the built-in password rules on the inode client. Check Dictionary File Only for IMC Select this option to consult only the IMC password dictionary for password checking. If this option is not selected, EAD consults both IMC password dictionary and inode client password rules for password checking. Add to Security Check Select this option to check the operating system password of at the user login and during the periodic check. If this option is not selected, the inode client checks the operating system password during the periodic check. When the IMC password dictionary contains large number of entries, the security check will take a long time period. Failure Notification Message that the inode client displays when an access user fails the operating system password check. Viewing the security policy list 2. From the navigation tree, select User Security Policy > Security Policy. The security policy list displays all security policies. 3. Click Refresh to refresh the security policy list. Viewing security policy details To view IPv6 configurations, operators must enable IPv6 address support on UAM and EAD components by modifying UAM service parameters. For instructions on how to modify UAM service parameters, see HPE IMC User Access Manager Administrator Guide. To view the details of a security policy: 2. From the navigation tree, select User Security Policy > Security Policy. The security policy list displays all security policies. 3. Click the name of a security policy to view detailed information. The View Security Policy page appears. 4. Click Back to return to the security policy list. Adding a security policy To perform IPv6 configurations, operators must enable IPv6 address support on UAM and EAD components by modifying UAM service parameters. For information about modifying UAM service parameters, see HPE IMC User Access Manager Administrator Guide. To add a security policy: 34

46 2. From the navigation tree, select User Security Policy > Security Policy. The security policy list displays all security policies. 3. Click Add. The Add Security Policy page appears. 4. Configure the basic information for the security policy. The policy name must be unique in EAD. 5. Configure the parameters in the following areas as needed: Isolation Mode URL Control Anti-Virus Software Control Anti-Spyware Software Control Firewall Software Control Anti-Phishing Software Control Hard Disk Encryption Software Control Patch Software Control Windows Patch Control Registry Control Share Control Asset Registration Status Check Windows System Restore Periodic Check 6. To configure the parameters in the PC Software Control area: a. Select Check PC Software Control. b. Click Per-group Configuration. The page for configuring software control groups appears. c. Enter query criteria in the Query Software Control Groups area. d. Click Query. e. Select one or more PC software control groups in the PC software control group list. f. Select a check type from the Check Type list for each PC software group. g. Enter a server address in the Server Address field. h. In the Failure Notification field, enter the notification message to be displayed on the user endpoint when PC software does not meet the requirements. i. Click OK. 7. Click OK. Modifying a security policy To perform IPv6 configurations, operators must enable IPv6 address support on UAM and EAD components by modifying UAM service parameters. For information about modifying UAM service parameters, see HPE IMC User Access Manager Administrator Guide. To modify a security policy: 2. From the navigation tree, select User Security Policy > Security Policy. The security policy list displays all security policies. 3. Click the Modify icon for the security policy you want to modify. 35

47 The Modify Security Policy page appears. 4. Modify the basic information for the security policy. You cannot modify Policy Name or Service Group. 5. Modify the parameters in the following areas as needed: Isolation Mode URL Control Anti-Virus Software Control Anti-Spyware Software Control Firewall Software Control Anti-Phishing Software Control Hard Disk Encryption Software Control Patch Software Control Windows Patch Control Registry Control Share Control Asset Registration Status Check Windows System Restore Periodic Check 6. To modify the parameters in the PC Software Control area: a. Click Per-group Configuration. The page for configuring software control groups appears. b. Enter query criteria in the Query Software Control Groups area. c. Click Query. d. Select one or more PC software control groups in the PC software control group list. e. Select a check type from the Check Type list for each PC software group. f. Click OK. 7. Click OK. Deleting a security policy Before you delete a security policy, make sure it is not assigned to an access service. To delete a security policy: 2. From the navigation tree, select User Security Policy > Security Policy. The security policy list displays all security policies. 3. Click the Delete icon for the security policy you want to delete. A confirmation dialog box appears. 4. Click OK. 36

48 Managing security levels Making a security level action take effect Special cases For the action specified for a check item in the security level to take effect, you must complete the following tasks: 1. Enable the security check item. 2. Specify an associated control policy in the security policy. For example, to perform the specified action on an access user who fails the anti-virus software check: 1. Enable the anti-virus software check in the security policy. 2. Specify an anti-virus software policy. Abnormal traffic For the action specified for abnormal traffic in the security level to take effect, you must enable the traffic monitoring function in the security policy and specify the items to be checked in the traffic monitoring policy. For example, to enable the inode client to perform the specified action on an access user whose IP traffic running on the authenticated NIC exceeds the minor threshold or severe threshold: 1. Enable the traffic monitoring function in the security policy. 2. Set the IP traffic thresholds. WSUS/SMS Server Collaboration Failure and Auto-Installation Failure For the action specified in the security level for WSUS/SMS Server Collaboration Failure and Auto-Installation Failure to take effect, enable the Check Through Microsoft Server feature in the security policy. Security level list contents The security level list has the following parameters: Security Level Name Name of the security level. Click the name to view detailed information. Description Description of the security level. Service Group Service group to which the security level belongs. Modify Click the Modify icon to modify the security level settings. Delete Click the Delete icon to delete the security level. Security level details The security policy details page has the following areas: Basic Information Basic information about the security level, including the security level name and the Action After parameter. PC Security modes that define the actions to take in response to detected security violations for PCs. Smart Device Security modes that define the actions to take in response to detected security violations for smart devices. 37

49 UAM identifies the security modes for PCs from the security modes for smart devices in the same security level according to the security policies used by the endpoints. EAD supports the following security modes in descending order of severity: Blacklist and Kick Out The EAD server works with the inode client to add noncompliant users to the black list and log them off, and generates security logs for violations. Kick Out The EAD server works with the inode client to log off noncompliant users and generates security logs for violations. Isolate The EAD server isolates noncompliant users in a restricted area, informs the users of the security vulnerability and remediation methods, and generates security logs for violations. Inform The EAD server informs noncompliant users of the security vulnerability and remediation methods on user endpoints, and generates security logs for violations. Monitor The EAD server monitors noncompliant users and generates security logs for violations. The following information describes security level parameters for PCs. For more information about configuring the security level for smart devices, see "Configuring the security check for smart devices." Basic Information area Traffic Monitoring area Security Level Name Name of the security level. Action After Amount of time, in minutes, that the access user with a security check failure can access the network before being isolated or kicked out. During that time, the user can make the necessary remediation and initiate a new security check to prevent being isolated or kicked out. This parameter is available only when the Isolate, Kick Out, Guest, or Blacklist and Kick Out action is configured for a check item, excluding the traffic monitoring check and the operating system password check. Description Description of the security level. Service Group Service group to which the security level belongs. IP Traffic Minor Threshold Exceeded Action to take when the total IP traffic of all NICs on the user endpoint is above or equal to the IP Traffic Minor Threshold, and below the IP Traffic Severe Threshold configured in the traffic control policy. IP Traffic Severe Threshold Exceeded Action to take when the total IP traffic of all NICs on the user endpoint is above or equal to the IP Traffic Severe Threshold configured in the traffic control policy. Broadcast Packets Minor Threshold Exceeded Action to take when the total number of broadcast packets sent by all NICs on the user endpoint is above or equal to the Broadcast Packets Minor Threshold, and below the Broadcast Packets Severe Threshold configured in the traffic control policy. Broadcast Packets Severe Threshold Exceeded Action to take when the total number of broadcast packets sent by all NICs on the user endpoint is above or equal to the Broadcast Packets Severe Threshold configured in the traffic control policy. Packets Minor Threshold Exceeded Action to take when the total number of packets passing the authenticated NIC of the user endpoint is above or equal to the Packets Minor Threshold, and below the Packets Severe Threshold configured in the traffic control policy. Packets Severe Threshold Exceeded Action to take when the total number of packets passing the authenticated NIC of the user endpoint is above or equal to the Packets Severe Threshold configured in the traffic control policy. The authenticated NIC is used by an access user to pass identity authentication and to access the network. TCP/UDP Connections Minor Threshold Exceeded Action to take when the total number of TCP/UDP connections of all NICs on the user endpoint is above or equal to the TCP/UDP 38

50 Connections Minor Threshold, and below the TCP/UDP Connections Severe Threshold configured in the traffic control policy. TCP/UDP Connections Severe Threshold Exceeded Action to take when the total number of TCP/UDP connections of all NICs on the user endpoint is above or equal to the TCP/UDP Connections Severe Threshold configured in the traffic control policy. Check Anti-Virus Software area Anti-Virus Software Not Installed Action to take on an access user whose endpoint does not have anti-virus software installed. Anti-Virus Client Runtime Error Action to take on an access user whose anti-virus software is faulty. Old Anti-Virus Software/Engine Version Action to take on an access user whose anti-virus software version on the smart device or anti-virus engine version on the PC is lower than the version configured in the anti-virus software policy. Old Virus Definition Version Action to take on an access user whose virus definition version is lower than the version configured in the anti-virus software policy. Check Anti-Spyware Software area Anti-Spyware Software Not Installed Action to take on an access user whose endpoint does not have the anti-spyware software installed. Anti-Spyware Client Runtime Error Action to take on an access user whose anti-spyware software is faulty. Old Anti-Spyware Software/Engine Version Action to take on an access user whose anti-spyware software version on the smart device or anti-spyware engine version on the PC is lower than the version configured in the anti-spyware software policy. Old Spyware Definition Version Action to take on an access user whose spyware definition version is lower than the version configured in the anti-spyware software policy. Check Firewall Software area Firewall Software Not Installed Action to take on an access user whose endpoint does not have firewall software installed. Firewall Client Runtime Error Action to take on an access user whose firewall software is faulty. Check Anti-Phishing Software area Anti-Phishing Software Not Installed Action to take on an access user whose endpoint does not have anti-phishing software installed. Anti-Phishing Software Runtime Error Action to take on an access user whose anti-phishing software is faulty. Check Hard Disk Encryption Software area Hard Disk Encryption Software Not Installed Action to take on an access user whose endpoint does not have hard disk encryption software installed. Check PC Software Control Group area Global Security Mode Action to take on an access user who violates any PC software control group specified for check in the security policy. In global security mode, you cannot view the names of the PC software control groups. Security Mode of a PC Software Control Group Action to take on an access user who violates the PC software control group. When you configure actions specific to the PC software control groups, the Global Security Mode option does not appear. 39

51 Check Patch Management Software area Patch Manager Software Not Installed Action to take on an access user whose endpoint does not have patch software installed. Patch Manager Software Runtime Error Action to take on an access user whose patch software is faulty. Check Windows Patches area Check Registry area Check Share area WSUS/SMS Server Collaboration Failure Action to take on an access user when the inode client cannot connect to the Microsoft WSUS or SMS server. Auto-Installation Failure Action to take on an access user when automatic patch installation fails on the user endpoint. Critical Action to take on an access user whose endpoint lacks a critical-level patch. Important Action to take on an access user whose endpoint lacks an important-level patch. Moderate Action to take on an access user whose endpoint lacks a moderate-level patch. Low Action to take on an access user whose endpoint lacks a low-level patch. Global Security Mode Action to take on an access user who violates any registry control policies specified for check in the security policy. In global security mode, you cannot view the names of the registry control policies. Security Mode of a Specific Registry Control Policy Action to take on an access user who violates the registry control policies. When you configure actions specific to the registry control policies, the Global Security Mode option does not appear. Global Security Mode Action to take on an access user who violates any share control policy specified for check in the security policy. In global security mode, you cannot view the names of the share control policies. Security Mode of a Specific Share Control Policy Action to take on an access user who violates the share control policy. When you configure actions specific to each share control policy, the Global Security Mode option does not appear. Check Asset Registration Status area Unregistered Assets Action to take on an access user who uses an unregistered asset for network access. Check Windows System Restore System Restore Disabled Action to take on an access user who fails the Windows system restore check. Enable Data Execution Prevention Action to take on an access user who fails the data execution prevention check. Disable Guest Account Action to take on an access user who fails the guest account check. Check Operating System Password area Operating System Password Check Failed Action to take on an access user who fails the operating system password check. Viewing the security level list 2. From the navigation tree, select User Security Policy > Security Level. 40

52 The Security Level List displays all security levels. 3. Click Refresh to refresh the Security Level List. Viewing security level details 2. From the navigation tree, select User Security Policy > Security Level. The Security Level List displays all security levels. 3. Click the name of a security level to view detailed information. The View Security Level page appears. 4. Click Back to return to the security level list. Adding a security level 2. From the navigation tree, select User Security Policy > Security Level. The Security Level List displays all security levels. 3. Click Add. The Add Security Level page appears. 4. Configure the basic information for the security level. The name of the security level must be unique in EAD. 5. Configure the parameters in the following areas: Traffic Monitoring Check Anti-Virus Software Check Anti-Spyware Software Check Firewall Software Check Anti-Phishing Software Check Hard Disk Encryption Software Check PC Software Control Group Check Patch Management Software Check Windows Patches Check Registry Check Share Check Asset Registration Status Check Windows System Restore Check Operating System Password 6. Click OK. Modifying a security level The system-defined and user-defined security levels are displayed in the security level list and can be modified. During the real-time check, the EAD server determines whether a user who fails the check should be monitored, informed, isolated, or kicked out according to the modified security level. To modify a security level: 2. From the navigation tree, select User Security Policy > Security Level. 41

53 The Security Level List displays all security levels. 3. Click the Modify icon for the security level you want to modify. The Modify Security Level page appears. 4. Modify the basic information for the security level. You cannot modify Security Level Name or Service Group. 5. Modify the parameters in the following areas: Traffic Monitoring Check Anti-Virus Software Check Anti-Spyware Software Check Firewall Software Check Anti-Phishing Software Check Hard Disk Encryption Software Check PC Software Control Group Check Patch Management Software Check Windows Patches Check Registry Check Share Check Asset Registration Status Check Windows System Restore Check Operating System Password 6. Click OK. Deleting a security level You cannot delete a security level that is assigned to a security policy. To delete the security level, make sure it is not assigned to a security policy. For more information about modifying a security policy, see "Modifying a security policy." To delete a security level: 2. From the navigation tree, select User Security Policy > Security Level. The Security Level List displays all security levels. 3. Click the Delete icon for the security level you want to delete. A confirmation dialog box appears. 4. Click OK. Managing client ACLs Operators can use client ACLs to enhance network security for users connecting to access devices that do not support receiving the ACLs or ACL numbers deployed by EAD. EAD deploys client ACLs to endpoints that have the inode client installed. Client ACLs might not be protected as well as device ACLs. EAD deploys the client ACLs to endpoints of access users that pass identify authentication, and applies the client ACLs to the outgoing traffic of their respective authentication NICs. Client ACLs can be classified as follows: Isolation ACL Allows insecure users to access only a restricted area to rectify security problems and reinitiate security authentication. 42

54 Security ACL Applies to all online access users that are not isolated. Operators can add, modify, and delete client ACLs. Configure client ACLs only when the inode client on the target user endpoints supports the client ACL feature. Otherwise, access users cannot log in after the client ACL deployment. The client ACL feature is available for Windows operating systems only. Client ACL list contents The client ACL list has the following parameters: ACL Name Name of the client ACL. Click the name to view detailed information. Service Group Name of the service group to which the client ACL belongs. Description Description of the associated client ACL. Modify Click the Modify icon to modify the client ACL settings. Delete Click the Delete icon to delete the client ACL. Client ACL details The client ACL details page has a basic information area and an ACL rule list area. Basic Information area ACL Rule List ACL Name Name of the client ACL. Default Action of ACL Rule Action to take on IP packets that do not match any ACL rule. Permit Permits IP packets that do not match any ACL rule on the ACL rule list to pass through. Deny Drops IP packets that do not match any ACL rule on the ACL rule list. Description Description of the client ACL. Service Group Name of the service group to which the client ACL belongs. Matching Action Action to take on IP packets that match the ACL rule. Permit Permits IP packets that match the ACL rule to pass through. Deny Drops IP packets that match the ACL rule. Protocol Transport-layer protocol that the ACL rule matches. A protocol name (ICMP, TCP, or UDP) or protocol number matches the corresponding transport-layer protocol. This field displays two hyphens (--) if the ACL rule matches all transport-layer protocols. Dest IP Destination IP address that the ACL rule matches. Mask Subnet mask of the destination IP address. Dest Port Destination port of IP packets. This field displays a value only when the transport-layer protocol of the ACL rule is TCP or UDP (if you selected TCP or UDP in the Protocol list). Otherwise, this field displays two hyphens (--). The default setting is 0, which matches all destination ports. Source Port Source port of IP packets. This field displays a value only when the transport-layer protocol of the ACL rule is TCP or UDP (if you selected TCP or UDP in the Protocol list). Otherwise, this field displays two hyphens (--). The default setting is 0, which matches all source ports. Priority Priority of the ACL rule. The ACL rules are arranged in descending priority order. An ACL rule with a higher priority is preferentially matched. Click the Move Up icon or Move Down icon to adjust the list. 43

55 Viewing the client ACL list 2. From the navigation tree, select User Security Policy > Endpoint Access Control > Client ACL. The Client ACL List displays all client ACLs. 3. Click Refresh to refresh the Client ACL List. Viewing client ACL details 2. From the navigation tree, select User Security Policy > Endpoint Access Control > Client ACL. The Client ACL List displays all client ACLs. 3. Click the name of a client ACL to view detailed information. The View Client ACL page appears. 4. Click Back to return to the client ACL list. Adding a client ACL 2. From the navigation tree, select User Security Policy > Endpoint Access Control > Client ACL. The client ACL list displays all client ACLs. 3. Click Add. The Add Client ACL page appears. 4. Configure basic information for the client ACL. The ACL name must be unique in EAD. 5. Click Add in the ACL Rule Information area. The Add Client ACL Rule page appears. 6. Configure the ACL rule parameters and click OK. The new ACL rule appears on the ACL Rule List. Repeat step 5 and step 6 to add more ACL rules, as needed. 7. Adjust priorities for the ACL rules. ACL rules are sorted in descending priority order. Click the Move Up icon icon to change rule positions on the ACL Rule List. 8. Click OK. Modifying a client ACL or Move Down 2. From the navigation tree, select User Security Policy > Endpoint Access Control > Client ACL. The client ACL list displays all client ACLs. 3. Click the Modify icon for the client ACL you want to modify. The Modify Client ACL page appears. 44

56 4. Modify the basic information for the client ACL. The ACL Name and Service Group fields cannot be modified. 5. Modify the ACL rules by using one or more of the following methods: Click Add in the ACL Rule Information area to add an ACL rule to the end of the ACL rule list. Click the Add icon for an ACL rule to insert a new ACL rule after it. Click the Modify icon for an existing ACL rule on the ACL Rule List to modify its settings. Click the Delete icon for an undesired ACL rule to delete the rule. 6. Adjust priorities for the ACL rules. ACL rules are sorted in descending priority order. Click the Move Up icon icon to change rule positions on the ACL Rule List. 7. Click OK. Deleting a client ACL or Move Down A client ACL cannot be deleted when it is assigned to a security policy. To delete the client ACL, first remove it from the security policy. For more information about modifying a security policy, see "Modifying a security policy." To delete a client ACL: 2. From the navigation tree, select User Security Policy > Endpoint Access Control > Client ACL. The client ACL list displays all client ACLs. 3. Click the Delete icon for the client ACL you want to delete. A confirmation dialog box appears. 4. Click OK. Managing URL control policies URL access control can be implemented through a URL control policy and an optional Hosts file check. When a user accesses the network, EAD sends the URL control policy and the Hosts file contents to the inode client to check HTTP access. URL control policy The inode client parses the HTTP packets of access users according to the URL control policy, and prevents users from accessing specified websites by IP address and domain name. You can configure the following contents in a URL control policy: An IP URL default action A domain URL default action An action (permit or deny) for an IP URL group or domain URL group Before you configure a URL control policy, first configure domain URL groups and IP URL groups. For more information about configuring an IP URL group, see "Managing IP URL groups." For more information about configuring a domain URL group, see "Managing domain URL groups." Hosts file check A user might bypass the URL control policy by modifying the Hosts file of the operating system to access a prohibited URL. For example, a Windows 7 user can locate and modify the Hosts file in the directory C:\WINDOWS\system32\drivers\etc\hosts. Enable 45

57 Hosts file checking and configure the contents to be checked in the security policy. When the Hosts file contains items that are not URL check items, the inode client immediately logs out the user and displays a security violation message. URL control policy list contents The URL control policy list has the following parameters: URL Control Policy Name Name of the URL control policy. Description Description of the URL control policy. Service Group Name of the service group to which the URL control policy belongs. Modify Click the Modify icon to modify settings of the URL control policy. Delete Click the Delete icon for the URL control policy you want to delete. URL control policy details The URL control policy details page has basic information area, a domain URL check item list area, and an IP URL check item list area. Basic Information area URL Control Policy Name Name of the URL control policy. Domain URL Default Action Action to take on domain URL accesses that do not match a domain URL check item. The action can be Permit or Deny. The domain URL default action is applied to any domain URL accesses that do not match a domain URL check item. IP URL Default Action Action to take on IP URL accesses that do not match an IP URL check item. The action can be Permit or Deny. The IP URL default action applies to any IP URL accesses that do not match an IP URL check item. Service Group Name of the service group to which the URL control policy belongs. Description Description of the URL control policy. Domain URL Check Item List IP URL Check Item List Domain URL Group Name of the domain URL group. For more information, see "Adding a domain URL group." Action Action to take on domain URL accesses that match the domain URL group. The action can be Permit or Deny. Description Description of the domain URL group. Priority (Descending) Priority of the domain URL group. Domain URL groups are arranged in descending priority order. When the domain URL of the website to be accessed matches multiple groups, the domain URL group with the highest priority applies. Click the Move Up icon or Move Down icon to adjust the list. IP URL Group Name of the IP URL group. For more information, see "Adding an IP URL group." Action Action to take on IP URL accesses that match the IP URL group. The action can be Permit or Deny. Description Description of the IP URL check item. Priority (Descending) Priority of the IP URL check item. IP URL check items are arranged in descending priority order. When the IP URL of the website to be accessed matches multiple 46

58 groups, the IP URL check item with the highest priority applies. Click the Move Up icon Move Down icon to adjust the list. or Viewing the URL control policy list 2. From the navigation tree, select User Security Policy > Endpoint Access Control > URL Control Policy. The URL control policy list displays all URL control policies. 3. Click Refresh to refresh the URL control policy list. Viewing the URL control policy details 2. From the navigation tree, select User Security Policy > Endpoint Access Control > URL Control Policy. The URL control policy list displays all URL control policies. 3. Click the name of a URL control policy to view detailed information. The URL Control Policy Details page appears. 4. Click Back to return to the URL control policy list. Adding a URL control policy 2. From the navigation tree, select User Security Policy > Endpoint Access Control > URL Control Policy. The URL control policy list displays all URL control policies. 3. Click Add. The Add URL Control Policy page appears. 4. Configure basic information for the URL control policy. The policy name must be unique in EAD. 5. Click Add in the Domain URL Check Items List area. The Add Domain URL Group page appears. 6. Configure the parameters and click OK. The new domain URL check item appears in the Domain URL Check Item List area. Repeat step 5 and step 6 to add more domain URL check items, as needed. 7. Adjust priorities for the domain URL check items. Domain URL check items are sorted in descending priority order. Click the Move Up icon Move Down icon to adjust the list. 8. Click Add in the IP URL Check Items List area. The Add IP URL Check Group page appears. 9. Configure the parameters and click OK. The new IP URL check item appears in the IP URL Check Item List area. Repeat step 8 and step 9 to add more IP URL check items, as needed. 10. Adjust priorities for the IP URL check items. IP URL check items are sorted in descending priority order. Click the Move Up icon Move Down icon to adjust the list. 47 or or

59 11. Click OK. Modifying a URL control policy 2. From the navigation tree, select User Security Policy > Endpoint Access Control > URL Control Policy. The URL control policy list displays all URL control policies. 3. Click the Modify icon for the URL control policy you want to modify. The Modify URL Control Policy page appears. 4. Configure basic information for the URL control policy. You cannot modify URL Control Policy Name or Service Group. 5. Modify the domain URL check items by using one or more of the following methods: Click Add in the Domain URL Check Item List area to add a domain URL check item. Click the Delete icon for an undesired domain URL check item to delete the item. 6. Adjust priorities for the domain URL check items. Domain URL check items are sorted in descending priority order. Click the Move Up icon Move Down icon to adjust the list. 7. Modify the IP URL check items by using one or more of the following methods: Click Add in the IP URL Check Item List area to add an IP URL check item. Click the Delete icon for an undesired IP URL check item to delete the item. 8. Adjust priorities for the IP URL check items. IP URL check items are sorted in descending priority order. Click the Move Up icon Move Down icon to adjust the list. 9. Click OK. Deleting a URL control policy Before deleting a URL control policy that is assigned to a security policy, you must first remove their associations. For more information about deleting a URL control policy, see "Modifying a security policy." To delete a URL control policy: 2. From the navigation tree, select User Security Policy > Endpoint Access Control > URL Control Policy. The URL control policy list displays all URL control policies. 3. Click the Delete icon for the URL control policy you want to delete. A confirmation dialog box appears. 4. Click OK. Managing domain URL groups A domain URL group is a set of website domain names. The inode client parses the HTTP packets of access users, compares the domain names to be accessed with the domain URL check items in the URL control policy, and permits or denies user access based on the comparison results. or or 48

60 The domain URL check supports fuzzy matching. For example, when you specify yahoo in the domain URL group, a user's access to the websites mail.yahoo.com, and which contain yahoo, is permitted or denied as configured. Domain URL group list contents The domain URL group list has the following parameters: Domain URL Group Name Name of the domain URL group. Description Description of the domain URL group. Service Group Name of the service group to which the domain URL group belongs. Config Click the Config icon to configure URL check items for the domain URL group. Modify Click the Modify icon to modify the domain URL group settings. Delete Click the Delete icon to delete the domain URL group. Domain URL group details The domain URL group details page has the following basic parameters: Domain URL Group Name Name of the domain URL group. Service Group Name of the service group to which the domain URL group belongs. Description Description of the domain URL group. Domain URL item list contents The domain URL item list has the following parameters: Domain Domain name of the website. Description Description of the domain name. Modify Click the Modify icon to modify the domain URL check item. Delete Click the Delete icon to delete the domain URL check item. Viewing the domain URL group list To view the domain URL group list: 2. From the navigation tree, select User Security Policy > Endpoint Access Control > Domain URL Group. The domain URL group list displays all domain URL groups. 3. Click Refresh to refresh the domain URL group list. Viewing the domain URL group details To view the domain URL group details: 2. From the navigation tree, select User Security Policy > Endpoint Access Control > Domain URL Group. The domain URL group list displays all domain URL groups. 3. Click the name of a domain URL group to view detailed information. 49

61 The Domain URL Group Details page appears. 4. Click Back to return to the domain URL group list. Adding a domain URL group To add a domain URL group: 2. From the navigation tree, select User Security Policy > Endpoint Access Control > Domain URL Group. The domain URL group list displays all domain URL groups. 3. Click Add. The Add Domain URL Group page appears. 4. Configure the basic information for the domain URL group. 5. Click OK. Configuring a domain URL group To configure domain URL group: 2. From the navigation tree, select User Security Policy > Endpoint Access Control > Domain URL Group. The domain URL group list displays all domain URL groups. 3. Click the Config icon for a target domain URL group. The domain URL item list displays all domain URL items in the domain URL group. 4. Click Add to add a domain URL item. a. Enter the domain name of the website in the Domain field, and enter a description of the domain name in the Description field. b. Click OK. Repeat to add more domain URL check items, as needed. 5. Click Import to import domain URL check items: a. Browse to and select the file to be imported, and then select a column separator for the file. Options are space, tab character, comma (,), colon (:), pound sign (#), and dollar sign ($). The file must be in TXT format. b. Click Next. c. Select the column that contains the domain names from the Domain list, and then select the column that contains the domain URL check item descriptions from the Description list. When you select Not Import from File from the Description list, enter a description for all imported domain URL check items in the field to the right. d. Click Preview to preview the file import result. e. Click OK. f. Click Back to return to the Config Domain URL Group page. 6. Query domain URL items: a. Enter a partial or complete domain name of the website in the Domain field. b. Click Query. The Domain URL Item List displays all domain URL items that match the query criterion. c. Click Reset to clear the query criterion. The domain URL item list displays all domain URL items in the domain URL group. 50

62 7. Modify a domain URL item: a. Click the Modify icon for the target domain URL item. The Modify Domain URL Item page appears. b. Modify the following parameters for the domain URL item: Domain Modify the domain name of the website. Description Modify the description of the domain name. c. Click OK. 8. To delete a domain URL item: a. Click the Delete icon for the target domain URL item. b. Click OK. 9. Click OK. Modifying a domain URL group To modify a domain URL group: 2. From the navigation tree, select User Security Policy > Endpoint Access Control > Domain URL Group. The domain URL group list displays all domain URL groups. 3. Click the Modify icon for a target domain URL group. 4. Modify the domain URL group. The Domain URL Group Name and Service Group cannot be modified. 5. Click OK. Deleting a domain URL group A domain URL group cannot be deleted when it is assigned to a URL control policy. To delete the domain URL group, first remove it from the URL control policy. For more information, see "Modifying a URL control policy." To delete a domain URL group: 2. From the navigation tree, select User Security Policy > Endpoint Access Control > Domain URL Group. The domain URL group list displays all domain URL groups. 3. Click the Delete icon for the domain URL group you want to delete. A confirmation dialog box appears. 4. Click OK. Managing IP URL groups An IP URL group is a set of website IP addresses. Access users can access these websites through IP addresses without DNS. The inode client parses the HTTP packets of access users, compares the IP addresses to be accessed with the IP URL check items in the URL control policy, and permits or denies user access based on the comparison result. 51

63 IP URL group list contents The IP URL group list has the following parameters: IP URL Group Name Name of the IP URL group. Description Description of the IP URL group. Service Group Name of the service group to which the IP URL group belongs. Modify Click the Modify icon to modify the IP URL group settings. Delete Click the Delete icon to delete the IP URL group. IP URL group details The IP URL group details page has a basic information area and an IP URL item list area. Basic Information area IP URL Group Name Name of the IP URL group. Service Group Name of the service group to which the IP URL group belongs. Description Description of the IP URL group. IP URL Item List area Start IP Start IP address of the IP URL check item. End IP End IP address of the IP URL check item. Description Description of the IP segment. Viewing the IP URL group list 2. From the navigation tree, select User Security Policy > Endpoint Access Control > IP URL Group. The IP URL group list displays all IP URL groups. 3. Click Refresh to refresh the IP URL group list. Viewing the IP URL group details 2. From the navigation tree, select User Security Policy > Endpoint Access Control > IP URL Group. The IP URL group list displays all IP URL groups. 3. Click the name of an IP URL group to view detailed information. The IP URL Group Details page appears. 4. Click Back to return to the IP URL Group List. Adding an IP URL group 2. From the navigation tree, select User Security Policy > Endpoint Access Control > IP URL Group. The IP URL group list displays all IP URL groups. 52

64 3. Click Add. The Add IP URL Group page appears. 4. Configure the basic information for the IP URL group. 5. Add an IP URL item: a. Click Add. The Add IP URL Item page appears. b. Configure the following parameters: Start IP Enter the start IP address of the website IP segment. End IP Enter the end IP address of the website IP segment. Description Enter the description of the website IP segment. c. Click OK to add the IP URL item. 6. Click OK. Modifying an IP URL group 2. From the navigation tree, select User Security Policy > Endpoint Access Control > IP URL Group. The IP URL group list displays all IP URL groups. 3. Click the Modify icon to modify an IP URL group. The IP URL Group Name and Service Group cannot be modified. 4. To add an new IP URL item: a. Click Add. b. Configure the following parameters: c. Click OK. Start IP Enter the start IP address of the website IP segment. End IP Enter the end IP address of the website IP segment. Description Enter the description of the website IP segment. Repeat to add IP URL items, as needed. 5. To modify an IP URL item: a. Click the Modify icon for the target IP URL item. The Modify IP URL Item page appears. b. Modify the following parameters for the IP URL: c. Click OK. Start IP Modify the start IP address of the website IP segment. End IP Modify the end IP address of the website IP segment. Description Modify the description of the website IP segment. 6. To delete an IP URL item: a. Click the Delete icon for the target IP URL item. b. Click OK. 7. Click OK. 53

65 Deleting an IP URL group An IP URL group cannot be deleted when it is assigned to a URL control policy. To delete the IP URL group, first remove it from the URL control policy. For more information, see "Modifying a URL control policy." To delete an IP URL group: 2. From the navigation tree, select User Security Policy > Endpoint Access Control > IP URL Group. The IP URL group list displays all IP URL groups. 3. Click the Delete icon for the IP URL group you want to delete. A confirmation dialog box appears. 4. Click OK. Managing anti-virus software policies The system defines anti-virus software control for several types of anti-virus software in Windows, Linux, and Mac OS. You can enable anti-virus software control in a security policy and specify an anti-virus software policy. The anti-virus software policy determines whether an anti-virus software type application control is installed and running, and whether the anti-virus engine version and virus definition version match the policy. When an access user is authenticated, the inode client checks the anti-virus software on the user endpoint according to the configuration in the security policy. Anti-virus software policy management allows you to view, add, modify, and delete an anti-virus software policy. You can specify the anti-virus software type application controls to be checked and the anti-virus engine version and virus definition version. Anti-virus software policy list contents The anti-virus software policy list has the following parameters: Anti-Virus Software Policy Name Name of the anti-virus software policy. Click the name to view detailed information. Service Group Service group to which the anti-virus software policy belongs. Description Description of the anti-virus software policy. Modify Click the Modify icon to modify the anti-virus software policy. Delete Click the Delete icon to delete the anti-virus software policy. Anti-virus software policy details The anti-virus software policy details page has a basic information area and areas for Windows, Linux, and Mac OS. Basic information area Policy Name Name of the anti-virus software policy. Service Group Service group to which the anti-virus software policy belongs. Description Description of the anti-virus software policy. Windows, Linux, and Mac OS areas The Windows, Linux, and Mac OS areas list the anti-virus software that can be checked by the inode client. 54

66 Anti-Virus Software Name of the anti-virus software. Vendor Vendor name of the anti-virus software. Check Items Indicates whether the anti-virus engine version and virus definition version are checked for the corresponding anti-virus software. Check anti-virus engine version When this parameter is selected, the anti-virus engine version must be checked. Otherwise, the anti-virus engine version is not checked. Check virus definition version When this parameter is selected, the virus definition version must be checked. Otherwise, the virus definition version is not checked. Restriction Check rules for the anti-virus software policy. When this field is empty, no rules are set for the anti-virus software. Anti-Virus Engine Adaptation Period (in days) Adaptation period for the anti-virus engine. This option is valid only when the anti-virus engine is in YYYY-MM-DD format. When the anti-virus engine is updated within the adaptation period, the anti-virus engine version check is passed. Lowest Version of Anti-Virus Engine Lowest version of the anti-virus engine allowed by the anti-virus software policy. An anti-virus software policy supports two anti-virus engine version formats: YYYY-MM-DD, where YYYY is the four-digit year, MM is the two-digit month, and DD is the two-digit day; and XX.XX.XX, for example, Virus Definition Adaptation Period (in days) Adaptation period for the virus definition of the anti-virus software. This option is valid only when the virus definition is in YYYY-MM-DD format. When the virus definition is updated within the adaptation period, the virus definition version check is passed. Lowest Version of Virus Definition Lowest version of the virus definition allowed by the anti-virus software policy. An anti-virus software policy supports two virus definition version formats: YYYY-MM-DD, where YYYY is the four-digit year, MM is the two-digit month, and DD is the two-digit day; and XX.XX.XX, for example, Check Indicates whether the corresponding anti-virus software will be checked. Priority The inode client checks the anti-virus software based on the priority. Items are listed in descending priority order (most important first). Click the Move Up icon or Move Down icon to adjust the list. Viewing the anti-virus software policy list 2. From the navigation tree, select User Security Policy > Security Software Policy > Anti-Virus. The anti-virus software policy list displays all anti-virus software policies. 3. Click Refresh to refresh the anti-virus software policy list. Viewing anti-virus software policy details 2. From the navigation tree, select User Security Policy > Security Software Policy > Anti-Virus. The anti-virus software policy list displays all anti-virus software policies. 3. Click the name of an anti-virus software policy to view detailed information. The View Anti-Virus Software Policy page appears. 4. Click Back to return to the anti-virus software policy list. 55

67 Adding an anti-virus software policy 2. From the navigation tree, select User Security Policy > Security Software Policy > Anti-Virus. The anti-virus software policy list displays all anti-virus software policies. 3. Click Add. The Add Anti-Virus Software Policy page appears. 4. Configure the basic information for the anti-virus software policy. 5. To check an anti-virus software product in the anti-virus software policy, select the box in the Check field for the anti-virus software. 6. Modify the anti-virus software check: a. Click the Modify icon for the anti-virus software you want to modify. The Anti-Virus Software Settings dialog box appears. b. Modify the anti-virus software name in the Anti-Virus software field as needed. c. To check the anti-virus engine version, select the box next to Check anti-virus engine version, and select an anti-virus engine version format: Dotted format Valid version format is XX.XX.XX, for example, Date format Valid date format is YYYY-MM-DD, where YYYY is the four-digit year, MM is the two-digit month, and DD is the two-digit day. Date or dotted format Dotted format and date format are valid. Different version formats require different parameters, as shown in Table 16. Table 16 Version formats and parameters Version format Date format Notification Version check mode Parameter YYYY-MM-DD Specified Version Auto Adaptive Lowest Version of Anti-Virus Engine Adaptation Period (in days) Dotted format XX.XX.XX Specified Version Lowest Version of Anti-Virus Engine d. Select a version check mode, Specified Version or Auto Adaptive, from the Version Check Mode list. Specified Version The version check is passed if the user endpoint is a later version than the specified version. If not, the version check fails. When the version check mode is Specified Version and the version format is Date format, either enter the date manually or click the Calendar icon Lowest Version of Anti-Virus Engine field to select a date. next to the When the version check mode is Specified Version and the version format is Dotted format, enter the version in the Lowest Version of Anti-Virus Engine field. A valid version format is XX.XX.XX, for example, Auto Adaptive The version check is passed if the user endpoint version has been updated within the adaptation period. If not, the version check fails. When the version check mode is Auto Adaptive and the version format is Date format, manually enter the adaptation period in the Adaptation Period (in days) field. 56

68 e. To check the virus definition version, select the box next to Check virus definition version, and select a virus definition version format: Dotted format Valid version format is XX.XX.XX, for example, Date format Valid date format is YYYY-MM-DD, where YYYY is the four-digit year, MM is the two-digit month, and DD is the two-digit day. Date or dotted format Dotted format and date format are valid. Different version formats require different parameters, as shown in Table 17. Table 17 Version formats and parameters Version format Notification Version check mode Parameter Date format YYYY-MM-DD Specified Version Auto Adaptive Lowest Version of Virus Definition Adaptation Period (in days) Dotted format XX.XX.XX Specified Version Lowest Version of Virus Definition f. Select a version check mode, Specified Version or Auto Adaptive, from the Version Check Mode list. For more information about check modes, see the documentation for the Anti-Virus Engine version. g. Click OK. 7. In the Priority field of the anti-virus software policy list, click the Move Up icon or Move Down icon to adjust the anti-virus software position in the list. 8. Click OK. The anti-virus software policy you have added now appears in the configuration options when you configure the security policy. For more information, see "Managing security policies." Modifying an anti-virus software policy 2. From the navigation tree, select User Security Policy > Security Software Policy > Anti-Virus. The anti-virus software policy list displays all anti-virus software policies. 3. Click the Modify icon for the anti-virus software policy you want to modify. The Modify Anti-Virus Software Policy page appears. 4. Modify the basic information for the anti-virus software policy. You cannot modify Policy Name or Service Group. 5. To check an anti-virus software product in the anti-virus software policy, select the box in the Check field for the anti-virus software. 6. Modify the anti-virus software check: a. Click the Modify icon for the anti-virus software you want to modify. The Anti-Virus Software Settings dialog box appears. b. Modify the anti-virus software name in the Anti-Virus software field as needed. c. To check the anti-virus engine version, select the box next to Check anti-virus engine version, and select an anti-virus engine version format: Dotted format Valid version format is XX.XX.XX, for example,

69 Date format Valid date format is YYYY-MM-DD, where YYYY is the four-digit year, MM is the two-digit month, and DD is the two-digit day. Date or dotted format Dotted format and date format are valid. Different version formats require different parameters, as shown in Table 18. Table 18 Version formats and parameters Version format Date format Notification Version check mode Parameter YYYY-MM-DD Specified Version Auto Adaptive Lowest Version of Anti-Virus Engine Adaptation Period (in days) Dotted format XX.XX.XX Specified Version Lowest Version of Anti-Virus Engine d. Select a version check mode, Specified Version or Auto Adaptive, from the Version Check Mode list. Specified Version The version check is passed if the user endpoint is a later version than the specified version. If not, the version check fails. When the version check mode is Specified Version and the version format is Date format, either enter the date manually or click the Calendar icon Lowest Version of Anti-Virus Engine field to select a date. next to the When the version check mode is Specified Version and the version format is Dotted format, enter the version in the Lowest Version of Anti-Virus Engine field. A valid version format is XX.XX.XX, for example, Auto Adaptive The version check is passed if the user endpoint version has been updated within the adaptation period. If not, the version check fails. When the version check mode is Auto Adaptive and the version format is Date format, manually enter the adaptation period in the Adaptation Period (in days) field. e. To check the virus definition version, select the box next to Check virus definition version, and select a virus definition version format: Dotted format Valid version format is XX.XX.XX, for example, Date format Valid date format is YYYY-MM-DD, where YYYY is the four-digit year, MM is the two-digit month, and DD is the two-digit day. Date or dotted format Dotted format and date format are valid. Different version formats require different parameters, as shown in Table 19. Table 19 Version formats and parameters Version format Notification Version check mode Parameter Date format YYYY-MM-DD Specified Version Auto Adaptive Lowest Version of Virus Definition Adaptation Period (in days) Dotted format XX.XX.XX Specified Version Lowest Version of Virus Definition f. Select a version check mode, Specified Version or Auto Adaptive, from the Version Check Mode list. For more information about check modes, see the documentation for the Anti-Virus Engine version. g. Click OK. 58

70 7. In the Priority field of the anti-virus software policy list, click the Move Up icon or Move Down icon to adjust the anti-virus software position in the list. 8. Click OK. Deleting an anti-virus software policy An anti-virus software policy cannot be deleted when it is assigned to a security policy. To delete the anti-virus software policy, first remove it from the security policy. For more information, see "Modifying a security policy." To delete an anti-virus software policy: 2. From the navigation tree, select User Security Policy > Security Software Policy > Anti-Virus. The anti-virus software policy list displays all anti-virus software policies. 3. Click the Delete icon for the anti-virus software policy you want to delete. A confirmation dialog box appears. 4. Click OK. Managing anti-spyware software policies The system defines anti-spyware software control for several types of anti-spyware software in both Windows and Mac OS. You can enable anti-spyware software control in a security policy, and specify an anti-spyware software policy. The anti-spyware software policy determines whether an anti-spyware software type application control is installed and running, and whether the anti-spyware engine version and spyware definition version match the policy. When an access user is authenticated, the inode client checks the anti-spyware software on the user endpoint according to the configuration in the security policy. Anti-spyware software policy management allows you to view, add, modify, and delete an anti-spyware software policy. You can specify the anti-spyware products to be checked and the spyware definition version and anti-spyware engine version. Anti-spyware software policy list contents The anti-spyware software policy list has the following parameters: Anti-Spyware Software Policy Name Name of the anti-spyware software policy. Click the name to view detailed information. Service Group Service group to which the anti-spyware software policy belongs. Description Description of the anti-spyware software policy. Modify Click the Modify icon to modify the anti-spyware software policy. Delete Click the Delete icon to delete the anti-spyware software policy. Anti-spyware software policy details The anti-spyware software policy details page has a basic information area and areas for Windows and Mac OS. Basic information area Policy Name Name of the anti-spyware software policy. 59

71 Service Group Service group to which the anti-spyware software policy belongs. Description Description of the associated anti-spyware software policy. Windows and Mac OS areas These areas list the anti-spyware software that can be checked by the inode client on the corresponding operating system. Anti-Spyware Software Name of the anti-spyware software. Vendor Vendor name of the anti-spyware software. Check Items Indicates whether the engine version and spyware definition version of the anti-spyware software are checked. Check anti-spyware engine version When this parameter is selected, the engine version must be checked. Otherwise, engine version is not checked. Check spyware definition version When this parameter is selected, the spyware definition version must be checked. Otherwise, the spyware definition version is not checked. Restriction Check rules for the anti-spyware software policy. When this field is empty, no rules are set for the anti-spyware software. Lowest Version of Anti-Spyware Engine Lowest version of the anti-spyware engine allowed by the anti-spyware software policy. An anti-spyware software policy supports the format XX.XX.XX, for example, Lowest Version of Anti-Spyware Definition Lowest version of the anti-spyware definition allowed by the anti-spyware software policy. An anti-spyware software policy supports the format YYYY-MM-DD, where YYYY is the four-digit year, MM is the two-digit month, and DD is the two-digit day. Check Indicates whether the corresponding anti-spyware software will be checked. Priority Order (descending) in which the inode client checks the anti-spyware software. Viewing the anti-spyware software policy list 2. From the navigation tree, select User Security Policy > Security Software Policy > Anti-Spyware. The anti-spyware software policy list displays all anti-spyware software policies. 3. Click Refresh to refresh the anti-spyware software policy list. Viewing anti-spyware software policy details To view details of an anti-spyware software policy: 2. From the navigation tree, select User Security Policy > Security Software Policy > Anti-Spyware. The anti-spyware software policy list displays all anti-spyware software policies. 3. Click the name of an anti-spyware software policy to view detailed information. The View Anti-Spyware Software Policy page appears. 4. Click Back to return to the anti-spyware software policy list. Adding an anti-spyware software policy To add an anti-spyware software policy: 60

72 2. From the navigation tree, select User Security Policy > Security Software Policy > Anti-Spyware. The anti-spyware software policy list displays all anti-spyware software policies. 3. Click Add. The Add Anti-Spyware Software Policy page appears. 4. Configure the basic information for the anti-spyware software policy. 5. To check an anti-spyware software product in the anti-spyware software policy, select the box in the Check field for the anti-spyware software you want to check. 6. Modify the anti-spyware software check: a. Click the Modify icon for the anti-spyware software you want to modify. The Anti-Spyware Software Settings dialog box appears. b. To check the anti-spyware engine version, select the box next to Check anti-spyware engine version. c. Select Specified Version from the Version Check Mode list. If the anti-spyware engine of an access user is a later version than the specified version, the anti-spyware engine version check is passed. If not, the anti-spyware engine version check fails. d. Enter the anti-spyware engine version in the Lowest Version of Anti-Spyware Engine field, in the format XX.XX.XX, for example, You must use dotted format for an anti-spyware engine version. e. To check the anti-spyware definition version, select the box next to Check spyware definition version. f. Select a version check mode, Specified Version or Auto Adaptive, from the Version Check Mode list. Specified Version If the anti-spyware definition version of an access user is a later version than the specified version, the anti-spyware definition version check is passed. If not, the anti-spyware definition version check fails. When the anti-spyware definition version check mode is Specified Version, either enter the date manually or click the Calendar icon next to the Lowest Version of Spyware Definition field to select a date. The valid date format is YYYY-MM-DD, where YYYY is the four-digit year, MM is the two-digit month, and DD is the two-digit day. g. Click OK. Auto Adaptive If the anti-spyware definition version of an access user has been updated within the adaptation period, the anti-spyware definition version check is passed. If not, the anti-spyware definition version check fails. When the anti-spyware definition version check mode is Auto Adaptive, manually enter the adaptation period in the Adaptation Period (in days) field. 7. To adjust the position of the anti-spyware software in the list, click the Move Up icon or Move Down icon in the Priority field. The inode client checks the anti-spyware software of access users based on descending priority order (most important first). 8. Click OK. The anti-spyware software policy you have added now appears in the configuration options when you configure the security policy. For more information, see "Managing security policies." 61

73 Modifying an anti-spyware policy 2. From the navigation tree, select User Security Policy > Security Software Policy > Anti-Spyware. The anti-spyware software policy list displays all anti-spyware software policies. 3. Click the Modify icon for the anti-spyware software policy you want to modify. The Modify Anti-Spyware Software Policy page appears. 4. Modify the basic information for the anti-spyware software policy. You cannot modify Policy Name or Service Group. 5. To check an anti-spyware software product in the anti-spyware software policy, select the box in the Check field for the anti-spyware software you want to check. 6. Modify the anti-spyware software check: a. Click the Modify icon for the anti-spyware software you want to modify. The Anti-Spyware Software Settings dialog box appears. b. To check the anti-spyware engine version, select the box next to Check anti-spyware engine version. c. Select Specified Version from the Version Check Mode list. If the anti-spyware engine of an access user is a later version than the specified version, the anti-spyware engine version check is passed. If not, the anti-spyware engine version check fails. d. Enter the anti-spyware engine version in the Lowest Version of Anti-Spyware Engine field, in the format XX.XX.XX, for example, You must use dotted format for an anti-spyware engine version. e. To check the anti-spyware definition version, select the box next to Check spyware definition version. f. Select a version check mode, Specified Version or Auto Adaptive, from the Version Check Mode list. Specified Version If the anti-spyware definition of an access user is a later version than the specified version, the anti-spyware definition version check is passed. If not, the anti-spyware definition version check fails. When the anti-spyware definition version check mode is Specified Version, either enter the date manually or click the Calendar icon next to the Lowest Version of Spyware Definition field to select a date. The valid date format is YYYY-MM-DD, where YYYY is the four-digit year, MM is the two-digit month, and DD is the two-digit day. g. Click OK. Auto Adaptive If the anti-spyware definition version of an access user has been updated within the adaptation period, the anti-spyware definition version check is passed. If not, the anti-spyware definition version check fails. When the anti-spyware definition version check mode is Auto Adaptive, manually enter the adaptation period in the Adaptation Period (in days) field. 7. To adjust the position of the anti-spyware software in the list, click the Move Up icon or Move Down icon in the Priority field. The inode client checks the anti-spyware software of access users based on descending priority order (most important first). 8. Click OK. 62

74 Deleting an anti-spyware software policy An anti-spyware software policy cannot be deleted when it is assigned to a security policy. To delete the anti-spyware software policy, first remove it from the security policy. For more information, see "Modifying a security policy." To delete an anti-spyware software policy: 2. From the navigation tree, select User Security Policy > Security Software Policy > Anti-Spyware. The anti-spyware software policy list displays all anti-spyware software policies. 3. Click the Delete icon for the anti-spyware software policy you want to delete. A confirmation dialog box appears. 4. Click OK. Managing firewall software policies The system defines firewall software control for several types of firewall software in Windows, Linux, and Mac OS. You can enable firewall software control in a security policy, and specify a firewall software policy. The firewall software policy determines whether a firewall software product is installed and running. When an access user is authenticated, the inode client checks the firewall software on the user endpoint according to the configuration in the security policy. Firewall software policy management allows you to view, add, modify, and delete a firewall software policy. You can specify the firewall software to be checked as needed. Firewall software policy list contents The firewall software policy list has the following parameters: Firewall Software Policy Name Name of the firewall software policy. Click the name to view detailed information. Service Group Service group to which the firewall software policy belongs. Description Description of the firewall software policy. Modify Click the Modify icon to modify the firewall software policy. Delete Click the Delete icon to delete the firewall software policy. Firewall software policy details The firewall software policy details page has a basic information area and areas for Windows, Linux, and Mac OS. Basic information area Policy Name Name of the firewall software policy. Service Group Service group to which the firewall software policy belongs. Description Description of the firewall software policy. Windows, Linux, and Mac OS areas These areas list the firewall software that can be checked by the inode client on the corresponding operating system. Firewall Software Name of the firewall software. 63

75 Vendor Vendor name of the firewall software. Check Indicates whether the corresponding firewall software will be checked. Priority Order (descending) in which the inode client checks the firewall software. Viewing the firewall software policy list 2. From the navigation tree, select User Security Policy > Security Software Policies > Firewall. The firewall software policy list displays all firewall software policies. 3. Click Refresh to refresh the firewall software policy list. Viewing firewall software policy details 2. From the navigation tree, select User Security Policy > Security Software Policies > Firewall. The firewall software policy list displays all firewall software policies. 3. Click the name of a firewall software policy to view detailed information. The View Firewall Software Policy page appears. 4. Click Back to return to the firewall software policy list, click Back. Adding a firewall software policy 2. From the navigation tree, select User Security Policy > Security Software Policies > Firewall. The firewall software policy list displays all firewall software policies. 3. Click Add. The Add Firewall Software Policy page appears. 4. Configure the basic information for the firewall software policy. 5. To configure checking a firewall software product in the firewall software policy, select the box in the Check field for the firewall software. 6. Click the Move Up icon in the Priority field of the firewall software policy list to move the firewall software up one position in the list, or click the Move Down icon to move the firewall software down one position in the list. The inode client checks the firewall software of access users based on descending priority order (most important first). 7. Click OK. The firewall software policy you have added now appears in the configuration options when you configure the security policy. For more information, see "Managing security policies." Modifying a firewall software policy 2. From the navigation tree, select User Security Policy > Security Software Policies > Firewall. 64

76 The firewall software policy list displays all firewall software policies. 3. Click the Modify icon for the firewall software policy you want to modify. The Modify Firewall Software Policy page appears. 4. Modify the basic information for the firewall software policy. You cannot modify Policy Name or Service Group. 5. To configure checking a firewall software product in the firewall software policy, select the box in the Check field for the firewall software. 6. Click the Move Up icon in the Priority field of the firewall software policy list to move the firewall software up one position in the list, or click the Move Down icon to move the firewall software down one position in the list. The inode client checks the firewall software of access users based on descending priority order (most important first). 7. Click OK. Deleting a firewall software policy A firewall software policy cannot be deleted when it is assigned to a security policy. To delete the firewall software policy, first remove it from the security policy. For more information, see "Modifying a security policy." To delete a firewall software policy: 2. From the navigation tree, select User Security Policy > Security Software Policies > Firewall. The firewall software policy list displays all firewall software policies. 3. Click the Delete icon for the firewall software policy you want to delete. A confirmation dialog box appears. 4. Click OK. Managing anti-phishing software policies The system defines anti-phishing software control for several types of anti-phishing software in Windows and Mac OS. You can enable anti-phishing software control in a security policy, and specify an anti-phishing software policy. The anti-phishing software policy determines whether an anti-phishing software type application control is installed and running. When an access user is authenticated, the inode client checks the anti-phishing software on the user endpoint according to the configuration in the security policy. Anti-phishing software policy management allows you to view, add, modify, and delete an anti-phishing software policy. You can specify the anti-phishing software to be checked as needed. Anti-phishing software policy list contents The anti-phishing software policy list has the following parameters: Anti-Phishing Software Policy Name Name of the anti-phishing software policy. Click the name to view detailed information. Service Group Service group to which the anti-phishing software policy belongs. Description Description of the anti-phishing software policy. Modify Click the Modify icon to modify the anti-phishing software policy. 65

77 Delete Click the Delete icon to delete the anti-phishing software policy. Anti-phishing software policy details The anti-phishing software policy details page has a basic information area and areas for Windows and Mac OS. Basic information area Policy Name Name of the anti-phishing software policy. Service Group Service group to which the anti-phishing software policy belongs. Description Description of the anti-phishing software policy. Windows and Mac OS areas These areas list the anti-phishing software that can be checked by the inode client on the corresponding operating system. Anti-Phishing Software Name of the anti-phishing software. Vendor Vendor name of the anti-phishing software. Check Indicates whether the corresponding anti-phishing software will be checked. Priority Order (descending) in which the inode client checks the anti-phishing software. Viewing the anti-phishing software policy list To view the anti-phishing software policy list: 2. From the navigation tree, select User Security Policy > Security Software Policies > Anti-Phishing. The anti-phishing software policy list displays all anti-phishing software policies. 3. Click Refresh to refresh the anti-phishing software policy list. Viewing anti-phishing software policy details 2. From the navigation tree, select User Security Policy > Security Software Policies > Anti-Phishing. The anti-phishing software policy list displays all anti-phishing software policies. 3. Click the name of an anti-phishing software policy view detailed information. The View Anti-Phishing Software Policy page appears. 4. Click Back to return to the anti-phishing software policy list. Adding an anti-phishing software policy 2. From the navigation tree, select User Security Policy > Security Software Policies > Anti-Phishing. The anti-phishing software policy list displays all anti-phishing software policies. 3. Click Add. The Add Anti-Phishing Software Policy page appears. 4. Configure basic information for the anti-phishing software policy. 66

78 5. To check an anti-phishing software product in the anti-virus software policy, select the box in the Check field for the anti-virus software. 6. Click the Move Up icon in the Priority field of the anti-phishing software policy list to move the anti-phishing software up one position in the list, or click the Move Down icon to move the anti-phishing software down one position in the list. The inode client checks the anti-phishing software of access users based on descending priority order (most important first). 7. Click OK. The anti-phishing software policy you have added now appears in the configuration options when you configure the security policy. For more information, see "Managing security policies." Modifying an anti-phishing software policy 2. From the navigation tree, select User Security Policy > Security Software Policies > Anti-Phishing. The anti-phishing software policy list displays all anti-phishing software policies. 3. Click the Modify icon for the anti-phishing software policy you want to modify. The Modify Anti-Phishing Software Policy page appears. 4. Modify the basic information for the anti-phishing software policy. You cannot modify Policy Name or Service Group. 5. To check an anti-phishing software product in the anti-phishing software policy, select the box in the Check field for the anti-phishing software. 6. Click the Move Up icon in the Priority field of the anti-phishing software policy list to move the anti-phishing software up one position in the list, or click the Move Down icon to move the anti-phishing software down one position in the list. The inode client checks the anti-phishing software of access users based on descending priority order (most important first). 7. Click OK. Deleting an anti-phishing software policy An anti-phishing software policy cannot be deleted when it is assigned to a security policy. To delete the anti-phishing software policy, first remove it from the security policy. For more information, see "Modifying a security policy." To delete an anti-phishing software policy: 2. From the navigation tree, select User Security Policy > Security Software Policies > Anti-Phishing. The anti-phishing software policy list displays all anti-phishing software policies. 3. Click the Delete icon for the anti-phishing software policy you want to delete. A confirmation dialog box appears. 4. Click OK. 67

79 Managing hard disk encryption software policies The system defines hard disk encryption software control for several types of hard disk encryption software in Windows. You can enable hard disk encryption software control for a security policy, and specify a hard disk encryption software policy. The hard disk encryption software policy determines whether the hard disk encryption software is installed on a user endpoint. When an access user is authenticated, the inode client checks the hard disk encryption software on the user endpoint according to the configuration in the security policy. Hard disk encryption software policy management allows you to view, add, modify, and delete a hard disk encryption software policy. You can specify the hard disk encryption policies to be checked as needed. Hard disk encryption software policy list contents The hard disk encryption software policy list has the following parameters: Hard Disk Encryption Software Policy Name Name of the hard disk encryption software policy. Click the name to view detailed information. Service Group Service group to which the hard disk encryption software policy belongs. Description Description of the associated hard disk encryption software policy. Modify Click the Modify icon to modify the hard disk encryption software policy. Delete Click the Delete icon to delete the hard disk encryption software policy. Hard disk encryption software policy details The hard disk encryption software policy details page has a basic information area and a Windows area. Basic information area Policy Name Name of the hard disk encryption software policy. Service Group Service group to which the hard disk encryption software policy belongs. Description Description of the hard disk encryption software policy. Windows area This area lists the hard disk encryption software that can be checked by the inode client in Windows. Hard Disk Encryption Software Name of the hard disk encryption software. Vendor Vendor name of the hard disk encryption software. Check Indicates whether the corresponding hard disk encryption software will be checked. Priority Order (descending) in which the inode client checks the hard disk encryption software. Viewing the hard disk encryption software policy list 2. From the navigation tree, select User Security Policy > Security Software Policies > Hard Disk Encryption. The hard disk encryption software policy list displays all hard disk encryption software policies. 3. Click Refresh to refresh the hard disk encryption software policy list. 68

80 Viewing hard disk encryption software policy details 2. From the navigation tree, select User Security Policy > Security Software Policies > Hard Disk Encryption. The hard disk encryption software policy list displays all hard disk encryption software policies. 3. Click the name of a hard disk encryption software policy to view detailed information. The View Hard Disk Encryption Software Policy page appears. 4. Click Back to return to the hard disk encryption software policy list. Adding a hard disk encryption software policy 2. From the navigation tree, select User Security Policy > Security Software Policies > Hard Disk Encryption. The hard disk encryption software policy list displays all hard disk encryption software policies. 3. Click Add. The Add Hard Disk Encryption Software Policy page appears. 4. Configure basic information for the hard disk encryption software policy. 5. To configure checking a hard disk encryption software product in the firewall software policy, select the box in the Check field for the hard disk encryption software. 6. To adjust the position of the hard disk encryption software in the list, click the Move Up icon or Move Down icon in the Priority field. The inode client checks the hard disk encryption software of access users based on descending priority order (most important first). 7. Click OK. The hard disk encryption software policy you have added now appears in the configuration options when you configure the security policy. For more information, see "Managing security policies." Modifying a hard disk encryption software policy 2. From the navigation tree, select User Security Policy > Security Software Policies > Hard Disk Encryption. The hard disk encryption software policy list displays all hard disk encryption software policies. 3. Click the Modify icon for the hard disk encryption software policy you want to modify. The Modify Hard Disk Encryption Software Policy page appears. 4. Modify the basic information for the hard disk encryption software policy. You cannot modify the Policy Name or Service Group. 5. To configure checking a hard disk encryption software product in the hard disk encryption software policy, select the box in the Check field for the hard disk encryption software. 6. To adjust the position of the hard disk encryption software in the list, click the Move Up icon or Move Down icon in the Priority field. The inode client checks the hard disk encryption software of access users based on descending priority order (most important first). 7. Click OK. 69

81 Deleting a hard disk encryption software policy A hard disk encryption software policy cannot be deleted when it is assigned to a security policy. To delete the hard disk encryption software policy, first remove it from the security policy. For more information, see "Modifying a security policy." To delete a hard disk encryption software policy: 2. From the navigation tree, select User Security Policy > Security Software Policies > Hard Disk Encryption. The hard disk encryption software policy list displays all hard disk encryption software policies. 3. Click the Delete icon for the hard disk encryption software policy you want to delete. A confirmation dialog box appears. 4. Click OK. Managing PC software control groups You can enable PC software control in a security policy and specify PC software control groups to be checked. When an access user is authenticated, the inode client checks software, processes, services, and files on the PC according to the configuration in the security policy. PC software control management allows you to view, add, modify, and delete a PC software control group. Table 20 describes the check type for each type of PC software control group. Table 20 PC software control groups and check types Group type Software Process Service File Check types A software-type PC software control group applies only to Windows operating systems. It has the following check types: Installed Forbidden Prohibits any software products in the control group from being installed on the user endpoint. Installed Required Requires all software products in the control group to be installed on the user endpoint. Installed Allowed Allows only the software products in the control group to be installed on the user endpoint. Only one control group can be set as Installed Allowed. A process-type PC software control group has the following check types: Running Forbidden Prohibits any processes in the control group from running on the user endpoint. Running Required Requires all processes in the control group to be running on the user endpoint. A service-type PC software control group has the following check types: Started Forbidden Prohibits any services in the control group from being started on the user endpoint. Started Required Requires all services in the control group to be started on the user endpoint. A file-type PC software control group has the following check types: Non-Existent Prohibits any files in the control group from being stored on the user endpoint. Existent Requires all files in the control group to exist on the user endpoint. 70

82 PC software control group list contents The PC software control group list has the following parameters: Group Name Name of the PC software control group. Click the name to view detailed information. Type Type of the PC software control group, which can be: Software Process Service File Description Description of the PC software control group. Default Action for Check Failure Default action of the PC software control group when the check fails, which can be: Monitor (default) The user is not informed of security problems after going online, and can access the network. Security check results are recorded in security logs. Inform The user is informed of security problems after going online. The system prompts the user for modification, and the user can access the network. Security check results are recorded in security logs. Isolate The user is informed of security problems after going online. The system prompts the user to solve problems, and the user can access resources in the isolation area according to the configured ACL. Security check results are recorded in security logs. Kick Out The user is informed of security problems after going online. The authentication fails and the user is logged off.. Security check results are recorded in security logs. A new PC software control group uses the default action you configured for PC software control group check failure. When you select Global Security Mode in Security Level configuration, the default action of the PC software control group check failure is invalid. Local Data Indicates whether the PC software control group is created by the EAD server. When the value is No, the PC software control group is deployed by an upper-level node. For more information, see "Managing hierarchical EAD networks." Service Group Service group to which the PC software control group belongs. Modify Click the Modify icon to modify the PC software control group. Delete Click the Delete icon to delete the PC software control group. MD5 Tool Click the MD5 Tool link to download the MD5 tool. Common Software Definition Click the Common Software Definition link to go to the Common Software Definition page. Viewing the PC software control group list 2. From the navigation tree, select User Security Policy > PC Software Control Group. The PC software control group list displays all PC software control groups. Querying PC software control groups 2. From the navigation tree, select User Security Policy > PC Software Control Group. 3. Enter your query criteria in the Query PC Software Control Group area: 71

83 Group Name Enter the name of the PC software control group. Software/Process/Service/File Name Enter the software name, process name, service name, or file name of the PC software control group. 4. Click Query. 5. To reset both the query values and the search results, and to restore the full PC software control group list, click Reset and re-enter your query criteria. Deleting a PC software control group A PC software control group cannot be deleted when it is assigned to a security policy. To delete the PC software control group, first remove it from the security policy. For more information, see "Modifying a security policy." To delete a PC software control group: 2. From the navigation tree, select User Security Policy > PC Software Control Group. The PC software control group list displays all PC software control groups. 3. Click the Delete icon for the PC software control group you want to delete. A confirmation dialog box appears. 4. Click OK. Managing software-type PC software control groups Software-type PC software control group details The software-type PC software control group details page has a basic information area and a software list area. Basic information contents Group Name Name of the PC software control group. Type Type of the PC software control group, which is Software. Description Description of the PC software control group. Default Action for Check Failure Default action of the PC software control group when the check fails, which can be: Monitor (default) The user is not informed of security problems after going online, and can access the network. Security check results are recorded in security logs. Inform The user is informed of security problems after going online. The system prompts the user to solve problem, and the user can access the network. Security check results are recorded in security logs. Isolate The user is informed of security problems after going online. The system prompts the user to solve problems, and the user can access resources in the isolation area according to the configured ACL. Security check results are recorded in security logs. Kick out The user is informed of security problems after going online, fails the authentication, and is forced to log off. Security check results are recorded in security logs. A new PC software control group uses the default action you configured for PC software control group check failure. You can modify the action for PC software control group check failure in the security policy. When you select Global Security Mode in Security Level configuration, the default action for PC software control group failure is invalid. Service Group Service group to which the PC software control group belongs. Software list information 72

84 Software Name Name of the software. The software name must be the same as that in Windows > Control Panel > Add or Delete Programs. Alias Alias of the software. When an access user fails the access control check, the inode client uses the alias as the name of the software on the Security Check Result page. Version Number Version number of the software. The software version must be the same as that in Windows > Control Panel > Add or Delete Programs. Description Description of the software. Viewing a software-type PC software control group 2. From the navigation tree, select User Security Policy > PC Software Control Group. The PC software control group list displays all PC software control groups. 3. Click the group name of the PC software control group you want to view. The View PC Software Control Group page appears. 4. Click Back to return to the PC software control group list. Adding a software-type PC software control group 2. From the navigation tree, select User Security Policy > PC Software Control Group. The PC software control group list displays all PC software control groups. 3. Click Add. The Add PC Software Control Group page appears. 4. Configure basic information for the PC software control group. 5. To add a software product to the Software List: a. Click Add. The Add Software dialog box appears. b. Enter the Software Name, Alias, Version Number, and Description. c. Click OK. The added software appears in the Software List. 6. To add multiple software products to the Software List in batches: a. Click Batch Add. The Batch Add Software dialog box appears. b. Enter your query criteria: Software Name Enter the software name. Version Number Enter the software version number. Description Enter the software description. To reset both the query values and the search results, and to restore the full Common Software List, click Reset and re-enter your query criteria. c. Click Query. The query results appear in the Common Software List. d. Select the box next to Software Name in the Common Software List for the software you want to add. e. Click OK. 7. Click OK. The added software is displayed in the Software List. 73

85 The software-type PC software control group you have added now appears in the configuration options when you configure the security policy. For more information, see "Managing security policies." Modifying a software-type PC software control group 2. From the navigation tree, select User Security Policy > PC Software Control Group. The PC software control group list displays all PC software control groups. 3. Click the Modify icon for the software-type PC software control group you want to modify. The Modify PC Software Control Group page appears. 4. Modify the basic information for the software-type PC software control group. You cannot modify Group Name, Type, or Service Group. 5. To add a software product to the Software List: a. Click Add. The Add Software dialog box appears. b. Software Name Enter the name of the software. The software name must be the same as that in Control Panel > Programs and Features in the Windows operating system. c. Alias Enter the software alias. When an access user fails the access control check, the inode client uses the alias of the software as the name of the software on the Security Check Result page. d. Version Number Enter the software version. The software version must be the same as that in Control Panel > Programs and Features in the Windows operating system. e. Description Enter a description of the software. f. Click OK. The added software is displayed in the Software List. 6. To add multiple software products to the Software List in batches: a. Click Batch Add. The Batch Add Software dialog box appears. b. Enter your query criteria. To reset both the query values and the search results, and to restore the full Common Software List, click Reset and re-enter your query criteria. c. Click Query. The query results appear in the Common Software List. d. Select the box next to Software Name in the Common Software List for the software you want to add. e. Click OK. The added software is displayed in the Software List. 7. To modify the software in the Software List: a. Click the Modify icon for the software you want to modify. The Modify Software dialog box appears. b. Click OK. Policy Name Modify the software name. Alias Modify the software alias. When an access user fails the access control check, the inode client uses the alias of the software as the name on the Security Check Result page. Version Number Modify the software version. Description Enter a new description for the software. 74

86 The modified software appears in the Software List. 8. To delete the software in the Software List: a. Click the Delete icon for the software you want to delete. b. Click OK in the dialog box that appears. 9. Click OK. Deleting a software-type PC software control group For more information about deleting a software-type PC software control group, see "Deleting a PC software control group." Managing process-type PC software control groups Process-type PC software control group details The process-type PC software control group details page has a basic information area and a process list area. Basic information contents Group Name Name of the PC software control group. Type Type of the PC software control group, Process. Description Description of the PC software control group. Default Action for Check Failure Default action for the PC software control group when the check fails, which can be: Monitor The user is not informed of security problems after going online, and can access the network. Security check results are recorded in security logs. Inform The user is informed of security problems after going online. The system prompts the user to solve problems, and the user can access the network. Security check results are recorded in security logs. Isolate The user is informed of security problems after going online. The system prompts the user to solve problems, and the user can access resources in the isolation area according to the configured ACL. Security check results are recorded in security logs. Kick out The user is informed of security problems after going online, fails the authentication, and is forced to log off. Security check results are recorded in security logs. A new PC software control group uses the default action you configured for PC software control group check failure. When you select Global Security Mode in Security Level configuration, the default action of the PC software control group failure is invalid. You can specify whether Global Security Mode is used and the default action for PC software control group failure for each PC software control group. Service Group Service group to which the PC software control group belongs. Process list information Process Name Name of the process. For the Windows operating system, the process name must be the same as that in Windows Task Manager > Processes. For the Linux operating system, the process name must be the same as that after the ps -ef command is executed. For the Mac OS operating system, the process name must be the same as that after the ps -awwx -o command is executed. Alias Alias of the process. When an access user fails the access control check, the inode client uses the alias as the name of the process on the Security Check Result page. Operating System Operating system of a process: Windows, Linux, or Mac OS. 75

87 Check Type Select a process check method: Simple, Complex, and MD5. You can configure all of them on a Windows operating system, but you can configure only Simple on a Linux or Mac OS operating system. Simple Used where the process name is the same as the source file name of a program. Complex Used where the process name is different from the source file name of a program. A process is generated for each program and typically, the process name is the same as the source file name of the program. In some cases (for example, if the program name was changed manually), the process name is different from the source file name. MD5 Used where a process name has no corresponding source file name, or one process name corresponds to multiple programs. The inode client determines whether the software corresponding to the MD5 digest is running on the user endpoint according to the process name and MD5 digest sent by the EAD server. MD5 check rules are as follows: Running Required process Check the name of the process in Windows Task Manager, and check the MD5 digest of the process in the PC software control group. If both are matched, the security check is passed. If they are not matched, the security check fails. Running Forbidden process Check the name of the process in Windows Task Manager, and check the MD5 digest of the process in the PC software control group. If either is matched, the security check fails. If neither is matched, the security check is passed. MD5 Digest MD5 digest for the process. This column contains data only when the check mode for a process is MD5. Description Description of the process. Viewing a process-type PC software control group 2. From the navigation tree, select User Security Policy > PC Software Control Group. The PC software control group list displays all PC software control groups. 3. Click the group name of the PC software control group you want to view. The View PC Software Control Group page appears. 4. Click Back to return to the PC software control group list. Adding a process-type PC software control group 2. From the navigation tree, select User Security Policy > PC Software Control Group. The PC software control group list displays all PC software control groups. 3. Click Add. The Add PC Software Control Group page appears. 4. Configure basic information for the PC software control group. 5. Add a process to the Process List: a. Click Add. The Add Process dialog box appears. b. Enter the process name in the Process Name field. c. Enter the software alias in the Alias field. d. Select an operating system from the Operating System list: Windows, Linux, or Mac OS. e. Select a check type from the Check Type list: Simple, Complex, or MD5. 76

88 When you select the Windows operating system and the MD5 check type, enter the MD5 digest of the process in the MD5 Digest field. You can use the MD5 tool to calculate the MD5 digest of a process. f. Enter a description of the process in the Description field. g. Click OK. 6. Click OK. The process appears in the Software List. The process-type PC software control group you have added now appears in the configuration options when you configure the security policy. For more information, see "Managing security policies." Modifying a process-type PC software control group 2. From the navigation tree, select User Security Policy > PC Software Control Group. The PC software control group list displays all PC software control groups. 3. Click the Modify icon for the process-type PC software control groups you want to modify. The Modify Software Control Group page appears. 4. Modify the basic information for the process-type PC software control group. You cannot modify Group Name, Type, or Service Group. 5. To add a process to the Process List: a. Click Add. The Add Process dialog box appears. b. Enter the process name in the Process Name field. c. Enter the software alias in the Alias field. d. Select an operating system from the Operating System list: Windows, Linux, or Mac OS. e. Select a check type from the Check Type list: Simple, Complex, or MD5. When you select the Windows operating system and the MD5 check type, enter the MD5 digest of the process in the MD5 Digest field. You can use the MD5 tool to calculate the MD5 digest of a process. f. Enter a description of the process in the Description field. g. Click OK. The process appears in the Process List. 6. To modify the process in the Process List. a. Click the Modify icon for the process you want to modify. The Modify Process dialog box appears. b. Modify the process name in the Process Name field. c. Enter the process alias in the Alias field. When an access user fails the access control check, the inode client uses the alias as the name of the process on the Security Check Result page. d. Select an operating system from the Operating System list: Windows, Linux, or Mac OS. e. Select a check type from the Check Type list: Simple, Complex, or MD5. When you select the Windows operating system and the MD5 check type, enter the MD5 digest of the process in the MD5 Digest field. You can use the MD5 tool to calculate the MD5 digest of a process. f. Modify the description of the process in the Description field. g. Click OK. The modified process appears in the Process List. 77

89 7. To delete the process in the Process List: a. Click the Delete icon for the process you want to delete. b. Click OK. 8. Click OK. Deleting a process-type PC software control group For more information about deleting a software-type PC software control group, see "Deleting a PC software control group." Downloading and using the MD5 tool The PC software control group function provides the MD5 tool, which you can use to calculate the MD5 digest of an.exe file, and check the PC software control group configuration. Only Windows operating systems support MD5 check. Each process in a Windows operating system associates with an.exe file. You can identify the.exe files on a user endpoint by MD5 check. To download and use the MD5 tool: 2. From the navigation tree, select User Security Policy > PC Software Control Group. 3. Click the MD5 Tool link at the upper right corner of the PC software control group list area. 4. Download the MD5 tool file: a. Decompress the file FileMD5Digest.zip. b. Double-click FileMD5Digest.exe to run the MD5 tool. c. Click Select Executable File and select an.exe file. d. Click Calculate MD5 Digest. e. Click Copy to copy the MD5 digest to the clipboard. f. Click Close. Managing service-type PC software control groups Service-type PC software control group details The service-type PC software control group details page has a basic information area and a service list area. Basic information contents Group Name Name of the PC software control group. Type Type of the PC software control group, which is Service. Description Description of the PC software control group. Default Action for Check Failure Default action for the PC software control group check failure: Monitor (default) The user is not informed of security problems after going online, and can access the network. Security check results are recorded in the security logs. Inform The user is informed of security problems after going online, the system prompts the user for modification, and the user can access the network. Security check results are recorded in the security logs. Isolate The user is informed of security problems after going online, the system prompts the user to solve the problems, and the user can access the resources in the isolation area according to configured ACL. Security check results are recorded in the security logs. Kick out The user is informed of security problems after going online, fails the authentication, and is forced to log off. Security check results are recorded in the security logs. 78

90 A new PC software control group uses the default action you configured for PC software control group check failure. When you select Global Security Mode in Security Level configuration, the default action of the PC software control group failure is invalid. Service Group Service group to which the PC software control group belongs. Service list information Service Name Name of the service. For the Windows operating system, the service name must be the same as that in Control Panel > All Control Panel Items > Administrative Tools > Services > Properties. For the Linux operating system, the service name must be the same as that after the service --status-all command is executed. For the Mac OS operating system, the service name must be the same as that after the service --list command is executed. Alias Alias of the service. When an access user fails the access control check, the inode client uses the alias as the name of the service on the Security Check Result page. Operating System Operating system type of a process: Windows, Linux, or Mac OS. Process Name Processes on the Linux and Mac OS operating systems. Each service has a corresponding process. The PC software control group checks the services running on the Linux and Mac OS operating systems by process. Description Description of the service. Viewing a service-type PC software control group 2. From the navigation tree, select User Security Policy > PC Software Control Group. The PC software control group list displays all PC software control groups. 3. Click the group name of the PC software control group you want to view. The View PC Software Control Group page appears. 4. Click Back to return to the PC software control group list. Adding a service-type PC software control group 2. From the navigation tree, select User Security Policy > PC Software Control Group. The PC software control group list displays all PC software control groups. 3. Click Add. The Add PC Software Control Group page appears. 4. Configure the basic information for the PC software control groups. 5. Add a service to the Service List: a. Click Add. The Add Service dialog box appears. b. Enter the service information. c. Click OK. 6. Click OK. The service appears in the Service List. The service you have added now appears in the configuration options when you configure the security policy. For more information, see "Managing security policies." Modifying a service-type PC software control group 2. From the navigation tree, select User Security Policy > PC Software Control Group. 79

91 The PC software control group list displays all PC software control groups. 3. Click the Modify icon for the service-type PC software control group you want to modify. The Modify PC Software Control Group page appears. 4. Modify the basic information for the service-type PC software control group. You cannot modify Group Name, Type, or Service Group. 5. Add a service to the Service List: a. Click Add. The Add Service dialog box appears. b. Enter the service information. c. Click OK. The service appears in the Service List. 6. Modify the service in the Service List: a. Click the Modify icon for the service you want to modify. The Modify Service dialog box appears. b. Modify the information. c. Click OK. The modified service appears in the Service List. 7. Delete the service in the Service List: a. Click the Delete icon for the service you want to delete. b. Click OK. 8. Click OK. Deleting a software-type PC software control group For more information about deleting a software-type PC software control group, see "Deleting a PC software control group." Managing file-type PC software control groups File-type PC software control group details The file-type PC software control group details page has a basic information area and a file list area. Basic information contents Group Name Name of the PC software control group. Type Type of the PC software control group, which is File. Description Description of the PC software control group. Default Action for Check Failure Default action for the PC software control group when the check fails: Monitor (default) The user is not informed of security problems after going online, and can access the network. Security check results are recorded in security logs. Inform The user is informed of security problems after going online, the system prompts the user to solve problems, and the user can access the network. Security check results are recorded in security logs. Isolate The user is informed of security problems after going online. The system prompts the user to solve problems, and the user can access resources in the isolation area according to the configured ACL. Security check results are recorded in security logs. Kick out The user is informed of security problems after going online, fails the authentication, and is forced to log off. Security check results are recorded in security logs. 80

92 A new PC software control group uses the default action you configured for PC software control group check failure. When you select Global Security Mode in Security Level configuration, the default action of the PC software control group failure is invalid. Service Group Service group to which the PC software control group belongs. File list information File Path and Name Path and name of the file. Alias Alias of the file. When an access user fails the access control check, the inode client uses the alias as the path and name of the file on the Security Check Result page. Operating System Operating system of a file: Windows, Linux, or Mac OS. Check Type Match mode for the file content check: None No keyword check is performed for the file content. Keyword Include File is matched when the file content contains the specified keyword. Keyword Exclude File is matched when the file content does not contain the specified keyword. Keyword Type Keyword type for the file content check: String or Binary. This field does not appear when None is selected for Check Type. String Used for a text file content check. Binary Used for a file content check for other types of files. Description Description of the file. Viewing a file-type PC software control group 2. From the navigation tree, select User Security Policy > PC Software Control Group. The PC software control group list displays all PC software control groups. 3. Click the group name of the PC software control group you want to view. The View PC Software Control Group page appears. 4. Click Back to return to the PC software control group list. Adding a file-type PC software control group 2. From the navigation tree, select User Security Policy > PC Software Control Group. The PC software control group list displays all PC software control groups. 3. Click Add. The Add PC Software Control Group page appears. 4. Configure basic information for the PC software control group. 5. Add a file to the File List: a. Click Add. The Add File dialog box appears. b. Enter the file path and name in the File Path and Name field. c. Enter the file alias in the Alias field. When an access user fails the access control check, the inode client uses the alias as the path and name of the file on the Security Check Result page. d. Select an operating system from the Operating System list: Windows, Linux, or Mac OS. e. Select a keyword match mode for the file content check: None, Keyword Include, or Keyword Exclude. f. When the keyword match method is Keyword Include or Keyword Exclude, select the keyword type: 81

93 String Used for a text file content check. Binary Used for a file content check of other types of files. g. Enter the keyword in the Keyword field. For a text file, the keyword is in the text file itself. For other types of files, the keyword consists of hexadecimal digits. You can use the file editor to view the file. h. Enter a description of the file in the Description field. i. Click OK. 6. Click OK. The file appears in the File List. The file-type PC software control group you have added now appears in the configuration options when you configure the security policy. For more information, see "Managing security policies." Modifying a file-type PC software control group 2. From the navigation tree, select User Security Policy > PC Software Control Group. The PC software control group list displays all PC software control groups. 3. Click the Modify icon for the file-type PC software control group you want to modify. The Modify PC Software Control Group page appears. 4. Modify the basic information for the file-type PC software control group. You cannot modify Group Name, Type, or Service Group. 5. To add a file to the File List: a. Click Add. = The Add File dialog box appears. b. Enter the file path and name in the File Path and Name field. c. Enter the file alias in the Alias field. When an access user fails the access control check, the inode client uses the alias as the path and name of the file on the Security Check Result page. d. Select an operating system from the Operating System list: Windows, Linux, or Mac OS. e. Select a keyword match mode for the file content check: None, Keyword Include, or Keyword Exclude. f. When the keyword match method is Keyword Include or Keyword Exclude, select the keyword type: String Used for a text file content check. Binary Used for a file content check for other types of files. g. Enter the keyword in the Keyword field. For a text file, the keyword is in the text file itself. For other types of files, the keyword consists of hexadecimal digits. You can use the file editor to view the file. h. Enter a description of the file in the Description field. i. Click OK. The file appears in the File List. 6. To modify the file in the File List: a. Click the Modify icon for the file you want to modify. The Modify File dialog box appears. b. Modify the file path and name in the File Path and Name field. c. Modify the file alias in the Alias field. 82

94 When an access user fails the access control check, the inode client uses the alias of the file as the path and name of the file on the Security Check Result page. d. Select an operating system from the Operating System list: Windows, Linux, or Mac OS. e. Select a keyword match mode for the file content check: None, Keyword Include, or Keyword Exclude. f. When the keyword match method is Keyword Include or Keyword Exclude, select the keyword type: String Used for a text file content check. Binary Used for a file content check of other types of files. g. Enter the keyword in the Keyword field. For a text file, the keyword is in the text file itself. For other types of files, the keyword consists of hexadecimal digits. You can use the file editor to view the file. h. Modify the description of the file in the Description field. i. Click OK. The file appears in the File List. 7. To delete the file in the File List: a. Click the Delete icon for the file you want to delete. b. Click OK. 8. Click OK. Deleting a software-type PC software control group For more information about deleting a software-type PC software control group, see "Deleting a PC software control group." Managing common software The PC software control group function allows you to manage common software. You can query, add, or delete a software product in the common software list. You can also add software information in batches to the common software list. DAM automatically collects information about software installed on registered assets. Common software list contents The common software list has the following parameters: Software Name Name of the software. Alias Alias of the software. When an access user fails the access control check, the inode client uses the alias as the name of the software on the Security Check Result page. Version Number The software version. Description Description of the software. Viewing the common software list 2. From the navigation tree, select User Security Policy > PC Software Control Group. 3. Click the Common Software Definition link at the upper right corner of the PC software control group list area. The common software list is displayed in the main pane of the Common Software Definition page. For more information, see "Common software list content." 4. Click Back to return to the common software list. 83

95 Querying the common software 2. From the navigation tree, select User Security Policy > PC Software Control Group. 3. Click the Common Software Definition link at the upper right corner of the PC software control group list area. 4. Enter your search criteria in the Query Condition area. 5. Click Query. The page displays all common software products that meet the query criteria. 6. To reset both the query values and the search results, and to restore the full common software list, click Reset and re-enter your query criteria. Adding a common software product 2. From the navigation tree, select User Security Policy > PC Software Control Group. 3. Click the Common Software Definition link at the upper right corner of the PC software control group list area. The common software list is displayed in the main pane of the Common Software Definition page. 4. Click Add. The Add Common Software Definition page appears. 5. Configure the common software information. 6. Click OK. The software appears in the common software list. 7. Click Back to return to the common software list. Importing common software in batches DAM allows you to collects software information from users through the inode client. You can use the PC software control group function to import software information to the common software list for configuring a PC software control policy. To import common software in batches: 2. From the navigation tree, select User Security Policy > PC Software Control Group. 3. Click the Common Software Definition link at the upper right corner of the PC software control group list area. The common software list is displayed in the main pane of the Common Software Definition page. 4. Click Import from Asset. The Import Common Software page appears. 5. Enter your query criteria in the Query Condition area: Software Name Enter the software asset name. Software Version Enter the software asset version. Asset Number Enter the software asset number. 6. Click Query. The query result page appears in the common software list and has the following parameters: Software Name Name of the software asset. Software Version Version of the software asset. Assets Installation time of the software asset. 84

96 7. Select the box next to Software Name in the common software list for the software asset you want to import. 8. Click OK. The software appears in the common software list. 9. Click Back to return to the common software list. Deleting a common software product 2. From the navigation tree, select User Security Policy > PC Software Control Group. 3. Click the Common Software Definition link at the upper right corner of the PC software control group list area. The Common Software List is displayed in the main pane of the Common Software Definition page. 4. Select the box next to Software Name in the common software list for the common software you want to delete. A confirmation dialog box appears. 5. Click OK. Managing patch software Access users that use the Linux or Mac OS operating system must use patch software to update patches on the operating system. You can enable patch software control in a security policy. When an access user is authenticated, the inode client checks the patch software on the user endpoint according to the configuration in the security policy. You can configure the patch software as needed. You can specify the patch software to be checked, and then enable patch software check in the security policy. Patch software list contents The Linux Operating System and Mac OS Operating System areas list the patch software supported by the corresponding operating system. The patch software list has the following parameters: Patch Software Name of the patch software. Check Indicates whether the corresponding patch software will be checked. Priority Provides the Move Up icon and Move Down icon for prioritizing items in the list. Configuring patch software management 2. From the navigation tree, select User Security Policy > Patch Control > Patch Software. The patch software list page appears. 3. To check the patch software, select Check for the associated patch software. To cancel checking the patch software, clear Check. 85

97 Managing Windows patches Windows patch check through the Windows server is an automatic check, download, and installation process. You only need to enable Windows patch control check in the security policy. The following information describes Windows patch check configurations on the EAD server, such as querying, adding, modifying, and deleting Windows patches, and managing Windows versions. Users must download and install patches. For access users using Windows for authentication, you can enable Windows patch control in a security policy. Access users can install Windows patches by using the Microsoft server check function or by manually checking patches. Microsoft server check function The inode client collaborates with WSUS or SMS to check for missing patches and the patch level, and installs patches automatically. Manual check The inode client cooperates with the EAD server to check missing patches. You can configure Windows patches to be checked and the patch level. For more information, see "Adding a security policy." Windows patch list contents Patch Name Name of the Windows patch. Message Message for the associated Windows patch. When the inode client detects that the user endpoint lacks a patch, it displays this message. Applicable Windows Version Windows version for the associated Windows patch. Patch Level Patch priority level for the associated Windows patch: Critical, Important, Moderate, or Low. Modify Click the Modify icon to modify the Windows patch. Delete Click the Delete icon to delete the Windows patch. Windows patch information details The Windows patch information details page has the following parameters: Patch Name Enter the patch name (for example, KB , KB ). Message Enter the prompt message. When the inode client detects that the user endpoint lacks the patch, it displays this message. Patch Level Select a patch priority level: Critical, Important, Moderate, or Low. Applicable Windows version list The applicable Windows version list shows the following information for the Windows versions to which the patch applies: Operating System Operating system type: Windows. Version Windows version. Language Language used by the Windows operating system. Patch List Patch list for the associated Windows version. Items in the list of patches are separated by commas. 86

98 Viewing the Windows patch list 2. From the navigation tree, select User Security Policy > Patch Control > Windows Patches. The Windows Patches page appears. 3. To reset the query values and search results, and to restore the full patch list, click Reset. Querying Windows patches 2. From the navigation tree, select User Security Policy > Patch Control > Windows Patches. The Windows Patches page appears. 3. Enter one or more of the following query criteria: Patch Name Enter the patch name. Version Enter the operating system version. Language Enter the language: ALL, Native Language, or English. 4. Click Query. 5. To reset query values and search results, and to restore the full patch list, click Reset. Adding a Windows patch 2. From the navigation tree, select User Security Policy > Patch Control > Windows Patches. The Windows Patches page appears. 3. Click Add. The Add Windows Patch Control page appears. 4. Configure the basic information. Patch Name Enter the patch name (for example, KB , KB ). Message Enter the prompt message. When the inode client detects that the user endpoint lacks the patch, it displays this message. Patch Level Select a patch priority level: Critical, Important, Moderate, or Low. 5. Select an operating system version in the Applicable Windows Version area. 6. Click OK. Modifying a Windows patch 2. From the navigation tree, select User Security Policy > Patch Control > Windows Patches. The Windows Patches page appears. 3. Click the Modify icon for the patch you want to modify. 4. Modify the basic information for the patch. You cannot modify Patch Control Name or Service Group. 5. Select an operating system version in the Applicable Windows Version area. To remove the Windows version, clear Operating System. 6. Click OK. 87

99 Deleting a Windows patch 2. From the navigation tree, select User Security Policy > Patch Control > Windows Patches. The Windows Patches page appears. 3. Click the Delete icon in the patch list for the target patch. A confirmation dialog box appears. 4. Click OK. Managing Windows versions You can configure the applicable Windows versions when you add or modify Windows patches. Windows version list contents Operating System Operating system type. Version Operating system version. Language Language for the associated Windows version. Patch List Patch list for the associated Windows version. Delete Click the Delete icon to delete the Windows version. Viewing a Windows version 2. From the navigation tree, select User Security Policy > Patch Control > Windows Patches. The Windows Patches page appears. 3. Click the Windows Version link at the upper right corner of the patch list. The Windows Versions page appears and displays all Windows versions. 4. Click Refresh to refresh the Windows version list. Adding a Windows version 2. From the navigation tree, select User Security Policy > Patch Control > Windows Patches. The patch list displays all Windows patches. 3. Click the Windows Version link at the upper right corner of the patch list. The Windows Versions page appears and displays all Windows versions. 4. Click Add. 5. The Add Windows Version page appears. To change the Windows version, you must first remove the old configured version, and then enter the correct version. You cannot modify the old configured version without removing it. 6. Configure the basic information for the Windows version: Version Enter the Windows version. The spelling must exactly match that provided by Microsoft, such as XP or Windows 7 Professional Service Pack 1. Language Select one of the following options: 88

100 7. Click OK. All All languages, including English and non-english versions. Native Language All non-english versions. English English version. Deleting a Windows version Only Windows version items without patch configurations can be deleted. To delete items with patches, first delete the patches. To delete a Windows version: 2. From the navigation tree, select User Security Policy > Patch Control > Windows Patches. The patch list displays all Windows patches. 3. Click the Windows Version link at the upper right corner of the patch list. The Windows Versions page appears and displays all Windows versions. 4. Click the Delete icon for the target Windows version. A confirmation dialog box appears. 5. Click OK. Managing registry control policies You can enable registry control in a security policy, and specify the registry controls to be checked. To check the security of an access user, the inode client checks the user endpoint according to the registry control policy configured in the security policy. You can specify the registries and their respective key names or values in the registry control policy. Registry control management allows you to query, view, add, modify, and delete a registry control policy. You can configure a registry control policy as needed. Registry control list contents Registry Control Name Name of the registry control. Click the name to view detailed information. Description Description for the associated registry control. Registry Entry Location Registry entry location for the associated registry control. Default Action for Check Failure A new registry control policy uses the default action you configured for registry control check failure. Monitor (default) The user is not informed about security problems after going online. The user can access the network. Security check results are recorded in security logs. Inform The user is informed of security problems after going online. The system prompts the user solve problems. The user can access the network. Security check results are recorded in security logs. Isolate The user is informed of security problems after going online. The system prompts the user to solve problems. The user can access resources in the isolation area according to the configured ACL. Security check results are recorded in security logs. Kick Out The user is informed of security problems after going online, fails the authentication, and is forced to log off. Security check results are recorded in security logs. When you select Global Security Mode in Security Level configuration, the default action of the registry control check failure is invalid. You can specify whether Global Security Mode is 89

101 used and you can specify the default action for the registry control check failure for each registry control policy. Service Group Service group to which the registry control belongs. Modify Click the Modify icon to modify the registry control. Delete Click the Delete icon to delete the registry control. Registry control list details The registry control list details page has a basic information area and a registry entry area. Basic information area Registry entry area Registry Control Name Name of the registry control. Registry Entry Location Registry entry location for the registry control. Description Description for the associated registry control. Failure Notification (Check Failure Message) Message for the registry control check failure. Default Action for Check Failure Default action for the registry control when the check fails, which can be: Monitor (default) The user is not informed of security problems after going online. The user can access the network. Security check results are recorded in security logs. Inform The user is informed of security problems after going online. The system prompts the user to solve problems. The user can access the network. Security check results are recorded in security logs. Isolate The user is informed of security problems after going online. The system prompts the user to solve problems. The user can access resources in the isolation area according to the configured ACL. Security check results are recorded in security logs. Kick out The user is informed of security problems after going online, fails the authentication, and is forced to log off. Security check results are recorded in security logs. A new registry control uses the default action you configured for registry control check failure. When you select Global Security Mode in Security Level configuration, the default action of the registry control failure is invalid. You can specify whether Global Security Mode is used and you can specify the default action for registry control failure for each registry control. Service Group Service group to which the registry control belongs. Key Name The name of the registry key. When the registry key name is (Default), you must select Default Key. The key type of a default key must be REG_SZ. Alias Alias of the registry key. When an access user fails the registry control check, the inode client uses the alias as the name of the registry key on the Security Check Result page. Check Type Select a match mode: Value Matched, Value Not Matched, Key Existent, or Key Not Existent. Compatible Operating Systems Select an operating system: Win2000, WinXP, Win2003, WinVista, or Win7. Only the selected operating system checks the registry key. Key Value Type Select a key value type: REG_SZ or REG_DWORD. Key Value Enter the key value of the registry key. Failure Notification Enter the failure notification for the registry control. When the registry entry check for an access user fails, this failure notification is displayed on the Security Check Result page. 90

102 Viewing the registry control list 1. Select User Security Policy > Registry Control. The registry control list displays all registry controls. 2. To sort the Registry Control List, click the Registry Control Name, Registry Entry Location, Service Group, or Default Action for Check Failure column label. Viewing a registry control 2. From the navigation tree, select User Security Policy > Registry Control. The registry control list displays all registry controls. 3. Click the name of a registry control to view its information about it. Querying the registry control 2. From the navigation tree, select User Security Policy > Registry Control. The registry control list displays all registry controls. 3. Enter one or both of the following query criteria: Registry Control Name Enter the name of the registry control. Registry Entry Location Enter the location of the registry control. 4. Click Query. The registry control list displays registry controls that match the query criteria. 5. To reset the query values and search results, and to restore the full registry control list, click Reset. Adding a registry control 2. From the navigation tree, select User Security Policy > Registry Control. The registry control list displays all registry controls. 3. Click Add. The Add Registry Control page appears. 4. Configure the basic information. 5. Add a registry entry to the registry control list: a. Click Add. The Add Registry Entry dialog box appears. b. Specify the Registry Entry information. c. Click OK. 6. Click OK. The new registry entry is displayed in the registry control list. The new registry entry appears in the configuration options when you configure the security policy. For more information, see "Managing security policies." 91

103 Modifying a registry control To modify a registry control: 2. From the navigation tree, select User Security Policy > Registry Control. The registry control list displays all registry controls. 3. Click the Modify icon for the target registry control. 4. Modify the basic information. You cannot modify Registry Control Name or Service Group. 5. To add a registry entry to the registry control list: a. Click Add. The Add Registry Entry dialog box appears. b. Specify the Registry Entry information. c. Click OK. The added registry entry is displayed in the registry control list. 6. To modify a registry entry: a. Click the Modify icon for the registry entry. The Modify Registry Entry dialog box appears. b. Modify the Registry Entry information as needed. c. Click OK. The modified registry entry is displayed in the registry control list. 7. To delete a registry entry: a. Click the Delete icon for the registry entry. A confirmation dialog box appears. b. Click OK. 8. Click OK. Deleting a registry control A registry entry cannot be deleted when it is assigned to a security policy. To delete the registry entry, first remove it from the security policy. For more information, see "Modifying a security policy." To delete a registry entry: 2. From the navigation tree, select User Security Policy > Registry Control. The registry control list displays all registry controls. 3. Click the Delete icon for the registry entry. A confirmation dialog box appears. 4. Click OK. Managing share control You can enable share control check for a security policy, and specify a share control policy. When an access user is authenticated, the inode client checks the user endpoint according to the share control policy configured in the security policy. 92

104 Share control policy management allows you to view, add, modify, and delete a share control policy. You can configure a share control policy as needed. Share control list contents Share Control Name Name of the share control. Click the name to view detailed information. Share Indicates whether the share control allows folder sharing. Default Share Indicates whether the share control allows default sharing. Windows XP Simple Share Indicates whether the share control allows Windows XP simple sharing. Service Group Service group to which the share control belongs. Modify Click the Modify icon to modify the share control. Delete Click the Delete icon to delete the share control. NOTE: To sort the share control list, click the Share Control Name, Share, Default Share, Windows XP Simple Share, or Service Group column label. Share control details The share control details page has the following parameters: Share Control Name Name of the share control. Click the name to view detailed information. Service Group Service group to which the share control belongs. Default Action for Check Failure Default action of the share control when the check fails: Monitor (default) The user is not informed of security problems after going online. The user can access the network. Security check results are recorded in security logs. Inform The user is informed of security problems after going online. The system prompts the user solve problems. The user can access the network. Security check results are recorded in security logs. Isolate The user is informed of security problems after going online. The system informs the user to solve problems. The user can access resources in the isolation area according to the configured ACL. Security check results are recorded in security logs. Kick out The user is informed of security problems after going online, fails the authentication, and is forced to log off. Security check results are recorded in security logs. A new share control uses the default action you configured for share control check failure. When you select Global Security Mode in Security Level configuration, the default action of the share control failure is invalid. Description Description for the associated registry control. Allow Share Allows an access user to use the share function. Forbid Default Share Prohibit an access user from using default sharing. This option is available only when the access user is allowed to use the share function. Forbid Windows XP Simple Share Prohibit an access user from using Windows XP simple share. The option is available only when the access user is allowed to use the share function. Exclude Groups or Users from Sharing Folder sharing rights are not assigned to Windows users and groups. Enter the user name and group name to which the share right cannot be assigned. Domain user names are in the format domain name\user name. User names are separated by commas and are case-sensitive. 93

105 Viewing the share control list 2. From the navigation tree, select User Security Policy > Share Control. The share control list displays all share controls. 3. Click Refresh to refresh the share control list. Viewing share control details 2. From the navigation tree, select User Security Policy > Share Control. The share control list displays all share controls. 3. Click the name of the share control you want to view. 4. Click Back to return to the share control list. Adding a share control 2. From the navigation tree, select User Security Policy > Share Control. The share control list displays all share controls. 3. Click Add. The Add Share Control page appears. 4. Configure the basic information. 5. Click OK. The share control appears in the configuration options when you configure the security policy. For more information, see "Managing security policies." Modifying a share control 2. From the navigation tree, select User Security Policy > Share Control. The share control list displays all share controls. 3. Click the Modify icon for the target share control. 4. Modify the share control. You cannot modify Registry Control Name or Service Group. 5. Click OK. Deleting a share control A share control cannot be deleted when it is assigned to a security policy. To delete the share control, first remove it from the security policy. For more information, see "Modifying a security policy." To delete a share control: 2. From the navigation tree, select User Security Policy > Share Control. The share control list displays all share controls. 3. Click the Delete icon for the target share control. 94

106 A confirmation dialog box appears. 4. Click OK. Managing traffic control You can specify a traffic control policy for a security policy. When an access user passes authentication, the inode client periodically checks traffic on the user endpoint according to the traffic control policy configured in the security policy. You can configure the sampling interval, IP traffic monitoring, broadcast monitoring, packet number monitoring, and TCP/UDP connection monitoring in the traffic control policy. Traffic control policy management allows you to view, add, modify, and delete a traffic control policy. You can configure a traffic control policy as needed. Traffic control list contents Name Name of the traffic control. Click the name to view detailed information. Description Description for the associated traffic control. Service Group Service group to which the traffic control belongs. Modify Click the Modify icon to modify the traffic control. Delete Click the Delete icon to delete the traffic control. Traffic control details The traffic control details page has the following areas: Basic information IP Traffic Monitoring Broadcast Packet Monitoring Packet Monitoring Basic information area TCP/UDP Connection Monitoring Name Name of the traffic control. Sampling Interval Traffic sampling interval on the inode client. Description Description for the associated traffic control. Service Group Service group to which the traffic control belongs. IP Traffic Monitoring area Monitor IP Traffic Indicates whether IP traffic monitoring is enabled for the traffic control. Minor Threshold Minor threshold for IP traffic abnormality. Severe Threshold Severe threshold for IP traffic abnormality. Broadcast Packet Monitoring area Monitor Broadcast Packets Indicates whether broadcast packet monitoring is enabled for the traffic control. Minor Threshold Minor threshold for abnormal broadcast packets. Severe Threshold Severe threshold for abnormal broadcast packets. 95

107 Packet Monitoring area Monitor Packets Indicates whether packet monitoring is enabled for the traffic control. Minor Threshold Minor threshold for abnormal packets. Severe Threshold Severe threshold for abnormal packets. TCP/UDP Connection Monitoring area Monitor TCP/UDP Connections Indicates whether TCP/UDP connection monitoring is enabled for the traffic control. Minor Threshold Minor threshold for abnormal TCP/UDP connections. Severe Threshold Severe threshold for abnormal TCP/UDP connections. Viewing the traffic control list 2. From the navigation tree, select User Security Policy > Traffic Control. The traffic control list displays all traffic controls. 3. Click Refresh to refresh the traffic control list. 4. To sort the traffic control list, click the Name, Share, or Service Group column label. Viewing traffic control details 2. From the navigation tree, select User Security Policy > Traffic Control. The traffic control list displays all traffic controls. 3. Click the name of the traffic control to view its information about it. 4. Click Back to return to the traffic control list. Adding a traffic control 2. From the navigation tree, select User Security Policy > Traffic Control. The traffic control list displays all traffic controls. 3. Click Add. 4. Configure the basic information. 5. Enter a Minor Threshold and Severe Threshold for each type of monitoring that must be enabled: Monitor IP Traffic Monitor Broadcast Packets Monitor Packets Monitor TCP/UDP Connections 6. Click OK. The traffic control appears in the configuration options when you configure the security policy. For more information, see "Managing security policies." 96

108 Modifying a traffic control 2. From the navigation tree, select User Security Policy > Traffic Control. The traffic control list displays all traffic controls. 3. Click the Modify icon for the target traffic control. 4. Modify the basic information. You cannot modify the name or service group. 5. Modify the parameters for each monitoring category of as needed (Monitor IP Traffic, Monitor Broadcast Packets, Monitor Packets, and Monitor TCP/UDP Connections): Select a monitoring category to disable it. Unselect a monitoring category to enable it. Modify each minor threshold or major threshold as needed. 6. Click OK. Deleting a traffic control A traffic control cannot be deleted when it is assigned to a security policy. To delete the traffic control, first remove it from the security policy. For more information, see "Modifying a security policy." To delete a traffic control: 1. Select User Security Policy > Traffic Control. The traffic control list displays all traffic controls. 2. Click the Delete icon for the target share control. A confirmation dialog box appears. 3. Click OK. Managing password control You can enable password control for a security policy. When an access user is authenticated, the inode client checks the password according to the built-in password check rules and password dictionary, and determines the security of the password. Password check rules are built into the inode client. You only need to specify the password dictionary. The default password dictionary includes common weak passwords, such as names and company IDs. You can define new passwords as needed to enhance your system security. Modifying the password dictionary The uploaded password dictionary file is stored in the installation path of the user self-service center. Install the user self-service center before you can modify the password dictionary and monitor the operating system password. To modify the password dictionary: 2. From the navigation tree, select User Security Policy > Password Control. 3. In the Modify Password Dictionary area, perform the following steps: a. Click the download link next to the Download URL field to download the current password dictionary. b. Use a text editor to add user-defined weak passwords to the password dictionary file. 97

109 The file name must be PasswordDic.txt. Each line in the file contains one password. The file size cannot exceed 2 MB. c. Select Upload Password Dictionary. The Password Dictionary File field appears. d. Click Browse next to Password Dictionary File to locate and select the previously edited password dictionary file, and then click OK. e. From the Default Action for Check Failure list, select the default action for password check failure. A new password control uses the default action you configured for password control check failure. 4. Click OK. Monitor (default) The user is not informed of security problems after going online. The user can access the network. Security check results are recorded in security logs. Inform The user is informed of security problems after going online. The system prompts the user to solve problems. The user can access the network. Security check results are recorded in security logs. Isolate The user is informed of security problems after going online. The system prompts the user to solve problems. The user can access resources in the isolation area according to the configured ACL. Security check results are recorded in security logs. Kick Out The user is informed of security problems after going online. The authentication fails and the user is logged off. Security check results are recorded in security logs. Blacklist and Kick Out The user is informed of security problems after going online. The authentication fails and the user is added to the blacklist and logged off. Security check results are recorded in security logs. Modifying the local password policy The local password policy is used to control the length and complexity of passwords, password expiration, and password history on PCs. It is the same as the password policy in Windows local security settings. To modify the local password policy: 2. From the navigation tree, select User Security Policy > Password Control. The Password Control page appears. 3. In the Modify Local Password Policy area, perform the following steps: a. Select Enable Local Password Policy. b. Select Password must meet complexity requirements to enforce the following restrictions for new passwords configured on the PCs: A password cannot contain the user's account name or more than two consecutive characters in the user's full name. A password must contain at least six characters in length. A password must contain at least three of the following character types: uppercase letters, lowercase letters, digits, and special characters. c. Configure the following parameters: Minimum Password Length Specifies the least number of characters that a password must contain. The value range is 0 to 14. The value of 0 indicates that no password is required. 98

110 4. Click OK. NOTE: Maximum Password Age (days) Specifies the maximum time period that a password can be used before being changed. The value range is 0 to 999 days. The value of 0 indicates that passwords never expire. Minimum Password Age (days) Specifies the minimum time period that a password must be used before being changed. The value range is 0 to 998 days. The value of 0 enables immediate password changes. If the maximum password age is not 0, the minimum password age must be less than the maximum password age. If the maximum password age is 0, the value range of the minimum password age is 0 to 998. Enforce Password History Specifies the number of unique passwords that a user account must have used before reusing an old password. The value range is 0 to 24. For this parameter to take effect, the minimum password age cannot be 0. The local password policy does not take effect on domain users. Performing security check by using security policies Configuring real-time monitoring With the real-time monitoring function, the inode client interacts with the EAD server to perform a periodic security check for online users. To ensure network security, the inode client immediately processes any violation or abnormality detected on the user endpoint. The following check items support real-time monitoring. Operators must select the check items in the security policy in order to have them monitored in real time. The check items include: Anti-virus software Anti-spyware software Firewall software Anti-phishing software Hard disk encryption software PC software control groups Registries Share directories The following check items do not support real-time monitoring: Windows patches Asset registration status Windows system restore Traffic monitoring Operating system password With the exception of Windows patches, these items are checked at a system-defined interval that cannot be modified. To ensure the efficiency of EAD security checking, operators can define the interval at which Windows patches are checked in the service parameter configuration. Enabling real-time monitoring 99

111 2. From the navigation tree, select User Security Policy > Security Policy. The security policy list displays all security policies. 3. Click the Modify icon for the security policy to enable real-time monitoring. The Modify Security Policy page appears. 4. Configure the following parameters in the Basic Information area: Monitor in Real Time Select this option to enable real-time monitoring of user endpoints in the security policy. Process After Specify the amount of time, in minutes, that the inode client waits before it isolates or kicks out an access user for whom a violation is detected in real-time monitoring. The inode client prompts the user to make the necessary remediation and initiate a new security check to avoid being isolated or kicked out. This option is available only when the Monitor in Real Time option is selected. 5. Click OK. Modifying the real-time monitoring parameters Operators can modify the Real-time Monitor Interval parameter in the service parameter configuration to ensure both the efficiency of real-time monitoring and the performance of the user endpoint and EAD server. EAD can forcibly check items that do not support real-time monitoring for users who stay online for a long time. To do this, modify the Reauthentication Interval parameter in the service parameter configuration. To modify the real-time monitoring parameters: 2. From the navigation tree, select User Security Policy > Service Parameters > System Settings. The System Parameters Config page appears. 3. Modify the following real-time monitoring parameters: Real-Time Monitor Interval Enter the interval, in seconds, at which real-time security checks are performed. The default setting is 60 seconds. Reauthentication Interval Enter the interval, in hours, at which an online user is forced to be reauthenticated. The default setting is 24 hours. 4. Click OK. Configuring the default security policy for roaming users For roaming users, the EAD server on the visited network, not the local EAD server, checks for security items. You can configure only one security policy as the default security policy for roaming users. The default security policy shows the [Default policy for roaming users] tag in the Policy Name field on the Security Policy List. To set the default security policy for roaming users: 2. From the navigation tree, select User Security Policy > Security Policy. The security policy list displays all security policies. 3. Click the Modify icon for the security policy you want to set as the default policy for roaming users. The Modify Security Policy page appears. 4. In the Basic Information area, select Set as Default Policy for Roaming Users. 100

112 5. Click OK. Assigning security policies When an endpoint user accesses the network, UAM determines the access scenario of the user and sends the matching security policy to the inode client on the user's endpoint. If the user matches no other access scenario, the default security policy is used. The inode client performs security checks on the user endpoint according to the received security policy. Assigning the default security policy to a service You can assign a security policy to a service as the default security policy. When a user matches no other access scenarios defined for the access policies of the service, EAD deploys the default security policy to the user. To assign the default security policy to a service: 2. From the navigation tree, select User Access Policy > Access Service. The access service list displays all access services. 3. Click the Modify icon for the access service to which you want to assign a default security policy. The Modify Access Service page appears. 4. In the Basic Information area, select the security policy you want to assign to the service from the Default Security Policy list. Or select Do not use to disable security checks on users matching no access scenarios in the service. 5. Click OK. Assigning a security policy to an access policy You can assign a security policy to individual access policies in a service. When a user matches the access scenario defined for an access policy, EAD deploys the matching security policy to the user. To assign a security policy to an access policy in a service: 2. From the navigation tree, select User Access Policy > Access Service. The service list displays all services. 3. Click the Modify icon for the target service. The Modify Service Configuration page appears. 4. In the Access Scenario List area, click the Modify icon for the access scenario to which you want to assign a security policy. The Modify Access Scenario page appears. 5. Select a security policy from the Security Policy list or select Do Not Use to disable security checks on users matching the access scenario of the policy. 6. Click OK. The Modify Access Scenario page closes. 7. Click OK. 101

113 Configuring Internet access control Overview The Internet access control feature is used when enterprise network users or PCs access the Internet through a wired or wireless network not provided by the enterprise. This feature is supported only on Windows PCs. Depending on the user authentication or authorization status, users' Internet access can be classified into the following types: Authorized Internet access Users are authorized to access the Internet through a network other than the enterprise network. Internet access audit policies are used to monitor and audit the users' Internet access behaviors. Unauthorized Internet access Users gain unauthorized access to the Internet through a network other than the enterprise network. Client ACLs can be configured to prevent unauthorized Internet access. Authenticated Internet access Users access the Internet by using multiple NICs at the same time after they pass the identity authentication on the enterprise network. Unauthenticated Internet access Users access the Internet without passing the identity authentication on the enterprise network. Unauthenticated Internet access typically occurs outside the enterprise network. EAD's Internet access control feature provides the following functions: Implement ACL-based access control to prevent unauthorized or unauthenticated access to the Internet. Monitor authenticated Internet access of users. Monitor unauthenticated Internet access of users. To implement Internet access control, EAD must work with inode clients that support the Lock Internet Access Ability feature. When access users are assigned Internet access control services, they can no longer access the network by using inode clients that do not support the Lock Internet Access Ability feature. Internet access control methods Internet access control is based on policies that use either or both of the following control methods: State-Based Internet Access Control When a user comes online, EAD deploys an online ACL and an offline ACL to the inode client on the user's PC. The online ACL applies to authenticated Internet access and controls all NICs on the PC except the NIC that is connected to the enterprise network. The offline ACL applies to unauthenticated Internet access and controls all NICs on the PC. Ping-Based Internet Access Control EAD deploys the offline ACLs named Offline Host ACL for Ping Success and Offline Host ACL for Ping Failure for ping-based Internet access control. Operators can configure up to two destinations IP addresses to be pinged from the inode client. The inode client selects the offline ACL based on the ping results to apply to the PC's NICs: When one of the destination IP addresses can be pinged, the Offline Host ACL for Ping Success applies. The PC is considered to be within the enterprise network. When neither of the destination IP addresses can be pinged, the Offline Host ACL for Ping Failure applies. The PC is considered to be outside the enterprise network. 102

114 Client ACLs Client ACLs are configured in EAD and used by both the state-based and ping-based Internet access control methods. The client ACLs are deployed together with the Internet access policy to the inode client when a user comes online. The inode client then applies the correct ACLs to the NICs on the user's PC according to the Internet access control methods configured in the policy. A default client ACL must be configured for the lock Internet access function when the installation package of the inode client was customized in inode Management Center. The default ACL permits or denies all network access. It takes effect when the inode client is installed on the PC. When EAD deploys an offline ACL, the default ACL is overridden. For more information about configuring client ACLs, see "Managing client ACLs." Audit of unauthenticated Internet access EAD provides the Ping Monitor Server for Offline Audit feature to monitor the Internet access behaviors of PCs that did not pass identity authentication by the enterprise network. When none of the client connections are active, the inode client periodically pings the monitor servers specified in the Internet access policy that is received from EAD. If a monitor server can be pinged, the inode client considers that the PC is accessing the Internet and generates an offline audit log. When the PC comes online, the inode client sends the Internet access audit log stored on the local PC to EAD. Audit of authenticated Internet access Use Internet access audit policies to monitor the Internet access behaviors of users who pass identity authentication by the enterprise network. An Internet access audit policy is a set of ACL rules for generating Internet access audit logs. When a user's Internet access behavior matches a rule for audit, the inode client generates an Internet access audit log. The generated logs are sent to EAD at regular intervals for audit. Internet access audit logs EAD classifies Internet access audit logs into the following types: Online audit logs Records Internet access behaviors of users through networks other than the enterprise network when users are online. The users appear on the online user list of UAM. Offline audit logs Records Internet access behaviors for PCs when users are offline. EAD enables you to search for Internet access audit logs through basic or advanced queries. Internet access logging parameters In system parameter settings, specify the lifetime of an Internet access audit log and the maximum number of Internet access audit logs to be kept in EAD. When an Internet access audit log expires or the number of Internet access audit logs exceed the limit, EAD automatically removes the oldest logs to accommodate new logs. This also helps improve log query efficiency and prevents accumulated Internet access logs from degrading system performance. Managing Internet access policies An Internet access policy includes the following configurations: Internet access control methods 103

115 Client ACLs to be deployed to the inode client Audit settings for unauthenticated Internet access (Ping Monitor Server for Offline Audit) Audit settings for authenticated Internet access (Internet Access Audit) Viewing the Internet access policy list 2. From the navigation tree, select User Security Policy > Endpoint Access Control > Internet Access Policy. The Internet Access Policy page appears. Internet access policy list contents Internet Access Policy Name Name of the Internet access policy. Click the name to view detailed information. Service Group Service group to which the Internet access policy belongs. Description Description of the Internet access policy. Modify Click the Modify icon to modify the Internet access policy. Delete Click the Delete icon to delete the Internet access policy. 3. Click Refresh to refresh the Internet access policy list. Viewing Internet access policy details 2. From the navigation tree, select User Security Policy > Endpoint Access Control > Internet Access Policy. The Internet Access Policy page appears. 3. Click the name of an Internet access policy to view detailed information. The page showing detailed information about the Internet access policy appears. Internet access policy details Basic Information Internet Access Policy Name Name of the Internet access policy. Service Group Service group to which the Internet access policy belongs. Description Description of the Internet access policy. Internet access policy Information State-Based Internet Access Control Select this option to enable state-based Internet access control. The following parameters appear only when this option is selected: All but Authenticated NIC Select the ACL to apply to all NICs except the NIC connected to the enterprise network. An empty field indicates that no ACL is configured. Unauthenticated Hosts Select the ACL to apply to all NICs on the PC when none of the connections in the inode client are active. If no ACL is specified, the most recent ACL deployed to the inode client is used. If no ACL has been deployed, the default ACL is used to control Internet access. Ping-Based Internet Access Control Select this option to enable ping-based Internet access control. The following parameters appear only when this option is selected: Destination IP Address 1/Destination IP Address 2 Configure one or both of the IP addresses to be pinged by the inode client. Offline Host ACL for Ping Success Select the ACL to apply when a destination IP address is successfully pinged. 104

116 Offline Host ACL for Ping Failure Select the ACL to apply when neither of the destination IP addresses can be pinged. Ping Monitor Server for Offline Audit Select this option to enable ping-based Internet access audit for unauthenticated Internet access. The following parameters appear only when this option is selected: Monitor Server IP Specify a list of IP addresses to be pinged by the inode client. Maximum Records Specify the maximum number of ping success records that can be stored by the inode client. Ping Interval (minutes) specify the interval, in minutes, at which the inode client pings the specified IP addresses. Enable Internet Access Audit Select this option to enable audit for authenticated Internet access. The following parameters appear only when this option is selected: Audit Policy Name of the Internet access audit policy used by the Internet access policy. Report Interval (minutes) Specify the interval, in minutes, at which the inode client sends Internet access audit logs to EAD. 4. Click Back to return to the Internet Access Policy page. Adding an Internet access policy 2. From the navigation tree, select User Security Policy > Endpoint Access Control > Internet Access Policy. The Internet Access Policy page appears. 3. Click Add. The Add Internet Access Policy page appears. 4. Configure the basic information for the Internet access policy: Internet Access Policy Name Enter the Internet access policy name. Service Group Select the service group to which the Internet access policy belongs. Description Enter the description of the Internet access policy. A detailed description can help facilitate maintenance. State-Based Internet Access Control Select this option to enable state-based Internet access control. The following parameters appears when this option is selected: All but Authenticated NIC Select the ACL to apply to all NICs except the NIC connected to the enterprise network. An empty field indicates that no ACL is configured. Unauthenticated Hosts Select the ACL to apply to all NICs on the PC when none of the connections in the inode client are active. If no ACL is specified, the most recent ACL deployed to the inode client is used. If no ACL has been deployed, the default ACL is used to control Internet access. Ping-Based Internet Access Control Select this option to enable ping-based Internet access control. The following parameters appears only when this option is selected: Destination IP Address 1/Destination IP Address 2 Configure one or both of the IP addresses to be pinged by the inode client. Offline Host ACL for Ping Success ACL to apply when a destination IP address is successfully pinged. Offline Host ACL for Ping Failure ACL to apply when neither of the destination IP addresses can be pinged. 105

117 Ping Monitor Server for Offline Audit Select this option to enable ping-based Internet access audit for unauthenticated Internet access. The following parameters appear only when this option is selected: Monitor Server IP Specify a list of IP addresses to be pinged by the inode client, one per line. Maximum Records Specify the maximum number of ping success records that can be stored by the inode client. When the limit is exceeded, the inode client overwrites old records with new records. Ping Interval (minutes) Specify the interval, in minutes, at which the inode client pings the specified IP addresses. Enable Internet Access Audit Select this option to enable audit for authenticated Internet access. The following parameters appears only when this option is selected: 5. Click OK. Audit Policy Name of the audit policy to be used by the Internet access policy. For information about configuring audit policies, see "Managing Internet access audit policies." Report Interval (minutes) Specify the interval, in minutes, at which the inode client sends Internet access audit logs to EAD. The value range is 10 to 60 and the default is 30. The inode client reports the Internet access audit logs to EAD at the specified interval and when the user logs off. Internet access policies use client ACLs. For more information, see "Managing client ACLs." Modifying an Internet access policy 2. From the navigation tree, select User Security Policy > Endpoint Access Control > Internet Access Policy. The Internet Access Policy page appears. 3. Click the Modify icon for the Internet access policy you want to modify. The page for modifying the Internet access policy appears. 4. Modify the Internet access policy parameters. You can modify all parameters except Service Group. 5. Click OK. Deleting an Internet access policy An Internet access policy cannot be deleted when it is assigned to an access service. To delete the policy, first remove it from the access service. For more information, see "Applying Internet access policies." To delete an Internet access policy: 2. From the navigation tree, select User Security Policy > Endpoint Access Control > Internet Access Policy. The Internet Access Policy page appears. 3. Click the Delete icon for the Internet access policy you want to delete. A confirmation dialog box appears. 4. Click OK. 106

118 Managing Internet access audit policies An Internet access audit policy specifies the rules for generating Internet access audit logs, which apply only to authenticated users. EAD enables you to configure and deploy Internet access audit policies to inode clients. Each inode client checks the users' Internet access packets according to the specified audit policy and periodically reports the matching audit logs. EAD enables you to view, add, modify, and delete an Internet access audit policy. Viewing the Internet access audit policy list 2. From the navigation tree, select User Security Policy > Endpoint Access Control > Internet Access Audit. The Internet access audit policy list displays all Internet access audit policies. Internet access audit policy list contents Policy Name Internet access audit policy name. Click the name to view detailed information. Service Group Service group to which the Internet access audit policy belongs. Description Description of the Internet access audit policy. Modify Click the Modify icon to modify the Internet access audit policy. Delete Click the Delete icon to delete the Internet access audit policy. 3. Click Refresh to refresh the Internet access audit policy list. Viewing Internet access audit policy details 2. From the navigation tree, select User Security Policy > Endpoint Access Control > Internet Access Audit. The Internet access audit policy list displays all Internet access audit policies. 3. Click the name of an Internet access audit policy to view detailed information. The page showing detailed information about the Internet access audit policy appears. Internet access audit policy details Basic Information Name Name of the Internet access audit policy. Default Action Action to take for packets that do not match any ACL rule, Audit or Not Audit. Description Description of the Internet access audit policy. Service Group Service group to which the Internet access audit policy belongs. Audit ACL Rule List Enable Audit Specify whether the inode client generates Internet access audit logs to EAD when the ACL rule is matched. Protocol Transport layer protocol identified by its name or number. Destination IP/Mask Destination network IP address and mask length. The value of matches all IP addresses. Destination Port Specify the destination port number. 4. Click Back to return to the Internet access audit policy list. 107

119 Adding an Internet access audit policy 2. From the navigation tree, select User Security Policy > Endpoint Access Control > Internet Access Audit. The Internet access audit policy list displays all Internet access audit policies. 3. Click Add. The Add Internet Access Audit page appears. 4. Configure the following basic information: Name Enter the name of the Internet access audit policy. Default Action Configure whether Internet access audit logs are generated by the inode client for packets that do not match any ACL rule. Options are Audit and Not Audit. Description Enter a description of the Internet access audit policy. Service Group Select the service group to which the Internet access audit policy belongs. 5. Add an audit ACL rule to the Internet access audit policy: a. In the Audit ACL Rule List area, click Add. The Add Audit ACL Rule page appears. b. Configure the following parameters for the audit ACL rule: c. Click OK. Enable Audit Configure whether Internet access audit logs are generated by the inode client for packets that match the ACL rule. Options are Audit and Not Audit. Protocol Select the name or number of the transport layer protocol. Destination IP/Mask Specifies the destination network IP address and mask length. The value of matches all IP addresses. Destination Port Specifies the destination port number. 6. Repeat step 5 to add more audit ACL rules. 7. Adjust the priority of the ACL rules: Click the Move up icon to increase the priority of the audit ACL rule. Click the Move down icon to reduce the priority of the audit ACL rule. The audit ACL rules displayed in the Audit ACL Rule List are in descending order of priority. The rule with a higher priority is matched against first. After a match is found for a packet, the remaining rules are ignored. 8. Click OK. Modifying an Internet access audit policy 2. From the navigation tree, select User Security Policy > Endpoint Access Control > Internet Access Audit. The Internet access audit policy list displays all Internet access audit policies. 3. Click the Modify icon for the Internet access audit policy you want to modify. The page for modifying the Internet access audit policy appears. 4. Modify the basic information for the Internet access audit policy. You can modify all the parameters except Policy Name and Service Group. 5. Modify the audit ACL rules of the Internet access audit policy: 108

120 a. Click the Modify icon for an audit ACL rule to modify its settings. b. Click the Delete icon to delete an audit ACL rule. c. Click the Move up icon to increase the priority of an audit ACL rule. d. Click the Move down icon to reduce the priority of an audit ACL rule. 6. Click OK. Deleting an Internet access audit policy An Internet access audit policy cannot be deleted when it is assigned to an Internet access policy. To delete the audit policy, first remove it from the Internet access policy. For more information, see "Adding an Internet access policy." To delete an Internet access audit policy: 2. From the navigation tree, select User Security Policy > Endpoint Access Control > Internet Access Audit. The Internet access audit policy list displays all Internet access audit policies. 3. Click the Delete icon for the Internet access audit policy you want to delete. A confirmation dialog box appears. 4. Click OK. Managing Internet access audit logs The online audit logs and offline audit logs are managed separately for Internet access behaviors. Viewing the online audit log list 2. From the navigation tree, select User Access Log > Internet Access Audit Log. The Online Audit List displays all online audit logs. Online Audit List contents Account Name Account name used by the online user to access the Internet. User Name Name of the IMC Platform user associated with the access user account. Start Time (Server) Logging start time recorded by the EAD server. End Time (Server) Logging end time recorded by the EAD server when the EAD server received the Internet access audit log. Destination IP Destination IP address the online user accessed. Source IP Source IP address used by the online user to access the Internet. Destination Port Destination port accessed by the online user. Protocol Number Transport layer protocol number. Common transport layer protocol numbers are 1 (ICMP), 6 (TCP), and 17 (UDP). NIC Name Name of the NIC used by the online user to access the Internet. MAC Address MAC address used by the online user to access the Internet. Packet Number Total number of packets sent by the online user that match the ACL rule for auditing. Details Click the Details icon to view detailed information about an online audit log. 109

121 Querying online audit logs Basic query Advanced query From the navigation tree, select Access User View > Log Management > Internet Access Audit Log. The Online Audit List displays all online audit logs. 2. Specify one or more of the following query criteria: Account Name Enter a partial or complete account name used by the online user to access the Internet. User Name Enter a partial or complete name of the IMC Platform user with which the access user account is associated. Start Time (Server) From/To Specify the range of the logging start time, recorded by the EAD server, in the format of YYYY-MM-DD hh:mm. You can manually enter the time range, or click the Calendar icon to select the time range. The default is 00:00 to 23:59. Destination IP From/To Specify the destination IP address range the online user accessed. Empty fields are ignored. 3. Click Query. The Online Audit List displays all online audit logs that match the query criteria. Click Reset to clear the query criteria and display all online audit logs. 2. From the navigation tree, select Access User View > Log Management > Internet Access Audit Log. The Online Audit List displays all online audit logs. 3. Click Advanced Query at the upper right of the query area. 4. Specify one or more of the following query criteria: Account Name Enter a partial or complete account name used by the online user to access the Internet. User Name Enter a partial or complete name of the IMC Platform user with which the access user account is associated. User Group Click the User Group icon. On the Select User Group page that appears, select the user group to which the online user belongs and click OK. Service Name Enter the name of the service used by the online user. Start Time (Server) From/To Specify the logging time range recorded by the EAD server, in the format of YYYY-MM-DD hh:mm. You can manually enter the time range, or click the Calendar icon to select the time range. The default range is 00:00 to 23:59. Start Time (Client) From/To Specify the logging time range recorded by the inode client, in the format of YYYY-MM-DD hh:mm. You can manually enter the time range, or click the Calendar icon to select the time range. Destination IP From/To Specify the destination IP address range the online user accessed. Destination Port From/To Specify the destination port range the online user accessed. Source IP From/To Specify the source IP address range of the online user. Packet Number From/To Specify a range for the total number of packets sent by the online user that matches ACL rules for auditing. 110

122 Protocol Number Select the number of the transport layer protocol used by the online user to access the Internet. NIC Name Enter a partial or complete name of the NIC used by the online user to access the Internet.. MAC Address Enter a partial or complete MAC address used by the online user to access the Internet. Valid MAC address formats are XX-XX-XX-XX-XX-XX, XXXX-XXXX-XXXX, and XX:XX:XX:XX:XX:XX. Empty fields are ignored. 5. Click Query. The Online Audit List displays all online audit logs that match the query criteria. Click Reset to clear all the query criteria and display all online audit logs. Viewing online audit log details 2. From the navigation tree, select Access User View > Log Management > Internet Access Audit Log. The Online Audit List displays all online audit logs. 3. Click the Details icon for an online audit log to view detailed information. The page displays detailed information about the online audit log with the following parameters: Account Name Account name used by the online user to access the Internet. User Name Name of the IMC Platform user with which the access user account is associated. Service Name Name of the service used by the online user. User Group User group to which the online user belongs. Start Time (Server) Logging start time recorded by the EAD server. End Time (Server) Logging end time recorded by the EAD server, which is the time when the EAD server received the log. Start Time (Client) Logging start time recorded by the inode client. End Time (Client) Logging end time recorded by the inode client. Destination IP Destination IP address the online user accessed. Source IP Source IP address used by the online user. Destination Port Destination port accessed by the online user. Protocol Number Number of the transport layer protocol used by the online user. Common transport layer protocol numbers include 1 (ICMP), 6 (TCP), and 17 (UDP). NIC Name Name of the NIC used by the online user to access the Internet. MAC Address MAC address used by the online user to access the Internet. Packet Number Total number of packets sent by the user that match the ACL rule whose Enable Audit is set to Audit. 4. Click Back to return to the online audit log List. Viewing the offline audit log list 2. From the navigation tree, select User Access Log > Internet Access Audit Log. 3. Click the Offline Audit tab. The Offline Audit List displays all offline audit logs. Offline Audit List contents 111

123 Account Name Account name of the user to pass identity authentication by the enterprise network. User Name Name of the IMC Platform user associated with the access user account. MAC Address MAC address used by the PC to access the Internet. Monitor Time Time when the inode client generated the ping success record. Reachable IP IP address that can be pinged by the inode client. Querying offline audit logs 2. From the navigation tree, select Access User View > Log Management > Internet Access Audit Log. 3. Click the Offline Audit tab. The Offline Audit List displays all offline audit logs. 4. Specify one or more of the following query criteria: Account Name Enter a partial or complete account name of the user to pass identity authentication by the enterprise network. User Name Enter a partial or complete name of the IMC Platform user with which the access user account is associated. Start Time From/To Specify the time range when the user's Internet access started, in the format of YYYY-MM-DD hh:mm. You can manually enter the time range, or click the Calendar icon to select the time range. The default is 00:00 to 23:59. User Group Click the User Group icon. On the Select User Group dialog box, select the user group to which the offline user belongs and click OK. MAC Address Enter a partial or complete MAC address used to access the Internet. Valid MAC address formats are XX-XX-XX-XX-XX-XX, XXXX-XXXX-XXXX, and XX:XX:XX:XX:XX:XX. Reachable IP Specify the monitor server IP address that can be pinged by the inode client. Empty fields are ignored. 5. Click Query. The Offline Audit List displays all offline audit logs that match the query criteria. Click Reset to clear the query criteria and display all offline audit logs. Configuring Internet access logging parameters In system parameter settings, specify the lifetime of an Internet access audit log and the maximum number of Internet access audit logs that are kept by the system. These settings help improve log query efficiency and prevent accumulated Internet access logs from degrading system performance. To configure Internet access logging parameters: 2. From the navigation tree, select User Security Policy > Service Parameters> System Settings. The System Settings page appears. 3. Configure the Internet access log keeping parameters: Internet Access Audit Log Keeping Time (Days) Specify the maximum number of days an Internet access audit log will be stored. The system automatically deletes logs whose lifetime exceeds the specified keeping time every morning. The default is 30 days. 112

124 Max Internet Access Audit Logs (10000) Specify the maximum number of Internet access audit logs (in increments of ten thousand) that will be stored. The system automatically deletes the oldest logs when the specified number is reached. The default is ten million. 4. Click OK. Applying Internet access policies To apply an Internet access policy, perform one of the following tasks: Configure the policy as the default Internet access policy for a service. Assign the policy to an access scenario in a service. When a user comes online, EAD deploys the correct Internet access policy among other service settings to the inode client of the user: If the user does not match any of the access scenarios in the service, the default Internet access policy in the service takes effect. If the user matches an access scenario in the service, the access policy defined in the matching access scenario takes effect. Configuring the default Internet access policy for an access service 2. From the navigation tree, select User Security Policy > Access Service. The Access Service page appears. 3. Click the Modify icon for the target access service. The page for modifying the access service appears. 4. In the Basic Information area, select the Internet access policy you want to assign to the access service from the Default Internet Access Policy list. Or select Do not use to apply no default Internet access policy. 5. Click OK. Assigning an Internet access policy to an access scenario 2. From the navigation tree, select User Security Policy > Access Service. The Access Service page appears. 3. Click the Modify icon for a service. The page for modifying the service appears. 4. In the Access Scenario List, click the Modify icon for the access scenario to which you want to assign an Internet access policy. The Modify Access Scenario page appears. 5. Select the Internet access policy from the Internet Access Policy list. Or select Do not use to assign no Internet access policy to the scenario. 6. Click OK. 113

125 Configuring the security check for smart devices EAD implements the security check on smart devices by working with a third-party MDM solution of the C/S structure. The MDM client runs on smart devices to register with the MDM server. The MDM server provides management functions such as application pushing and security control. The MDM server provides a Web-based API interface, through which EAD cooperates with the MDM server to implement the security check on smart devices. EAD supports the following MDM vendors: MobileIron and Citrix. For more information about deploying and using MDM solutions, see the documentation provided by the vendors. Similar to the PC security check, EAD implements the security check on smart devices based on security policies. Security policy contents A security policy for smart devices consists of a security level, an isolation mode, and an MDM collaboration policy as the security check item. The MDM collaboration policy contains check options that vary by MDM vendor. For more information about configuring MDM vendor settings, see "Managing MDM vendors." Security level A security level defines what actions to take when security vulnerabilities are detected. EAD provides several system-defined security levels and associated default actions to be performed when vulnerability is discovered, as shown in Table 21. EAD generates security logs of violations for all security levels. The VIP mode and Monitor mode perform the same default action on smart devices, but they perform different default actions on PCs. The same rules apply to the Guest mode and the Kick out mode. For more information about configuring security levels for PCs, see "Configuring the security check for PCs." For more information about configuring security levels for smart devices, see "Managing security levels." Table 21 System-defined security levels Security level VIP mode Guest mode Isolate mode Monitor mode Kick Out mode Blacklist and Kick Out mode Default action in response to the security vulnerability on smart devices Informs the user of the security vulnerability and remediation methods. Logs off the user. Isolates the user. Informs the user of the security vulnerability and remediation methods. Logs off the user. Adds the user to the blacklist, logs off the user, and informs the noncompliant users of the security vulnerability and remediation methods. 114

126 Isolation mode EAD provides the following isolation modes, as shown in Table 22. Table 22 Isolation modes Isolation mode Deploy ACLs to the access device Deploy ACLs to the inode client Deploy VLANs to the access device Method Non-HP ProCurve devices EAD deploys the ACL number or name to the access device. The ACLs must already exist on the access device. For more information about configuring ACLs, see the configuration guide for the access device. HP ProCurve devices This mode cannot be used for isolating smart devices. This mode cannot be used for isolating smart devices. EAD deploys the VLAN ID to the access device. The VLANs must already exist on the access device. For more information about configuring VLANs, see the configuration guide for the access device. Security check item EAD provides only the MDM collaboration policy as the security check item for smart devices. The check options in the policy vary by vendor, as shown in Table 23. Table 23 MDM vendors and security check options MDM Vendor Security check options MobileIron Citrix Require endpoint registered The smart device must have been registered with the MobileIron server. Require endpoint compliant The smart device must comply with the rules configured on the MobileIron server. Enable GPS service The GPS service must be enabled on the smart device. Enable auto lock Auto lock must be enabled on the smart device. Disable Bluetooth Bluetooth must be disabled on the smart device. Require camera disabled Cameras must be disabled on the smart device. Prohibit jailbreaking or rooting The smart device must not be jailbroken or rooted. Require password locking enabled Password locking must be enabled on the smart device. Require storage encryption enabled Storage encryption must be enabled on the smart device. Require endpoint registered The smart device must have been registered with the Citrix server. Require endpoint compliant The smart device must comply with the rules configured on the Citrix server. Prohibit jailbreaking or rooting The smart device must not be jailbroken or rooted. Require storage encryption enabled Storage encryption must be enabled on the smart device. 115

127 Managing MDM vendors For EAD to cooperate with an MDM server, first configure the MDM vendor type and MDM server settings on EAD. Configuring MDM vendor settings 2. From the navigation tree, select User Security Policy > Service Parameters > MDM Vendor Config. The MDM Vendor Configuration page appears. 3. Configure the following parameters: a. MDM Vendor Type Select an MDM vendor type from the list: Disabled, MobileIron, or Citrix. b. Server Address Enter the IP address of the MDM server. c. Port Number Enter the API port number of the MDM server. d. Username Enter the username for accessing the MDM server. e. Password Enter the password for accessing the MDM server. f. Confirm Password Confirm the password. 4. To test the connectivity between the EAD server and the MDM server, click Test Connectivity. 5. Click OK. Make sure the MDM vendor settings are the same as the settings on the MDM server. If you want to change to a different vendor, you must delete all existing MDM collaboration policies before you can modify the MDM vendor settings. Manually validating MDM vendor settings EAD automatically validates the MDM vendor settings when the configuration is complete. If automatic validation fails, you must manually validate the settings. To validate MDM vendor settings: 2. From the navigation tree, select User Security Policy > Service Parameters > Validate. Managing security policies Security policy management allows you to view, add, modify, and delete security policies. Security policy list contents The security policy list has the following parameters: Policy Name Name of the security policy. Click the policy name to view detailed information. Security Level Security level used by the security policy. Click the security level name to view detailed information. Isolation Mode Isolation mode of the security policy: Not Deploy No isolation mode is specified. 116

128 Deploy ACLs to Access Device Isolates smart devices by ACLs. The ACLs must be supported on non-hp ProCurve devices. Deploy ACLs to inode Client Isolates smart devices by using inode client ACLs. This parameter is not supported in the security policy for smart devices. Deploy VLANs to Access Device Isolates smart devices by VLANs. Security ACL or VLAN The ACL or VLAN applied to smart devices that pass the security check. Isolation ACL or VLAN The ACL or VLAN applied to smart devices that fail the security check. Service Group Service group for the security policy. Modify Click the Modify icon to modify settings of the security policy. Delete Click the Delete icon to delete the security policy. Security policy details The security policy details page has the following areas: Common Configuration Basic information about the security policy and the isolation mode configuration. PC Security check items for PCs. Smart Device Security check items for smart devices. UAM identifies the check items for smart devices from PC check items in the same security policy based on the endpoint type and access scenario. EAD performs the security check after it is informed of the check items by UAM. The following information introduces security check items for smart devices. For more information about configuring security check items for PCs, see "Configuring the security check for PCs." Basic Information area The basic information area has the following parameters: Policy Name Unique name of the security policy. Service Group Service group for the security policy. Security Level Security level used by the security policy. Click the security level name to view detailed information. Description Description of the security policy. The following parameters are not supported in the security policy for smart devices: Monitor in Real Time Process After Isolation Mode area Set as Default Policy for Roaming Users Check Passed Message The isolation mode area has the following parameters: Configure Isolation Mode Indicates whether an isolation mode is configured. If this option is not selected, the security policy does not have an isolation mode. If this option is selected, the security policy uses the Deploy ACLs to Access Device or Deploy VLANs to Access Device isolation mode. The security check for smart devices does not support deploying ACLs to the inode client. The following parameters appear only when the Configure Isolation Mode option is selected: 117

129 Deploy ACLs to Access Device Isolates smart devices by using ACLs. The access device must be a non-hp ProCurve device. For Non-HP ProCurve-Security ACL Number or name of the ACL for smart devices that pass the security check. For Non-HP ProCurve-Isolation ACL Number or name of the ACL for smart devices that fail the security check. Deploy VLANs to Access Device Isolates smart devices by using VLANs. Security VLAN ID of the VLAN for smart devices that pass the security check. Isolation VLAN ID of the VLAN for smart devices that fail the security check. MDM Collaboration Policy area The MDM collaboration area has the following parameters: Check MDM Collaboration Policy Configuration Indicates whether the security policy needs MDM collaboration. This option is selected in the security policy for smart devices. MDM Collaboration Policy Name of the MDM collaboration policy. Check Failure Prompt Notification message for security check failure. EAD pushes this message to smart devices that fail the security check. Viewing the security policy list 2. From the navigation tree, select User Security Policy > Security Policy. The security policy list appears. For more information, see "Security policy list contents." 3. Click Refresh to view the most recent security policy list. Viewing security policy details 2. From the navigation tree, select User Security Policy > Security Policy. The security policy list appears. 3. Click the name of a security policy. The View Security Policy page appears. For more information, see "Security policy details." 4. Click Back. Adding a security policy 2. From the navigation tree, select User Security Policy > Security Policy. The security policy list appears. 3. Click Add. The Add Security Policy page appears. 4. Configure basic information for the security policy. The policy name must be unique in EAD. 5. Configure the MDM collaboration policy parameters in the Smart Device area. 6. Click OK. 118

130 Modifying a security policy 2. From the navigation tree, select User Security Policy > Security Policy. The security policy list appears. 3. Click the Modify icon for a security policy. The Modify Security Policy page appears. 4. Modify basic information for the security policy. The Policy Name and Service Group fields cannot be modified. 5. Modify the MDM collaboration policy parameters. 6. Click OK. Deleting a security policy A security policy cannot be deleted when it is assigned to an access service. To delete the policy, first remove it from the access service. For more information, see HPE IMC User Access Manager Administrator Guide. To delete a security policy: 2. From the navigation tree, select User Security Policy > Security Policy. The security policy list appears. 3. Click the Delete icon for a security policy. A confirmation dialog box appears. 4. Click OK. Managing security levels Security level management allows you to view, add, modify, and delete security levels. The following information introduces security level settings for smart devices. For more information about security level settings for PCs, see "Configuring the security check for PCs." Security level contents A security level consists of the following areas: Basic Information Basic information about the security level. PC Actions to take on a PC for each check item. Smart Device Actions to take on a smart device for each check item. The Smart Device area displays an MDM collaboration policy and the check options. Each check option has a security mode and a device action. EAD works with the access device and the MDM server to execute the actions on noncompliant smart devices. When violations on a smart device are mapped to different security modes, the security mode with the highest severity applies. Table 24 shows the security modes for smart devices in descending order of severity. 119

131 Table 24 Security modes for smart devices Security mode Kick out Isolate None Description EAD directs the access device to log off the smart device and generates security logs. EAD directs the access device to isolate the smart device and generates security logs. EAD generates security logs. The MDM server performs the following device actions on noncompliant smart devices through the MDM client, as shown in Table 25. Table 25 Device actions Device action Lock Wipe corporation data Wipe data Description EAD directs the MDM server to lock the smart device and generates security logs. EAD directs the MDM server to wipe the corporation data on the smart device and generates security logs. EAD directs the MDM server to restore the factory settings on the smart device and generates security logs. Security level list contents The security level list has the following parameters: Security Level Name Name of the security level. Click the security level name to view detailed information. Description Description of the security level. Service Group Service group for the security level. Modify Click the Modify icon to modify settings for the security level. Delete Click the Delete icon to delete the security level. Security level details The security level details page has a Basic Information area, a PC area, and a Smart Device area. The following information introduces parameters in the Basic Information and Smart Device areas. For more information about security level parameters for PCs, see "Configuring the security check for PCs." Basic Information area This area has the following parameters: Smart Device area Security Level Name Name of the security level. Action After This parameter applies only to PCs. Description Description of the security level. Service Group Service group for the security level. When an MDM vendor is configured, this area has the following parameters: 120

132 MDM Check Not Supported Actions to take on smart devices that do not support a configured check option (except the Require Endpoint Registered option). This parameter does not appear when it is not configured for a security level. Endpoint Not Registered Action to take on a smart device that does not register with the MDM server. Endpoint Incompliant Actions to take on a smart device that does not comply with the rules configured on the MDM server. Device Rooted or Jailbroken Actions to take on a jailbroken or rooted smart device. Storage Encryption Disabled Actions to take on a smart device on which storage encryption is disabled. When MobileIron is the vendor type, this area also has the following parameters: GPS Service Not Enabled Actions to take on a smart device on which the GPS service is disabled. Auto Lock Not Enabled Actions to take on a smart device on which the auto lock function is disabled. Bluetooth Service Not Disabled Actions to take on a smart device on which Bluetooth is enabled. Camera Enabled Actions to take on a smart device on which the camera is enabled. Password Locking Disabled Actions to take on a smart device on which password locking is disabled. Viewing the security level list 2. From the navigation tree, select User Security Policy > Security Level. The security level list appears. For more information about the security level list, see "Security level list contents." 3. Click Refresh to view the most recent security level list. Viewing security level details 2. From the navigation tree, select User Security Policy > Security Level. The security level list appears. 3. Click the name of a security level. The View Security Level page appears. For more information about security level details, see "Security level contents." 4. Click Back. Adding a security level 2. From the navigation tree, select User Security Policy > Security Level. The security level list appears. 3. Click Add. The Add Security Level page appears. 4. Configure the basic information for the security level. 121

133 The security level name must be unique in EAD. The Action After parameter does not take effect on smart devices. 5. In the Smart Device area, configure the actions to take on a smart device for each check option. Citrix supports the following options: MDM Check Not Supported Endpoint Not Registered Endpoint Incompliant Device Rooted or Jailbroken Storage Encryption Disabled MobileIron supports the following options: 6. Click OK. MDM Check Not Supported Endpoint Not Registered Endpoint Incompliant GPS Service Not Enabled Auto Lock Not Enabled Bluetooth Service Not Disabled Camera Enabled Device Rooted or Jailbroken Password Locking Disabled Storage Encryption Disabled Modifying a security level 2. From the navigation tree, select User Security Policy > Security Level. The security level list appears. 3. Click the Modify icon for a security level. The Modify Security Level page appears. 4. Modify basic information for the security level. The Security Level Name and Service Group fields cannot be modified. 5. In the Smart Device area, modify the actions to take on a smart device for each check option. Citrix supports the following options: MDM Check Not Supported Endpoint Not Registered Endpoint Incompliant Device Rooted or Jailbroken Storage Encryption Disabled MobileIron supports the following options: MDM Check Not Supported Endpoint Not Registered Endpoint Incompliant GPS Service Not Enabled 122

134 6. Click OK. Auto Lock Not Enabled Bluetooth Service Not Disabled Camera Enabled Device Rooted or Jailbroken Password Locking Disabled Storage Encryption Disabled Deleting a security level A security level cannot be deleted when it is assigned to a security policy. To delete the security level, first remove it from the security policy. For more information, see "Modifying a security policy." 2. From the navigation tree, select User Security Policy > Security Level. The security level list appears. 3. Click the Delete icon for a security level. A confirmation dialog box appears. 4. Click OK. Managing MDM collaboration policies An MDM collaboration policy contains items to be checked for smart devices. The check results are provided by the MDM server and are used together with security level settings to determine the security status of a smart device. MDM collaboration policy management allows you to view, add, modify, and delete MDM collaboration policies. MDM collaboration policy management only supports ios and Android smart devices. The execution result of the device action varies by third-party MDM vendor. MDM collaboration policy list contents The MDM collaboration policy list has the following parameters: Policy Name Name of the MDM collaboration policy. Click the policy name to view detailed information. Description Description of the MDM collaboration policy. Service Group Service group for the MDM collaboration policy. Modify Click the Modify icon to modify settings for the MDM collaboration policy. Delete Click the Delete icon to delete the MDM collaboration policy. MDM collaboration policy details The MDM collaboration policy details page has the following parameters: Policy Name Name of the MDM collaboration policy. Service Group Service group for the MDM collaboration policy. Check options for Citrix: 123

135 Require Endpoint Registered The policy requires smart devices to be registered with the Citrix server. The following check options can be performed only on registered smart devices. Require Endpoint Compliant The policy requires smart devices to comply with the rules configured on the Citrix server. Prohibit Jailbreaking or Rooting The policy requires smart devices not to be jailbroken or rooted. Require Storage Encryption Enabled The policy requires storage encryption to be enabled on smart devices. Check options for MobileIron: Require Endpoint Registered The policy requires smart devices to be registered with the MobileIron server. The following check options can be performed only on registered smart devices. Require Endpoint Compliant The policy requires smart devices to comply with the rules configured on the MobileIron server. Enable GPS Service The policy requires the GPS service to be enabled on smart devices. Enable Auto Lock The policy requires the auto lock function to be enabled on smart devices. Disable Bluetooth The policy requires Bluetooth to be disabled on smart devices. Require Camera Disabled The policy requires cameras to be disabled on smart devices. Prohibit Jailbreaking or Rooting The policy requires smart devices not to be jailbroken or rooted. Require Password Locking Enabled The policy requires password locking to be enabled on smart devices. Require Storage Encryption Enabled The policy requires storage encryption to be enabled on smart devices. Description Description of the MDM collaboration policy. Viewing the MDM collaboration policy list 2. From the navigation tree, select User Security Policy > MDM Collaboration Policy. The MDM collaboration policy list appears. For more information about the MDM collaboration policy list, see "MDM collaboration policy list contents." 3. Click Refresh to view the most recent MDM collaboration policy list. Viewing MDM collaboration policy details 2. From the navigation tree, select User Security Policy > MDM Collaboration Policy. The MDM collaboration policy list appears. 3. Click the name of an MDM collaboration policy. The View MDM Collaboration Policy page appears. For more information about MDM collaboration policy details, see "MDM collaboration policy details." 4. Click Back. 124

136 Adding an MDM collaboration policy 2. From the navigation tree, select User Security Policy > MDM Collaboration Policy. The MDM collaboration policy list appears. 3. Click Add. The Add MDM Collaboration Policy page appears. 4. Configure the Policy Name, Service Group, and Description parameters. The policy name must be unique in EAD. 5. Configure the check options. Citrix supports the following options: Require Endpoint Registered Require Endpoint Compliant Prohibit Jailbreaking or Rooting Require Storage Encryption Enabled MobileIron supports the following options: 6. Click OK. Require Endpoint Registered Require Endpoint Compliant Enable GPS Service Enable Auto Lock Disable Bluetooth Require Camera Disabled Prohibit Jailbreaking or Rooting Require Password Locking Enabled Require Storage Encryption Enabled Modifying an MDM collaboration policy 2. From the navigation tree, select User Security Policy > MDM Collaboration Policy. The MDM collaboration policy list appears. 3. Click the Modify icon for an MDM collaboration policy. The Modify MDM Collaboration Policy page appears. 4. Modify the description of the MDM collaboration policy. Policy Name and Service Group cannot be modified. 5. Configure the check options. Citrix supports the following options: Require Endpoint Registered Require Endpoint Compliant Prohibit Jailbreaking or Rooting Require Storage Encryption Enabled MobileIron supports the following options: Require Endpoint Registered 125

137 6. Click OK. Require Endpoint Compliant Enable GPS Service Enable Auto Lock Disable Bluetooth Require Camera Disabled Prohibit Jailbreaking or Rooting Require Password Locking Enabled Require Storage Encryption Enabled Deleting an MDM collaboration policy An MDM collaboration policy cannot be deleted when it is assigned to a security policy. To delete the MDM collaboration policy, first remove it from the security policy. For more information, see "Modifying a security policy." To delete an MDM collaboration policy: 2. From the navigation tree, select User Security Policy > MDM Collaboration Policy. The MDM collaboration policy list appears. 3. Click the Delete icon for an MDM collaboration policy. A confirmation dialog box appears. 4. Click OK. 126

138 Managing hierarchical EAD networks Hierarchical management applies to large-scale organizations and their branches for central management on user access and endpoint security. In the hierarchical management module, a network management station deployed with IMC PLAT, IMC UAM, and IMC EAD is a node. A hierarchical EAD network typically sets the headquarters as the root node and its branches as subordinate nodes. The subordinate nodes form parent-child relationships with other nodes in the hierarchy. Hierarchical management requires the operator to establish trust relationships among the parent node and child nodes first. With hierarchical management, the parent node can deploy services, security policies, and EAD service parameters to its child nodes, and child nodes report security data to its parent node. NOTE: Hierarchical management applies only to the EAD networks of PCs. Configuring the policy management mode EAD supports the following policy management modes: Centralized policy management Uses a central EAD server located at the headquarters to deploy security policies and services to every branch EAD server. The branch EAD servers use the deployed security policies to control security check for access users and to report security data to the central EAD server. Operators can view the security statistics report for the entire organization from the central EAD server. Non-centralized policy management Allows branches to define their access services and security policies and to report data to the central EAD server. Operators can view the security statistics report for every branch from the central EAD server. To configure the policy management mode: 2. From the navigation tree, select User Security Policy > Service Parameters > System Settings. 3. Select Yes or No for Centralized Policy Management. 4. Click OK. NOTE: The policy management mode configuration takes effect only on the current node and its child nodes. To modify the policy management mode for the current node, first delete all its child nodes first. Managing nodes in a hierarchical EAD network Hierarchical node management applies to enterprises or organizations and their branches. By allowing deployment of EAD servers at both the headquarters and the individual branches, hierarchical node management helps to improve efficiency and flexibility of EAD security checking for all branches. With hierarchical node management, each set of EAD components requires its own license, based on the number of users to be managed. 127

139 An EAD server can act as a parent node, child node, or both. Each EAD server can have multiple child nodes but only one parent node. Child node list contents The child node list has the following parameters: Policy Update Time Time when the policy of the current node was last updated. This parameter is available only when Centralized Policy Management is set to Enable. Node Name Name of the child node. Click the name to view detailed information. Status State of the child node: Normal Indicates that communication between the child node and the current node is normal. Abnormal Indicates that either the last report was empty, the last report time was more than 40 minutes ago, or the last deployment failed. IP Address IP address of the child node. Port Listening port of the child node. Protocol Type Protocol type used to access the child node. Only HTTP is supported. Last Report Time Time when the child node last reported security data to the current node. Last Deploy Time when the current node last performed a deployment to its child nodes. Operation Result Operation result of the last deployment. Operation Provides the following management options: Configure Configure the services to be deployed to the child node. This option is available only when Centralized Policy Management is set to Enable. Deploy Deploy the selected services to the child node. This option is available only when Centralized Policy Management is set to Enable. Deployment History View the deployment history of the child node. This option is available only when Centralized Policy Management is set to Enable. Modify Modify the settings of the child node. Delete Delete the child node. Child node information The child node information details page has the following areas: Basic Information Basic Information area Real-time statistics on the number of users on the child node Real-time statistics on the number of user-services failing the security check on the child node Node Name Name of the child node. Status State of the child node: Normal or Abnormal. Reason for Abnormality Reason why the child node is abnormal. When a child node is in the normal state, this field is empty. IP Address IP address of the child node. Port Listening port of the child node. Protocol Type Protocol type used by the current node to access the child node. Only HTTP is supported. 128

140 AUTH for Accessing Child Node Indicates whether identity authentication is required for accessing the child node. Identity authentication is required in centralized policy management. Login Name User name used by the current node to access the child node. This field is available only when AUTH for Accessing Child Node is set to Enable. Last Report Time Time when the child node last reported data to the current node. Last Success Deploy Time when the current node last performed a successful deployment on the child node. Last Deploy Time when the current node last performed a deployment operation. Operation Result Result of the last deployment performed by the current mode operation. Reason Reason why the last deployment failed. If the last deployment was successful, this field is empty. Real-time statistics on the number of users on the child node area UAM total permitted Last reported maximum number of access users permitted by the license on the child node. UAM used Last reported number of existing access users on the child node. EAD total permitted Last reported maximum number of EAD users permitted by the license on the child node. EAD used Last reported number of existing EAD users on the child node. Number of online users Last reported number of online users on the child node. Number of secure online users Last reported number of online users who passed the security check on the child node. Number of insecure online users Last reported number of online users who failed the security check on the child node. Insecure users include those who are monitored, informed, isolated, and are to be kicked out. Number of unknown online users Last reported number of unknown online users on the child node. Unknown users include those who are not required to pass the security check and those who are currently going through the security check. Number of blacklist users Last reported number of blacklisted access users on the child node. Number of guests Last reported number of guests on the child node. Real-time statistics on the number of user-services failing the security check on the child nodes area Anti-virus software check failures Number of access users who failed the anti-virus software check. Anti-phishing software check failures Number of access users who failed the anti-phishing software check. Firewall software check failures Number of access users who failed the firewall software check. Anti-spyware software check failures Number of access users who failed the anti-spyware software check. Hard disk encryption software check failures Number of access users who failed the hard disk encryption software check. Windows patch check failures Number of access users who failed the Windows patch check. Patch software check failures Number of access users who failed the patch software check. Application check failures Number of access users who failed the application check. 129

141 Number of users failing smart device software control group check Number of access users who failed the smart device software control group check. Number of users failing smart device configuration check Number of access users who failed the smart device configuration check. Registry check failures Number of access users who failed the registry check. Share directory check failures Number of access users who failed the share directory check. Traffic monitoring check failures Number of access users who failed the traffic monitoring check. Operating system password check failures Number of access users who failed the operating system password check. Asset registration check failures Number of access users who failed the asset registration check. Parent node information The parent node information page has the following parameters: IP Address IP address of the parent node. Port Listening port of the parent node. Protocol Type Protocol type used by the current node to access the parent node. Confirmed or Not Indicates whether the parent node has been confirmed. Viewing the child node list 2. From the navigation tree, select User Security Policy > Hierarchical Node. The child node list displays all child nodes of the current node. 3. To sort the child node list, click the Node Name, Status, IP Address, Port, Protocol Type, Last Report Time, Last Deploy, or Operation Result column label. 4. Click Refresh to refresh the child node list. Modifying the name of the current node 2. From the navigation tree, select User Security Policy > Hierarchical Node. The child node list displays all child nodes of the current node. 3. Click Modify Self. The Modify Self page appears. 4. Enter the name of the current node in the Node Name field. 5. Click OK. Viewing child node details 2. From the navigation tree, select User Security Policy > Hierarchical Node. The child node list displays all child nodes of the current node. 3. Click the name of a child node to view detailed information. 130

142 The Child Node Information page appears. 4. Click Back to return to the child node list of the current node. Adding a child node You cannot configure a node's own parent node (or any other node above the current node) as a child node of the current node. To add a child node to the current node: 2. From the navigation tree, select User Security Policy > Hierarchical Node. The child node list displays all child nodes of the current node. 3. Click Add. The Add Child Node page appears. 4. Configure the following parameters for the child node: Node Name Enter the name of the child node. IP Address Enter the IP address of the child node that is deployed with the EAD component. Port Enter the listening port of the child node. Protocol Type Select the protocol type used to access the child node. Only HTTP is supported. AUTH for Accessing Child Node Select this option to enable identity authentication for accessing the child node. Identity authentication is required in centralized policy management. Login Name Enter the user name used to access the child node. The user name must be that of an administrator of the child node. This parameter is available only when AUTH for Accessing Child Node is set to Enable. Login Password Enter the login password of the administrator. This parameter is available only when AUTH for Accessing Child Node is set to Enable. 5. Click OK. The new child node appears in the child node list of the current node. The current node cannot deploy services to this child node until an operator logs in to the child node to confirm the current node as its parent node. For more information, see "Confirming the parent node." Modifying a child node To modify a child node of the current node: 2. From the navigation tree, select User Security Policy > Hierarchical Node. The child node list displays all child nodes of the current node. 3. Click the Modify icon for the child node you want to modify. The Modify Child Node page appears. 4. Modify the parameters for the child node. For more information, see "Adding a child node." 5. Click OK. 131

143 Deleting a child node To remove the parent-child relationship between the current node and its child node, perform the following operations: 1. On the current node, delete the child node. 2. On the child node, remove the current node as the parent node. After the parent-child relationship is removed, the current node no longer collects statistics from the child node for the multi-node statistics report after the parent-child relationship is removed. To delete a child node: 2. From the navigation tree, select User Security Policy > Hierarchical Node. The child node list displays all child nodes of the current node. 3. Click the Delete icon for the child node you want to delete. A confirmation dialog box appears. 4. Click OK. Confirming the parent node A node cannot receive deployment contents from the parent node until the parent node is confirmed. To confirm the parent node for the current node: 2. From the navigation tree, select User Security Policy > Hierarchical Node. The child node list displays all child nodes of the current node. 3. Click Confirm Parent Node. The Confirm Parent Node page appears. 4. View the parent node information. 5. Click OK. Deleting the parent node To remove the parent-child relationship between the current node and its parent node, perform the following operations: 1. On the parent node, delete the current node as its child node. 2. On the current node, remove the parent node. The current node no longer reports data to the parent node after the parent-child relationship is removed. To delete the parent node for the current node: 2. From the navigation tree, select User Security Policy > Hierarchical Node. The child node list displays all child nodes of the current node. 3. Click Delete Parent. The Delete Parent page appears. 4. Click Delete. 132

144 Deploying services, security policies, and service parameters Hierarchical management offers automatic and manual deployment of services, security policies used by the services, and EAD service parameters from a node to its child nodes. The node deploys the EAD service parameters Data Reporting Time and Data Lifetime to its child nodes because they cannot be configured on individual child nodes. A child node uses the deployed services and security policies for identity authentication and security check. With automatic deployment, a node checks the Policy Update Time for child nodes daily at the scheduled deployment time. The node performs deployment when the Policy Update Time is later than the last successful deployment time. The policy update time is refreshed, as well as any changes to the service parameters, security policies, and security check items. Deployment contents The contents of both automatic and manual deployment depend on the centralized policy management status. When centralized policy management is enabled, automatic and manual deployment both deliver services, security policies, and service parameters to the child nodes. When centralized policy management is disabled, automatic and manual deployment both deliver only service parameters to the child nodes. Specifying the services to be deployed to a child node 2. From the navigation tree, select User Security Policy > Hierarchical Node. The child node list displays all child nodes immediately below the current node. 3. Click the Configure icon for the child node to which you want services to be deployed. The Specify Services to Be Deployed page appears. The service list displays the following information about all available services: Service Name of the service. Service Suffix Suffix of the service. Security Policy Default security policy used by the service. 4. Select one or more services you want to deploy to the child node. 5. Click OK. Scheduling automatic deployment tasks 2. From the navigation tree, select User Security Policy > Hierarchical Node. The child node list displays all child nodes of the current node. 3. Click Auto Deployment. The Configure Automatic Deployment dialog box appears. 4. Enter the daily deployment time in the Deploy Everyday At field. The value must be an integer in the range 0 to 23 in 24-hour notation. 133

145 5. Click OK. Manually deploying configurations to a child node 2. From the navigation tree, select User Security Policy > Hierarchical Node. The child node list displays all child nodes of the current node. 3. Click the Deploy icon for a child node to start the deployment. 4. Click OK. The current node immediately deploys configurations to the child node, and displays the deployment result after the deployment is complete. Managing the deployment and receipt history In a hierarchical EAD network, each node performs the following operations to maintain the deployment and receipt history: Creates a deployment record each time the node deploys services, security policies, or service parameters to a child node. Creates a receipt record each time the node receives services, security policies, or service parameters from its parent node. EAD enables you to view and query the deployment and receipt histories of the current node. Deployment history list contents The deployment history list has the following parameters: Deployment Time Time when the deployment was performed. Deployment Type How the deployment was performed: Manual or Auto. Result Result of the deployment: Succeeded or Failed. Reason Reason why the deployment failed. Services Names of the deployed services, separated by commas. File Name Pathname of the file that stores the deployment contents. Receipt history list contents The receipt history list has the following parameters: Receipt Time Time when the current node received the deployment content from its parent node. Result Result of the receipt: Succeeded or Failed. Reason Reason why the receipt failed. Services Names of the received services, separated by commas. Viewing the deployment history list 2. From the navigation tree, select User Security Policy > Hierarchical Node. The child node list displays all child nodes of the current node. 134

146 3. Click the Deployment History icon for a child node. The Deployment History List displays the deployment history from the current node to the child node. 4. Click Back to return to the child node list of the current node. Viewing the receipt history list 2. From the navigation tree, select User Security Policy > Policy Receipt History. The Receipt History List displays the receipt history of the current node from its parent node. Querying the deployment history to a child node 2. From the navigation tree, select User Security Policy > Hierarchical Node. The child node list displays all child nodes of the current node. 3. Click the Deployment History icon for a child node. The Deployment History List displays the deployment history from the current node to the child node. 4. Specify one or more of the following query criteria: Deployment Time from/to Specify a deployment time range. You can click the Calendar icon to select the time, or enter a date in YYYY-MM-DD format. Deployment Type Select the deployment type: Manual or Auto. Result Select the result of the deployment: Succeeded or Failed. Empty fields are ignored. 5. Click Query. The Deployment History List displays the history records that match the query criteria. 6. To clear the query criteria and display all deployment history records, click Reset. Querying the receipt history of the current node 2. From the navigation tree, select User Security Policy > Policy Receipt History. The Receipt History List displays all receipt history records of the current node from its parent node. 3. Specify one or more of the following query criteria: Receipt Time from/to Specify a receipt time range. You can click the Calendar icon to select the time, or enter a date in YYYY-MM-DD format. Result Select the receipt result: Succeeded or Failed. Empty fields are ignored. 4. Click Query. The Receipt History List displays the receipt history records that match the query criteria. 5. To clear the query criteria and display all receipt history records of the current node, click Reset. 135

147 Managing the EAD node topology The EAD node topology provides a topology view of the current node and its child nodes in the hierarchical EAD network. With the EAD node topology, operators can conveniently view the running status and security statistics of the child nodes, and customize the background picture for a child node. Accessing the EAD node topology Toolbar options 2. From the navigation tree, select User Security Policy > EAD Node Topology. The EAD node topology appears. 1:1 Display the topology in its original size. Zoom In Zoom in on the topology. Zoom Out Zoom out on the topology. Fit Content Fit the contents of the topology to the page. Magnifier Magnify the contents of the topology. Over View Display or hide the bird's-eye view page of the topology. Hand Tool /Pointer Tool Click the Hand Tool icon to move the topology on the page. Click the Pointer Tool icon information. to select a node in the topology and view detailed Add Background Add or change the background picture of the topology. Remove Background Remove the background picture of the topology. This icon is unavailable when the topology has no background picture. Save Save the modifications made to the topology. Save as Image Save the topology as an image in PNG format. Add Node Add a node to the topology. Available options include the current node and all of its child nodes. Icon Management Modify the type and description of the node icon. Legend View the legends. Table 26 provides a detailed description of the legends. Refresh Refresh the topology. 136

148 Table 26 Legends Type Legends Description Node Status Abnormal nodes appear as red icons. Normal nodes appear as green icons. Node Icon Operators can assign different graphic icons to nodes for identification purposes. Right-click menu of the EAD node topology Hide Node Name/Show Node Name Hide or show the node names in the topology. Adjust Background > Manual Adjust Manually adjust the size of the background picture. Adjust Background > Resume Original Size Restore the background picture of the topology to its original size. Exit Background Exit the background picture editing mode. Right-click menu of a node Remove from Diagram Remove the node from the topology. View Node View details of the node. This option is available only for child nodes of the current node. For more information, see ". Viewing child node details." Left-click information of a node Node Name Name of the node. Node Type Type of the node icon. Status State of the node: Normal or Abnormal. IP Address IP address of the node. Total Access Users Number of access users on the node. Online Users Number of online users on the node. Adding a node to the EAD node topology By default, the EAD node topology is empty. You must manually add nodes (the current node or its child nodes) to the topology to enable management and monitoring of the nodes from the topology. To add a node to the EAD node topology: 2. From the navigation tree, select User Security Policy > EAD Node Topology. The EAD node topology appears. 3. Click the Add Node icon. The Node List displays all nodes that can be added to the topology, including the current and all of its child nodes. 4. Select the node you want to add to the topology: a. Enter a partial or complete name of the node in the Node Name field. 137

149 b. Click Query. The Node List displays all nodes that match the query criteria. c. Select the target node. 5. From the Node Type list, select a node type that you want to add. 6. Click OK. The selected node appears on the EAD node topology. 7. Repeat step 3 through 6 to add more nodes to the topology. Uploading a background picture 2. From the navigation tree, select User Security Policy > EAD Node Topology. The EAD node topology appears. 3. Click the Add Background icon. The Topology Background-picture Setting page appears. 4. Select the User Upload Picture option. 5. Click Browse to select the picture you want to upload as the background picture. Follow these guidelines when you select the background picture: Use a GIF, JPG, JPEG, or PNG picture. Pictures in other formats may not be displayed correctly. The picture file cannot exceed 10 MB, and the dimension cannot exceed pixels. The picture file name can only contain alphanumeric characters, spaces, underscores (_), and hyphens (-). 6. Click Preview to preview the effect. 7. Click Set. The selected picture is uploaded to the EAD server as the background picture of the topology. 8. Click Close. Using an existing picture as the background picture 2. From the navigation tree, select User Security Policy > EAD Node Topology. The EAD node topology appears. 3. Click the Add Background icon in the toolbar. The Topology Background-picture Setting page appears. 4. Select the Select Picture From Server option. 5. Click Select Picture to select a picture. The system automatically magnifies the selected picture as the preview. 6. Click Set to set the picture as the background picture for the topology. 7. Click Close. Modifying a node icon EAD predefines five node icons. You can modify the type and description of a node icon. However, you cannot add new node icons or delete the predefined node icons. 138

150 To modify a node icon: 2. From the navigation tree, select User Security Policy > EAD Node Topology. The EAD node topology appears. 3. Click the Icon Management icon in the toolbar. The Icon List displays all the predefined node icons. Icon List contents Node Icon Predefined node icons: (The default node icon.) Node Icon Type Type of the node icon. Description Description of the node icon. 4. Click the Modify icon for the node icon you want to modify. 5. Modify the type and description of the node icon. 6. Click OK. 139

151 Managing desktop assets DAM uses the inode client to collect hardware and software information for each asset. It then implements asset management, statistics collection, desktop control, asset audit, software deployment, and report generation. DAM manages registered assets only. Operators must first register desktop assets to be managed with DAM. Assets use assigned asset numbers for registration. EAD supports the following modes of numbering desktop assets: Manual numbering Operators must manually number desktop assets and specify asset information, such as owners, asset types, and physical locations in DAM. Automatic numbering DAM automatically numbers desktop assets. Operators must enable auto-numbering in the DAM service parameters. DAM supports the following desktop asset management functions: Managing asset groups Allows operators to manage asset groups. Operators can create asset groups and subgroups, and then apply desk control schemes or deploy software to asset groups and subgroups. Managing assets Provides asset management functions, such as regrouping assets and batch importing assets. Exporting asset information Allows operators to export asset information and manage export history records. Collecting asset statistics Allows operators to collect asset statistics by asset type, CPU, hard disk, operating system, or software installation. Managing export tasks Allows operators to schedule a task to export USB file transfer logs. Managing asset groups DAM allows operators to add, modify, and delete asset groups; assign asset groups to specified operators for management; and organize assets by asset groups or user groups. Operators can manually create asset groups and subgroups in DAM, or allow DAM to automatically create asset groups and subgroups based on existing user groups on the IMC platform. When assets are automatically created based on user groups, every asset is automatically added to the group to which its owner belongs. Assets that do not have an owner are added to Ungrouped, which is a special asset group automatically created by DAM. DAM supports an asset group hierarchy of a maximum of five levels. Asset group list contents Expand All/Collapse All Click the Expand All icon to expand the asset group. Click the Collapse All icon to collapse the asset group. The Expand All and Collapse All icons are unavailable for asset groups with no subgroups. Group Name Displays the name of the asset group. Click the name to view detailed information about the asset group. This field also shows the group level. For a top-level asset group, this field displays only the group name. For a middle-level asset group that has subgroups and a parent group, this field displays the group name and a Group icon next to the name. For bottom-level asset groups that have only a parent group, this field displays the group name and a Group icon next to the name. 140

152 Control Scheme Displays the name of the desktop control scheme assigned to the asset group. Click the name to view details of the scheme, which contains a set of control policies. For more information, see "Configuring desktop control schemes." Asset List Click the Asset List icon to view assets in the asset group. Add Sub-Group Click the Add Sub-Group icon to add a subgroup to the asset group. This link is not available for members of the asset group Ungrouped, which is a system-defined asset group that cannot have a subgroup. Modify Click the Modify icon to modify the asset group. Delete Click the Delete icon to delete the asset group. Asset group details The asset group details page has the following areas: Asset Group Details Immediate Parent Group List Authorized Operator Asset Group Details area The asset group details area has the following parameters: Group Name Name of the asset group. Control Scheme Name of the desktop control scheme assigned to the asset group. Click the name to view details of the scheme, which is a set of control policies. You can select an existing desktop control scheme for a group or subgroup, or select Disable Control Scheme when you do not want to apply any control scheme to the asset group. When you skip this step, the subgroup inherits control schemes from its parent group. For more information, see "Configuring desktop control schemes." Parent Group Name Name of the parent group. When you add a subgroup, this field is automatically populated with the name of the parent group. This field is not available when the asset group has no parent group. Group Description Description of the asset group. You can modify this parameter only when the Use Asset Groups option is selected. Immediate Parent Group List area This area is available only for asset groups that have parent groups. Group Name Name of the parent group. Control Scheme Name of the desktop control scheme assigned to the parent group. When no control scheme is configured, a subgroup inherits the control scheme from its parent group. Group Description Description of the parent group. Authorized Operator area This area is not available when the asset is created based on existing user groups on the IMC platform. Username Name of the operator authorized to manage the asset group. Full Name Full name of the operator. Privilege Privilege level assigned to the operator, which can be: Admin Maintainer Viewer Description Description of the operator. 141

153 Viewing the asset group list To view the asset group list: 2. From the navigation tree, select Desktop Asset Manager > Asset Group. The asset group list displays all asset groups. 3. Click Refresh to refresh the asset group list. When you configure DAM to automatically create and delete asset groups along with existing user groups on the IMC platform, the asset group list does not contain the Add Sub-Group and Delete fields. Viewing asset group details 2. From the navigation tree, select Desktop Asset Manager > Asset Group. The asset group list displays all asset groups. 3. Click the name of an asset group to view detailed information. The Asset Group Details page appears. 4. Click Back to return to the asset group list. Adding asset groups Operators can manually create asset groups and subgroups in DAM, or allow DAM to automatically create asset groups and subgroups based on existing user groups on the IMC platform. DAM supports an asset group hierarchy of a maximum of five levels. After an asset group/subgroup is added, DAM creates an asset group/subgroup branch under the All Assets node on the left navigation tree. Manually adding an asset group When the Use Asset Groups option is selected on the asset group list page, you can manually add asset groups. To manually add an asset group: 2. From the navigation tree, select Desktop Asset Manager > Asset Group. The asset group list displays all asset groups. 3. Click Add Group. The Add Asset Group page appears. 4. Configure the basic information for the asset group. 5. Select operators to manage the asset group in the Authorized Operators area. 6. Select an operator to manage the asset group. Operators with the Admin privilege are selected automatically. 7. Click OK. Automatically adding asset groups based on user groups DAM can automatically create asset groups and subgroups based on existing user groups on the IMC platform. This function is available only when DAM contains no manually added asset groups except the system-defined asset group, Ungrouped. To enable DAM to automatically create asset groups based on user groups: 142

154 2. From the navigation tree, select Desktop Asset Manager > Asset Group. The asset group list displays all asset groups. 3. Click Use User Groups. The Asset Group page is refreshed to display the asset groups added based on user groups. When the Use User Groups option is selected, DAM automatically creates asset groups based on existing user groups on the IMC platform, adjusts the asset groups along with the user groups, and prohibits operators from manually adding asset groups. When all asset groups are automatically created, you can select the Use Asset Groups option to manually add more asset groups. However, you must reselect operators for each asset group, except operators with the Admin privilege who are automatically selected. Adding a subgroup for an asset group DAM allows operators to manually add subgroups for asset groups. However, when the Use User Groups option is selected, DAM automatically maintains the same group structure as that of the user groups, and prohibits operators from manually adding asset groups or subgroups. To manually add a subgroup for an asset group: 2. From the navigation tree, select Desktop Asset Manager > Asset Group. The asset group list displays all asset groups. 3. Click the Add Sub-Group icon for the asset group to which you want to add a subgroup. The Add Asset Group page appears. When you configure DAM to automatically organize assets based on existing user groups on the IMC platform, the asset group list does not contain the Add Sub-Group field. 4. Configure the basic information and the asset group details for the subgroup. 5. Confirm the control scheme for the current group in the Immediate Parent Group List area. When no control scheme is configured, the asset group inherits control schemes from its parent group. 6. Select operators to manage the asset group in the Authorized Operators area. 7. Select an operator to manage the asset group. Operators with the Admin privilege are selected automatically. 8. Click OK. Modifying an asset group 2. From the navigation tree, select Desktop Asset Manager > Asset Group. The asset group list displays all asset groups. 3. Click the Modify icon for the asset group you want to modify. 4. Modify the basic information and the asset group details for the asset group. Group Name Enter the group name. You cannot modify this parameter when the Use Asset Groups option is selected. Control Scheme Select an existing desktop control scheme for the asset group, or select Disable Control Scheme if you do not want to apply any control scheme to the asset group. When no control scheme is configured, the asset group inherits the control scheme from its parent group. For more information, see "Configuring desktop control schemes." Group Description Enter a description of the group. You can modify this parameter only when the Use Asset Groups option is selected. 143

155 5. Select operators to manage the asset group in the Authorized Operators area. This area is not available when the Use User Groups option is selected. 6. Select an operator to manage the asset group. Operators with the Admin privilege are selected automatically. 7. Click OK. Deleting an asset group DAM allows operators to delete an asset group. However, when the Use User Groups option is selected, DAM automatically maintains the same group structure as that of the user groups, and prohibits operators from manually deleting asset groups or subgroups. Before deleting an asset group, you must first remove all of its assets and subgroups. To delete an asset group: 2. From the navigation tree, select Desktop Asset Manager > Asset Group. The asset group list displays all asset groups. 3. Click the Delete icon for the asset group you want to delete. A confirmation dialog box appears. 4. Click OK. Granting an operator privileges to manage asset groups You can grant operators privileges to manage specific asset groups. When assets are grouped based on user groups, operators are automatically granted privileges to manage their respective asset groups, and those granted asset group privileges change along with the user group settings. When you switch from the Use User Groups option to the Use Asset Groups option, DAM keeps all asset groups that were created based on user groups. You must grant privileges to operators again to manage their asset groups, unless they have the Admin privilege, in which case they are automatically granted privileges. To grant an operator privileges to manage specific asset groups: 2. From the navigation tree, select Desktop Asset Manager > Asset Group. The asset group list displays all asset groups. 3. Click Operator Privileges. The Operator List displays all operators and their respective privileges. 4. Click the Modify icon for an operator to modify their privileges. The Modify Privileges page appears. 5. Select the asset groups that you want the operator to manage. 6. Click OK. Managing assets DAM uses the inode client to collect information about registered assets for desktop monitoring, asset audit, and software deployment. DAM manages only the registered assets. Operators can configure EAD security policies so that EAD checks the asset status of access users, and monitors, informs, isolates, or blocks access users who use unregistered assets. 144

156 Operators can query, view, add, modify or delete assets; move assets between groups; batch export assets; and view the asset export history. Asset registration process To use all DAM functions, first register assets with DAM. Otherwise, some functions are unavailable. Asset registration has the following procedures: Numbering assets DAM assigns each asset a unique asset number for registration. The asset numbering mode can be manual or automatic. Manual numbering mode Operators must manually add asset information to DAM, such as the asset number, model, owner, and asset group to which the asset belongs. When a user passes identity authentication using the asset for the first time, the inode client prompts the user to enter the asset number. Automatic numbering mode Operators enable automatic numbering and specify a prefix. When a user passes identity authentication using the asset for the first time, DAM automatically numbers the asset in the format of <Prefix>XXXXXXXXXX. Registering assets DAM records asset information such as the owner, model, and vendor, and manages the assets. If assets are manually numbered, the registration is complete after the user confirms asset information. If assets are automatically numbered, DAM provides the following registration modes: Automatic registration When a user passes identity authentication using the asset for the first time, the inode client registers the asset with DAM. Operators can manually configure basic settings for the registered asset. Manual registration When a user passes identity authentication using the asset for the first time, the inode client prompts the user to enter and submit asset settings for registration. Verifying assets Operators verify asset information submitted by access users. Only approved assets can be registered with DAM. This feature is available only when both automatic numbering and manual registration are enabled. Asset list contents Status Status of the asset: Online Asset is managed and online. Offline Asset is managed and offline. Unmanaged Asset is not managed by DAM. Asset Number Asset number of the asset. Click the asset number to view the asset details. Asset Name Name of the asset. Model Model of the asset. ACK Status Indicates whether an operator has acknowledged the asset information. This field appears only when Auto Number is set to Enable. Owner Owner of the asset. Click the owner to view owner details. Inserted at Time when the asset was manually added to DAM or automatically numbered by DAM. Modify Click the Modify icon to modify asset information. Asset details The asset details page has the following areas: 145

157 System Information area Asset Number Asset number of the asset. Asset Name Name of the asset. Status Status of the asset: Online Asset is managed and online. Offline Asset is managed and offline. Unmanaged Asset is not managed by DAM. Asset Group Asset group to which the asset belongs. Group Control Scheme Desktop control scheme assigned to the asset group. Click the control scheme name to view detailed information. An empty field indicates that no desktop control scheme is assigned to the asset group. Asset Control Scheme Desktop control scheme assigned to the asset. This scheme applies to the asset regardless of whether a desktop control scheme is assigned to the asset group. An empty field indicates that no desktop control scheme is assigned to the asset, and in this case, the asset must use the desktop control scheme assigned to the asset group where it resides. Owner Owner of the asset. Click the owner name to view owner details. User User who last used the asset or is currently using the asset for network access. Click the user name to view detailed user information. An empty field indicates that no user has passed identity authentication with the asset. Login Name Windows account name used to log in to the asset, which can be a local account or a domain account. Operating System Operating system running on the asset. Asset Type Asset type, which can be: PC Laptop Server Workstation Others Vendor Vendor of the asset. Model Model of the asset. Client Language Language used by the inode client on the asset. Client Version Version of the inode client installed on the asset. Inserted at Time when the asset was manually added to DAM or automatically numbered by DAM. Managed at Time when the asset completed registration after being added to DAM. Updated at Time when the asset software or hardware was last updated after registration. Login at/logout at Time when the asset last went online or offline after registration. The online assets are displayed as Login at, and the offline assets are displayed as Logout at. Location Location information of the asset. Access Device Access device of the asset. Interface Access interface of the asset. ACK Status Indicates whether an operator has acknowledged the asset information. In manual numbering mode, the ACK Status is Yes for all assets. In automatic numbering mode, the ACK Status is Yes for acknowledged assets, and No for unacknowledged assets. Remarks Comments on the asset. 146

158 Operating System Information area Operating System Name of the operating system running on the asset. Version Version of the operating system running on the asset. Service Pack Service pack version of the operating system running on the asset. Installed at Time when the operating system was installed on the asset. Operating System Language Language of the operating system running on the asset. Operating System Serial Number Serial number of the operating system running on the asset. Hardware Information area To view detailed hardware information, click the Details link in the area title area. For more information, see "Viewing hardware details." BIOS Information Caption Caption of the BIOS. Vendor Vendor of the BIOS. Release Date Release date of the BIOS. Version Version of the BIOS. Mainboard Information Vendor Vendor of the main board. Model Model of the main board. Memory Information Total Memory Total memory size of the asset. Free Memory Free memory size of the asset. CPU Information Information for different CPUs is separated by a comma. CPU No. Local serial number of the CPU assigned by Windows. CPU Model SN Serial number of the CPU model. CPU Name Name of the CPU. CPU Classification Classification of the CPU: Family, Model, or Stepping. Current Frequency Current working frequency of the CPU, in MHz. Max Frequency Maximum working frequency of the CPU, in MHz. Clock Frequency Clock frequency of the CPU, in MHz. NIC Information Information for different NICs is separated by a comma. Caption Caption of the NIC. Device Instance Path Device instance path of the NIC. MAC Address MAC address of the NIC. Hard Disk Information Information for different hard disks is separated by a comma. Hard Disk Number Hard disk number of the asset. Interface Type Interface type of the hard disk. Hard Disk Serial Number Serial number of the hard disk. Device Instance Path Device instance path of the hard disk. Model Model of the hard disk. Total Partitions Total number of logical partitions on the hard disk. Hard Disk Size Hard disk capacity, in GB. DVD/CD-ROM 147

159 Caption Caption of the DVD/CD-ROM. Type Type of the DVD/CD-ROM. Device Instance Path Device instance path of the DVD/CD-ROM. Shortest Startup Time Ranking area This area appears only when Rank Assets by Startup Time is enabled in DAM service settings. For more information about configuring the parameter, see "Configuring service parameters." The Shortest Startup Time Ranking area contains the following contents: Ranking Number Ranking result of the startup time for the asset. A small value indicates a short startup time. Ranking in Percentage Ranking result of the startup time for the asset in percentage. For example, a value of 10% indicates the asset is one of the top 10% ranked assets with the shortest startup time. Startup Time (Seconds) Amount of time for asset startup, in seconds. Reported Time (in Client) Time when the inode client reported the asset startup time. Reported Time (in Server) Time when DAM received the reported asset startup time. Screen Saver Information area Screen Saver Indicates whether the screen saver is enabled for the asset. Display Logon Screen on Resume Indicates whether password protection is enabled for the screen saver. Idle Timeout Maximum idle time, in seconds, before the asset enters the screen-saver state. Network Connection List area Partition List area Logical Disk List area Enable DHCP Indicates whether the network connection can obtain an IP address from a DHCP server. IP Address IP address of the network connection. MAC Address MAC address of the network connection. Gateway IP Address Gateway IP address of the network connection. Subnet Address Subnet address of the network connection. DHCP Server Address IP address of the DHCP server that assigns IP addresses to the network connection. DNS Server Address IP address of the DNS server that is used by the network connection. If the network connection obtains the IP address from a DHCP server, this address is typically also assigned by that DHCP server. Hard Disk Number Number of the hard disk on the partition. The combination of a partition number and a hard disk number uniquely identifies a partition on an asset. Partition Number Number of the partition. Partition Type Type of the partition. Boot Partition Indicates whether the partition is the boot partition. Size Size of the partition, in GB. Name Name of the logical disk. Description Volume label of the logical disk and DVD/CD-ROM. When the logical disk has no volume label, this field displays Local Disk. File System File system of the logical disk. 148

160 Software List area Patch List area Process List area Service List area Share List area SN Serial number assigned to the logical disk by the operating system. Total Size Total size of the logical disk, in GB. The total size of a logical disk is the sum of free space plus used space. Software Name Name of the software. Software Version The software version. Installed on Date on which the software was installed on the asset. Software Name Name of the software for which the patch is installed. A single software product might have multiple patches installed. Software Version The software version for which the patch is installed. Patch Name Name of the patch. Installed on Date on which the patch was installed. Patch Type Type of the patch. Description Description of the patch. Process Name Name of the process. Created at Time when the process was executed on the asset. Service Name Name of the service. Service Display Name Description of the service. Startup Type Startup type for the service: Auto Manual Disabled Service Status Status of the service: Running Stopped Paused Starting Stopping Waiting Pausing Unknown Share Number Share number assigned by the DAM server. Share Name Name of the shared directory. Local Path Path of the shared directory. Share Type Type of the shared directory: Common Share A share type securing the shared file by specifying the permitted users or user groups and setting the permission level. When using this share type, the user should delete Everyone from the Group or user names list to prevent unauthorized users from accessing the shared file. 149

161 Port List area Default Share The default share type provided by Windows. This share type is vulnerable to attacks. Others IPC$ share used in Windows. Object Domain Domain name of the user or user group of the share. This parameter is available only when the share type is Common Share. An empty field indicates that the share user or user group does not belong to any domain. Object Name Name of the user or user group of the share. This parameter is available only when the share type is Common Share. Object Type Type of the user or user group of the share. An empty field indicates that the share user or user group does not belong to any object type. System Group Object permitted or denied access to the share is a system-defined operating system user group. Custom Group Object permitted or denied access to the share is a user-defined operating system user group. User Object permitted or denied access to the share is a user. Right of Object Permission that the user or user group has to the share. This field is available only when the share type is Common Share. The permission can be Read Only, Read Write, or All. Control Type Control type of the object: Permit or Deny. This parameter is available only when the share type is Common Share. This area displays all processes associated with active ports on the asset, including processes that use a local port as a listening port, and processes that use a local port to connect to a remote host. Process Name Name of the process that listens for a local port or has connected to a remote host using a local port. Process ID ID of the process, which is assigned by the operating system of the asset. Local IP IP address of the asset. Local port Listening port of the asset used by the process. Remote IP IP address of the host to which the asset has connected. Remote Port Port used by the remote host to connect to the asset. Status Connection status of the process. Protocol Protocol type used by the process: TCP or UDP. Process Path Local path of the process on the asset. Viewing the asset list 2. From the navigation tree, select Desktop Asset Manager > All Assets. The asset list displays all assets in DAM. To view the asset list of a specific asset group, select the asset group name under Desktop Asset Manager > All Assets in the navigation tree. Viewing asset details DAM uses the inode client to collect and report information about assets registered to the EAD server. Asset information is displayed on the Asset Details page. The Action menu on this page allows operators to perform various operations for assets. 150

162 Accessing the Asset Details page Method 1 2. From the navigation tree, select Desktop Asset Manager > All Assets. The asset list displays all assets in DAM. 3. Click the asset number for the asset to view its detailed information. Method 2 The Asset Details page appears. 2. Click an asset group name located under the All Assets branch in the navigation tree. The asset list displays only the assets that belong to the asset group. 3. Click the asset number for the asset to view detailed information. Viewing hardware details The Asset Details page appears. To display the Hardware Details page, click the Details link in the Hardware Information area. Performing actions The Action menu at the upper right on the Asset Details page enables you to apply management and configuration options to the selected asset. Use the menu options to refresh the current Asset Details page, scan and modify the selected asset, or delete the asset from DAM. You can also view the software deployment history, USB monitor and printer monitor information, and change history of asset software and hardware. Regroup Use the Regroup option to move a selected asset from its current group to another group. 1. Select Regroup from the Action menu. The Regroup Assets page appears. 2. Click the Select Asset Group icon next to the Group Name field. The Select Asset Group page appears. 3. Select a group and click OK. The Group Name field is populated with the selected asset group. 4. Click OK. For more information, see "Regrouping an asset." Modify Use the Modify option to modify the owner, group control scheme, asset control scheme, location, asset type, vendor, model, and remarks for the selected asset. 1. Select Modify from the Action menu. The Modify Asset page appears. 2. Modify the following parameters for the asset: Owner Click Select next to the Owner field. The Select User dialog box appears. Select a new owner for the asset and click OK. Group Control Scheme You cannot modify the control scheme assigned to the asset group where the asset resides. Asset Control Scheme Select a control scheme for the asset. Location Enter the location of the asset. 151

163 Asset Type Select an asset type. Vendor Enter the asset vendor. Model Enter the asset model. Remarks Enter remarks for the asset. 3. Click OK. Delete The top of the Asset Details page is updated to reflect the modifications. Use the Delete option to delete an asset from DAM. This option is not available for online assets. 1. Select Delete from the Action menu. 2. Click OK in the dialog box that appears. Scan Changes Use the Scan Changes option to collect the asset changes to DAM. 1. Select Scan Changes from the Action menu. The top of the Asset Details page is updated to display the scan process. 2. Select Refresh from the Action menu to view any updates to asset details. Scan All Information Use the Scan All Info option to collect the most recent asset information to DAM. 1. Select Scan All Info from the Action menu. The top of the Asset Details page is updated to display the scan process. 2. Select Refresh from the Action menu to view the most recent asset details. SW Deployment Use the SW Deployment option to view the software deployment history for an asset. 1. Select SW Deployment from the Action menu. The Software Deploy Task List displays all software deploy tasks that include the asset in their deployment targets. Software deploy task list contents Task Name Name of the software deploy task. Execution time Time when the software deploy task was executed. Software Name Name of the software deployed in the task. Status Status of the software deploy task: Not Executed Deployment Succeeded Deployment Failed Download Succeeded Download Failed 2. Click Back to return to the Asset Details page. USB File Transfer Use the USB File Transfer option to view USB monitoring information for the asset. 1. Select USB File Transfer from the Action menu. The USB File Transfer Log List displays USB monitoring information. USB file transfer log list contents Asset Number Number of the asset on which a USB storage device is used. Asset Name Name of the asset on which a USB storage device is used. 152

164 Owner Owner of the asset on which a USB storage device is used. Logic Drive Drive letter of the USB storage device displayed on the asset. USB Plugged (Server) Time recorded by the DAM server when the USB storage device was connected to the asset. USB Unplugged (Server) Time recorded by the DAM server when the USB storage device was disconnected from the asset. Details Click the Details icon to view detailed USB storage device usage information. 2. Click Back to return to the Asset Details page. Printer Use Use the Printer Use option to view printer usage information for an asset. 1. Select Printer Use from the Action menu. The Printer Usage Log List displays printer usage information. Printer Usage Log List contents Asset Number Number of the asset that submitted a printer task. Asset Name Name of the asset that submitted a printer task. Owner Owner of the asset that submitted a printer task. Printer Name Name of the printer used by the asset. File Name Name of the printed file. Printed Pages Number of printed pages. Report Time Time recorded by the DAM server when the asset used the printer. Share Printer Indicates whether the printer is a shared printer. 2. Click Back to return to the Asset Details page. Check Asset Files Use the Check Asset Files option to search files on the asset for auditing. 1. Select Check Asset Files from the Action menu. The Add Check Task page appears. 2. Configure the following parameters: Check Files in Enter the absolute path of the file you want to audit, ending with a backward slash (\). File Name Includes Enter a partial or complete file name. The file name can contain the wildcard characters asterisk (*) and question mark (?). An asterisk can match zero or more characters. A question mark matches any character except the dot (.), and matches zero characters or one character when it is placed in front of the dot, or one character when it is placed after the dot. The file name cannot contain four or more consecutive question marks or any of the following characters: angle brackets (< >), quotation mark ("), forward slash (/), backward slash (\), and vertical bar ( ). Do not use file names that contain only wildcard characters and dot, such as?*.*?. Description Enter a description of the audit. 3. Click Start. The asset file check list displays all asset file check tasks that have been executed. To export the audit result, click the Export icon for the asset file check task. To view detailed audit information, click the Details icon for the asset file check task. For more information, see "Terminal file audit." 153

165 Change History Use the Change History option to view the change history of software and hardware on the asset. 1. Select Change History from the Action menu. The Asset Change History displays the change history of the asset. Asset change history list content Change Type Type of the change. Change Item Name of the changed item. Click the content of this field to display the Asset Software Change Details page or Asset Hardware Change Details page. Changed on Time when the change occurred. 2. Click Back to return to the Asset Details page. Refresh Use the Refresh option to reload the current Asset Details page, and capture any updates to the asset details. Querying assets DAM allows operators to query assets through a basic query or an advanced query. A basic query has several key criteria for a quick search. An advanced query has query criteria for a precise match. Performing a basic query 2. From the navigation tree, select Desktop Asset Manager > All Assets. The asset list displays all assets in DAM. 3. Click Basic Query at the upper right corner of the page. When Advanced Query is displayed at the upper right corner of the page, you are already in basic query mode. Skip this step. 4. Specify one or more of the following query criteria: Asset Number Enter a partial or complete asset number.. Asset Name Enter a partial or complete name of the asset. Owner Enter a partial or complete owner name of the asset. Group Name Click the Select Asset Group icon, select a group and click OK in the Select Asset Group page. The Group Name field is automatically populated with the selected asset group. Empty fields are ignored. 5. Click Query. The asset list displays all assets that match the query criteria. 6. To clear the query criteria, click Reset. The asset list displays all assets. Performing an advanced query 2. From the navigation tree, select Desktop Asset Manager > All Assets. The asset list displays all assets. 3. Click Advanced Query at the upper right corner of the page. When Basic Query is displayed at the upper right corner of the page, you are already in advanced query mode. Skip this step. 4. Specify one or more of the following query criteria: 154

166 Asset Number Enter a partial or complete asset number. Asset Name Enter a partial or complete name of the asset. Status Select the asset status: Online Asset is managed and online. Offline Asset is managed and offline. Unmanaged Asset is not managed by DAM. Group Name Click the Select Asset Group icon. The Select Asset Group page appears. Select a group and click OK. The Group Name field is automatically populated with the selected asset group. Owner Enter a partial or complete owner name of the asset. User Enter a partial or complete user name. All assets that the user has recently used or is currently using are queried. Inserted at from/to Specify the time range when the asset was manually added to DAM or automatically numbered by DAM. You can click the Select Date and Time icon select the time, or enter a date in YYYY-MM-DD format. Last Logoff from/to Specify the time range when the asset last went offline. You can click the Select Date and Time icon format. to select the time, or enter a date in YYYY-MM-DD Asset Type Select an asset type to be queried. Options are PC, Laptop, Server, Workstation, and Others. Vendor Enter a partial or complete vendor of the asset. Model Enter a partial or complete model of the asset. ACK Status Select the acknowledgment status of the asset. Use this criterion in automatic numbering mode. In manual numbering mode, the ACK Status is Yes for all assets. Remarks Enter a partial or complete description of the asset. 5. Specify operating system criteria for query. Select By Operating System, and then specify one or more of the following query criteria: Operating System Enter a partial or complete operating system version. For example, Windows Vista or Windows 7. Operating System Language Select a partial or complete operating system language: Chinese (PRC) or English. Operating System Patch Enter the operating system patch, for example, Service Pack 1, Service Pack 2, or R2. Multiple Operating Systems Select this option to allow multiple operating systems to be installed on the asset to be queried. Operating System Serial Number Enter the serial number of the operating system. 6. Specify main-board criteria for query. Select By Mainboard, and then enter the following query criterion: Model Enter a partial or complete model for the main board. 7. Specify software criteria for query. Select By Software, and then specify one or more of the following query criteria: Software Name Enter a partial or complete software name. Software Version Enter a partial or complete software version. to 155

167 Installation Status Specify whether the software is installed on the asset: Installed or Uninstalled. 8. Specify patch criteria for query. Select By Patch, and then specify one or both of the following query criteria: Patch Name Enter a partial or complete patch name. For example, KB Installation Status Specify whether the patch is installed on the asset: Installed or Not installed. 9. Specify screen-saver criteria for query. Select By Screen Saver, and then specify one or both of the following query criteria: Screen Saver Specify whether the screen saver is enabled: Yes or No. Display Logon Screen on Resume Specify whether the password is specified for the screen saver: Yes or No. 10. Specify memory criteria for query. Select By Memory, and then specify the following query criterion: Total Memory from/to Specify a range of the total memory for the asset, in MB. 11. Specify CPU criteria for query. Select By Processor, and then specify one or both of the following query criteria: Number of Processors from/to Specify the range of the total number of CPUs for the asset. Processing Frequency from/to Specify a range of CPU frequency for the asset. 12. Specify NIC criteria for query. Select By NIC, and then specify one or both of the following query criteria: Number of NICs from/to Specify a range of the total number of NICs installed on the asset. MAC Address Enter a partial or complete MAC address of a NIC installed on the asset. 13. Specify hard disk drive criteria for query. Select the By Hard Disk Drive box, and then specify one or both of the following query criteria: Number of Hard Disk Drives from/to Specify a range of the total number of hard disk drives installed on the asset. Total Disk Capacity from/to Specify a range of total disk capacity, in GB. 14. Specify IP address criteria for query. Select By IP Address, and then specify the following query criterion: IP Address from/to Specify a range of IP addresses. All assets with IP addresses last reported by the inode client in the range are queried. 15. Specify IPv6 address criteria for query. Select By IPv6 Address, and then specify the following query criterion: IPv6 Address from/to Specify a range of IPv6 addresses. All assets with IPv6 addresses last reported by the inode client in the range are queried. 16. Specify process criteria for query. DAM queries assets by the process information last reported by the inode client. Select By Process, and then specify one or both of the following query criteria: Process Name Enter a partial or complete name of the process. Process Status Select the status of the process: Running or Stopped. 17. Specify service criteria for query. DAM queries assets by the service information last reported by the inode client. Select By Service, and then specify one or more of the following query criteria: Service Name Enter a partial or complete service name. A service has both a service name and a service display name. Operators can view the service name in the Service Control Manager of the operating system. 156

168 Service Display Name Enter a partial or complete service display name. A service has both a service name and a service display name. Operators can view the service display name in the Service Control Manager of the operating system. Installation Status Select the installation status of the service: Installed or Uninstalled. Service Status Select the running status of the service: Running or Other. The following states are categorized as Other: Stopped Paused Starting Stopping Waiting Pausing Unknown 18. Click Query. The asset list displays all assets that match the query criteria. 19. To clear the query criteria, click Reset. The asset list displays all assets. To query assets in a specific asset group, click the asset group name located under Desktop Asset Manager > All Assets in the navigation tree, and then specify the query criteria. Managing asset models Use model management to add, modify, and delete asset models. If auto numbering is enabled and auto registration is disabled in system settings, DAM deploys a model list to endpoint users who have requested asset registration. The endpoint users can select a model from the list to register an asset. Querying asset models 2. From the navigation tree, select Desktop Asset Manager > All Assets. The All Assets page appears. 3. Click the Manage Models link. The Model Management page appears. 4. In the Query Models area, perform the following steps: a. Enter a partial or complete asset model name in the Name field. b. Click Query. Adding an asset model The asset model list displays all models that match the specified asset model name. To clear the query criterion and display all asset models, click Reset. To select asset models for assets, add asset models before adding assets: 1. Access the Model Management page. 2. Click Add. The Add Model page appears. 3. Configure the following parameters: Name Enter the name of the asset model. Vendor Enter of the vendor of the asset model. 157

169 Description Enter of the description of the asset model. 4. Click OK. Modifying an asset model 1. Access the Model Management page. 2. In the asset model list, click the Modify icon for an asset model. The Modify Model page appears. 3. Configure asset model parameters. 4. Click OK. Deleting an asset model 1. Access the Model Management page. 2. In the asset model list, click the Delete icon for an asset model. A confirmation dialog box appears. 3. Click OK. Adding an asset In manual numbering mode, operators must manually add asset information, such as asset numbers (required), owners, asset groups, and desktop control schemes in DAM. When an access user logs in, the inode client prompts the user to enter the asset number to complete the registration process. In automatic numbering mode, assets are displayed automatically in DAM. When an access user logs in, DAM automatically numbers the asset, and prompts the user to enter the asset model, position, vendor, type, and description to complete the registration process. To manually add an asset: 2. From the navigation tree, select Desktop Asset Manager > All Assets. The asset list displays all assets in DAM. 3. Click Add. The Add Asset page appears. 4. Enter the asset number in the Asset Number field. 5. Select an owner for the asset. a. Click Select next to the Owner field. The Select User page appears. b. Filter users with a basic or advanced query. The Select User feature is displayed above the User List. The Advanced Query link is a toggle switch between Basic Query and Advanced Query. When the link displays Advanced Query, you are in basic query mode, and vice versa. c. Specify one or more of the following query criteria: User Name Enter a partial or complete user name. Identity Number Enter a partial or complete user identity number. Contact Address Enter the contact address for the user. This field is available for advanced queries only. Telephone Enter a partial or complete telephone number for the user. This field is available for advanced queries only. Enter a partial or complete address for the user. This field is available for advanced queries only. 158

170 User Group Click the Select User Group icon. On the Select User Group page that appears, select a group and click OK. Empty fields are ignored. d. Click Query. The User List displays all users matching the query criteria. e. Select a user from the list. f. Click OK. 6. Configure the following parameters: Group Name Click the Select Asset Group icon. The Select Asset Group page appears. Select a group and click OK. When the Use User Groups option is selected, the system automatically populates this field with the user group to which the asset owner belongs. Group Control Scheme The system automatically populates the field with the same desktop control scheme that is assigned to the asset group. Asset Control Scheme Select a desktop control scheme for the asset, or select Disable Control Scheme when you do not want to apply any control scheme to the asset. The desktop control scheme configuration can be on a group basis or an asset basis. The group basis configuration applies to all assets in the same group, but can be overridden by the asset basis configuration. Location Enter the location of the asset. Asset Type Select an asset type from the list: PC Laptop Server Workstation Others Vendor Select the vendor for the asset. Model Select the model for the asset. Remarks Enter remarks for the asset. 7. Click OK. Batch importing assets Operators can batch import assets from a file that contains asset information. Asset information can be separated by a space, tab, comma (,), colon (:), pound sign (#), or dollar sign ($). The file can use only one type of separator. To batch import assets: 2. From the navigation tree, select Desktop Asset Manager > All Assets. The asset list displays all assets in DAM. 3. Click Batch Import. The Batch Import Assets page appears. 4. Configure the following parameters: Import File Click Browse next to the Import File field. The Choose File page appears. Browse to the target file that contains the asset information. The file must be a text file with columns separated by delimiters. The system automatically populates the field with the file path and name. 159

171 Column Separator Select the column separator to use as the delimiter in the file. Options are space, tab, comma (,), colon (:), pound sign (#), and dollar sign ($). 5. Click Next. The Basic Information page appears. 6. Configure basic information for the import task: Asset Number Select the column in the file that contains the asset number. Asset Group Click the Select Asset Group icon. The Select Asset Group page appears. Select a group and click OK. The group name is automatically populated in the Asset Group field. Owner Select the column in the file that contains the asset owner, or select Not Import from File. Owner ID Number Select the column in the file that contains the owner ID, or select Not Import from File. This field is not available when the Owner field is set to Not Import from File. The Owner ID Number uniquely identifies a user as the asset owner in case of duplicated user names. Asset Name Select the column in the file that contains the asset name, or select Not Import from File. To configure the same asset name for all assets, select Not Import from File and enter the settings manually. Location Select the column in the file that contains the asset location, or select Not Import from File to set the same location for all imported assets manually. Asset Type Select the column in the file that contains the asset type, or select Not Import from File and then select an asset type for all imported assets. Options are: PC Laptop Workstation Server Others (which includes any other asset type) Vendor Select the column in the file that contains the asset vendor, or select Not Import from File to set the same vendor for all imported assets manually. Model Select the column in the file that contains the asset model, or select Not Import from File to set the same asset model for all imported assets manually. Remarks Select the column in the file that contains remarks for the asset, or select Not Import from File to enter remarks manually. 7. To view the first 10 assets imported according to your settings, click Preview. 8. To import all assets in the file to DAM, click OK. The Import Asset Result page appears. 9. Click Download to download the result. 10. Click Back to return to the asset list. Modifying an asset 2. From the navigation tree, select Desktop Asset Manager > All Assets. The asset list displays all assets in DAM. 3. Click the Modify icon for the asset you want to modify. The Modify Asset page appears. 4. Select an owner for the asset. 160

172 a. Click Select next to the Owner field. The Select User page appears. b. Filter users using a basic or advanced query. The Select User feature is displayed above the User List. The Advanced Query link is a toggle switch between Basic Query and Advanced Query. When the link displays Advanced Query, you are in basic query mode, and vice versa. c. Specify one or more of the following query criteria: User Name Enter a partial or complete user name. Identity Number Enter a partial or complete user identity number. Contact Address Enter a partial or complete contact address for the user. This field is available for advanced queries only. Telephone Enter the telephone number for the user. This field is available for advanced queries only. Enter a partial or complete address of the user. This field is available for advanced queries only. User Group Click the Select User Group icon. On the Select User Group page, that appears, select a group and click OK. Open Account Select this option to create a self-service account for the user. A self-service account on the IMC platform allows a user to access the SOM console. Account Name Enter a partial or complete user account name. Empty fields are ignored. d. Click Query. The User List displays all users matching the query criteria. e. Select a user from the list. f. Click OK. 5. Configure the following parameters: Group Name Click the Select Asset Group icon. The Select Asset Group page appears. Select a group and click OK. When the Use User Groups option is selected, the system automatically populates this field with the user group to which the asset owner belongs. Group Control Scheme The system automatically populates the field with the same desktop control scheme that is assigned to the asset group. Asset Control Scheme Select a desktop control scheme for the asset, or select Disable Control Scheme when you do not want to apply any control scheme to the asset. The desktop control scheme configuration can be on a group basis or an asset basis. The group basis configuration applies to all assets in the same group, but can be overridden by the asset basis configuration. Location Enter the location of the asset. Asset Type Select an asset type from the list: PC Laptop Server Workstation Others Vendor Enter the vendor information of the asset. Model Enter the asset model. Remarks Enter remarks for the asset. 161

173 6. Click OK. Deleting an asset After deleting an asset, the asset number and all other asset information is removed permanently from the DAM database. To resubmit this asset to DAM management, you must re-register the asset. To delete an asset: 2. From the navigation tree, select Desktop Asset Manager > All Assets. The asset list displays all assets in DAM. 3. Select the box next to the Status field for the asset you want to delete. 4. Click Delete. Regrouping an asset Operators can manually move assets between asset groups. However, if the Use User Groups option is selected, DAM automatically assigns each asset to the user group to which its owner belongs, and prohibits operators from manually moving assets between asset groups. To regroup an asset: 2. From the navigation tree, select Desktop Asset Manager > All Assets. The asset list displays all assets in DAM. 3. Select the box next to the Status field for the asset you want to regroup. 4. Click Regroup. The Regroup Assets page appears. 5. In the Target Group area, click the Select Asset Group icon. The Select Asset Group page appears. 6. Select an asset group and click OK. The Select Asset Group page closes. 7. On the Regroup Assets page, click OK. Verifying an asset When asset verification is enabled, asset information must be approved by an operator before they are registered with DAM. If asset information is rejected, asset registration fails. This feature is available only when both automatic numbering and manual registration are enabled in DAM service settings. For more information, see "Configuring service parameters." Viewing the asset verification list 2. From the navigation tree, select Desktop Asset Manager > Verify Asset. The asset verification list displays all asset records to be verified. Status Verification state of the asset: Pending or Disapproved. Asset Number Number of the asset automatically assigned by DAM. Asset Name Host name of the asset submitted by the user. 162

174 Model Model of the asset submitted by the user. Owner Owner of the asset submitted by the user. Inserted at Time when DAM received the asset information. Last Verification Time Time when the asset was disapproved. 3. Click Refresh to view the most recent asset verification list. Viewing asset details 2. From the navigation tree, select Desktop Asset Manager > Verify Asset. 3. Click the asset number of an asset to view detailed information. The page displays the following contents: Asset Number Number of the asset automatically assigned by DAM. Asset Name Host name of the asset. This parameter is specified when the user submits the asset information for registration. Status Verification state of the asset: Pending or Disapproved. Owner Owner of the asset. This parameter is specified when the user submits the asset information for registration. Asset Type Type of the asset. This parameter is specified when the user submits the asset information for registration. Vendor Vendor of the asset. This parameter is specified when the user submits the asset information for registration. Model Model of the asset. This parameter is specified when the user submits the asset information for registration. Client Language Language of the inode client. Client Version Version number of the inode client. Location Position of the asset. This parameter is specified when the user submits the asset information for registration. Inserted at Time when DAM received the asset information. Last Verification Time Time when the asset was disapproved. Remarks Descriptive information of the asset. This parameter is specified when the user submits the asset information for registration. Verifying an asset 2. From the navigation tree, select Desktop Asset Manager > Verify Asset. 3. Click the asset number of the asset you want to verify. The page displays asset details. 4. Verify asset information. 5. Click Back Click Back to return to the asset verification list page. 6. Click Approve or Disapprove. Approved assets are registered with DAM. Disapproved assets will not be registered. Users must resubmit asset information for registration. 163

175 Deleting asset records Use this function to delete asset records that no longer need to be verified. 2. From the navigation tree, select Desktop Asset Manager > Verify Asset. 3. Select one or more asset records. 4. Click Delete. Exporting asset information The asset export function allows operators to use the query function to produce a list of assets to be exported, and then export those assets to an export file. Operators can either export basic information or all information for the asset. The basic information includes the contents of the System Information area on the Asset Details page. This information can be exported to a text file. All information is exported to a zip file that contains multiple HTML files, including the asset list page and Asset Details page. The asset list page provides export information, export criteria, and hyperlinks to the assets. The Asset Details page contains detailed information about the assets. For more information, see "Asset details." Asset export function asset list Asset Number Asset number of the asset. Asset Name Name of the asset. Owner Owner of the asset. Asset Group Group to which the asset belongs. Inserted at Time when the asset was manually added to DAM or automatically numbered by DAM. Group Name Click the Select Asset Group icon. The Select Asset Group page appears. Select a group and click OK. The selected asset group is automatically populated in the Group Name field. Exporting asset information 2. From the navigation tree, select Desktop Asset Manager > All Assets. The asset list displays all assets in DAM. 3. Filter the assets using a basic or advanced query in the Query Asset area. For more information, see "Querying assets." 4. Click Export. The Export Contents page appears. All listed assets that match the query criteria are exported. 5. Configure the following parameters: Export Contents Select the content to be exported: Basic Information, Detail Information or Hardware Information. When you select Basic Information, you can export asset information only to a text file, and you must select a column separator. Options are space, tab, comma (,), colon (:), pound sign (#), and dollar sign ($). 164

176 When you select Detail Information, the File Type and File Column Separator fields do not appear. When you select Hardware Information, you can export asset information to an.xls file and the file includes asset number, asset name, and owner information by default. You can select other hardware information to be exported, including BIOS, memory, and CPU information. File Type When Export Contents is set to Basic Information, this field appears and displays TXT, which cannot be modified. File Column Separator Select the column separator to use as the delimiter in the file. Options are space, tab, comma (,), colon (:), pound sign (#), and dollar sign ($). This field does not appear when Export Contents is set to All Information. 6. Click OK. The Asset Export Results page appears. 7. Click Download to download the result. 8. Click Back to return to the asset list. NOTE: To ensure fast and stable user authentication, do not perform any batch operations if there are several user authentication processes running. Asset export history list contents Export File Name Name of the export file. Export File Path Path of the export file. Operator Operator who exported the asset information. Exported at Time when the asset information was exported. Download File Click the Download link to download the export file. Delete Click the Delete icon to delete the asset export file. Viewing the asset export history 2. From the navigation tree, select Desktop Asset Manager > All Assets. The asset list displays all assets in the DAM database. 3. Click Export History at the upper right of the Assets List. The Asset Export History List displays the export history of asset information. 4. Click Back to return to the asset list. Downloading the asset export history record 2. From the navigation tree, select Desktop Asset Manager > All Assets. The All Assets page appears. 3. Click Export History in the asset list area. The Asset Export History List displays all asset export history records. 4. Click the Download link for the export history record you want to download. 165

177 5. Open or save the export history record. Deleting the asset export history record 2. From the navigation tree, select Desktop Asset Manager > All Assets. The All Assets page appears. 3. Click Export History in the asset list area. The Asset Export History List displays all asset export history records. 4. Click the Delete icon for the export history record you want to delete. A confirmation dialog box appears. 5. Click OK. Collecting asset statistics DAM allows operators to collect statistics for registered assets by asset type, CPU frequency, hard disk size and type, operating system version and language, and software installed. The data collection target can be all assets or a specific asset group and its subgroups. Operators can collect statistics only for groups and subgroups for which they have privileges. Collecting statistics by asset type Operators can collect statistics for all assets or a specific asset group by asset type: PC Laptop Server Workstation Others Viewing asset type statistics reports 2. From the navigation tree, select Desktop Asset Manager > Asset Statistics. The Asset Statistics page appears. 3. Click the Type icon in the Asset Statistics area. The Statistics of Types page appears. By default, the report displays statistics for all asset groups to which the operator has privileges. 4. Click the Select Asset Group icon next to the Group Name field. The Select Asset Group page appears. 5. Select a group and click OK. The Group Name field is populated with the selected asset group. 6. Select a report type ( Pie Chart or List). 7. Click Query. The query results appear under the Asset Query area. 8. Click Reset to restore the default. The report displays statistics for all asset groups to which the operator has privileges. 166

178 Asset type statistics reports Asset type statistics report Pie chart This report displays, in a pie chart, the number of assets of each asset type and their proportion, as shown in Figure 9. Figure 9 Asset type statistics report Pie chart Asset type statistics report List This report lists the number of assets of each asset type and their proportion, as shown in Figure 10. Figure 10 Asset type statistics report List Collecting statistics by CPU Operators can collect statistics for all assets or a specific asset group by CPU frequency. Viewing CPU frequency statistics reports 2. From the navigation tree, select Desktop Asset Manager > Asset Statistics. The Asset Statistics page appears. 3. Click the CPU icon in the Asset Statistics area. The Statistics of CPU page appears. By default, the report displays statistics for all asset groups to which the operator has privileges. 4. Click the Select Asset Group icon next to the Group Name field. The Select Asset Group page appears. 167

179 5. Select a group and click OK. 6. Select a report type (Pie Chart or List). 7. Click Query. The query results appear under the Asset Query area. 8. Click Reset to restore the default. The report displays statistics for all asset groups to which the operator has privileges. CPU frequency statistics reports CPU frequency statistics report Pie chart This report displays, in a pie chart, the number of CPUs in each frequency range and their proportion, as shown in Figure 11. Figure 11 CPU frequency statistics report Pie chart CPU frequency statistics report List This report lists the number of CPUs in each frequency range and their proportion, as shown in Figure 12. Figure 12 CPU frequency statistics report List Collecting statistics by hard disk Operators can collect statistics for all assets or a specific asset group by hard disk capacity and type. Viewing hard disk capacity and type statistics reports 2. From the navigation tree, select Desktop Asset Manager > Asset Statistics. 168

180 The Asset Statistics page appears. 3. Click the Hard Disk icon in the Asset Statistics area. The Hard Disk Statistics page appears. The report displays statistics for assets in all asset groups to which the operator has privileges. 4. Click the Select Asset Group icon next to the Group Name field. The Select Asset Group page appears. 5. Select a group and click OK. The Group Name field is populated with the selected asset group. 6. Select a report type (Pie Chart or List). 7. Click Query to submit your filter criteria. The results of your filter or search query are displayed under the Asset Query area. 8. Click Reset to restore the default. The report displays statistics for all asset groups to which the operator has privileges. Hard disk capacity and type statistics reports Hard disk capacity statistics report Pie chart This report displays, in a pie chart, the number of hard disks in each capacity range and their proportion, as shown in Figure 13. Figure 13 Statistics report by hard disk size Pie chart Hard disk capacity statistics report List This report lists the number of hard disks in each capacity range and their proportion, as shown in Figure

181 Figure 14 Statistics report by hard disk capacity List Hard disk type statistics report Pie chart This report displays, in a pie chart, the number of hard disks of each type and their proportion, as shown in Figure 15. Figure 15 Statistics report by hard disk type Pie chart Hard disk type statistics report List This report lists the number of hard disks of each type and their proportion, as shown in Figure 16. Figure 16 Statistics report by hard disk type List Collecting statistics by operating system Operators can collect statistics for all assets or a specific asset group by operating system version and language. 170

182 Viewing operating system version and language statistics reports 2. From the navigation tree, select Desktop Asset Manager > Asset Statistics. The Asset Statistics page appears. 3. Click the OS icon in the Asset Statistics area. The Statistics of OS page appears. The report displays statistics for assets in all asset groups to which the operator has privileges. 4. Click the Select Asset Group icon next to the Group Name field. The Select Asset Group page appears. 5. Select a group and click OK. The Group Name field is populated with the selected asset group. 6. Select a report type (Pie Chart or List). 7. Click Query to submit your filter criteria. The results of your filter or search query are displayed under the Asset Query area. 8. Click Reset to restore the default. The report displays statistics for all asset groups to which the operator has privileges. Operating system version and language statistics reports Operating system version statistics report Pie chart This report displays, in a pie chart, the number of operating systems of each version and their proportion, as shown in Figure 17. Figure 17 Statistics report by operating system version Pie chart Operating system version statistics report List This report lists the number of operating systems of each version and their proportion, as shown in Figure

183 Figure 18 Statistics report by operating system version List Operating system language statistics report Pie chart This report displays, in a pie chart, the number of operating systems using each language and their proportion, as shown in Figure 19. Figure 19 Statistics report by operating system language Pie chart Operating system language statistics report List This report lists the number of operating systems using each language and their proportion, as shown in Figure

184 Figure 20 Statistics report by operating system language List Collecting statistics by software installed Operators can use the Asset Statistics function to collect statistics for all assets or a specific asset group by software installed. Viewing software installation statistics reports 2. From the navigation tree, select Desktop Asset Manager > Asset Statistics. The Asset Statistics page appears. 3. Click the Software icon in the Asset Statistics area. The Statistics of Software page appears. By default, the report displays statistics for all asset groups to which the operator has privileges. 4. Click the Select Asset Group icon next to the Group Name field. The Select Asset Group page appears. 5. Select a group and click OK. The Group Name field is populated with the selected asset group. 6. Select List from the Report Type field. 7. Click Query to submit your filter criteria. The results of your filter or search query are displayed under the Asset Query area. 8. Click Reset to restore the default. The report displays statistics for all asset groups to which the operator has privileges. Software installation statistics report This report lists statistics for software installed on all assets or assets in selected asset groups, as shown in Figure

185 Figure 21 Software installation statistics report Managing export tasks Operators can schedule a task to export and save all USB file transfer logs to a directory or FTP server as a CSV file or TXT file. Viewing the export task management list To view the export task management list: 2. From the navigation tree, select Desktop Asset Manager > Export Task. The Export Task List displays the USB monitor task. Export Task List contents Task Name Name of the export task: USB Monitor. Export file path (imc installation directory) Export file path of the USB file transfer logs in the IMC installation directory. Status Indicates whether the export task is enabled. By default, this field displays Disabled. Config Click the Config icon to configure the export task. Configuring the export task 2. From the navigation tree, select Desktop Asset Manager > Export Task. The Export Task List displays all export tasks. 174

186 3. Click the Configure icon for the USB monitor task you want to configure. The USB Monitor page appears. 4. Select Enable Automatic Export to enable automatic export of USB file transfer logs. If you skip this step, the scheduled export task is not executed. Configure the following parameters for the export task: Export Interval Select the interval at which the task is executed: Daily or Monthly. File Type Select the format of the export file: TXT or CSV. When you select TXT format, you must select a separator for the file. Options are space, tab, comma (,), colon (:), pound sign (#), and dollar sign ($). Task Description Enter a brief description of the task. Prefix of Export File Enter a prefix for the name of the export file. The export file name is composed of the prefix and the system time when the file was exported. For example, when you set the prefix to Backup, the export file name may be Backup , where indicates the time when the file was exported, to the second. Separator Specify the delimiter to use between data fields in the exported file. Options are space, tab, comma (,), colon (:), pound sign (#), and dollar sign ($). This field appears only when the File Type is set to TXT. 5. Select Export to FTP Server field when you want to export USB file transfer logs to an FTP server. To export USB file transfer logs to the work directory of a specific FTP user, configure the following parameters: FTP Server IP Enter the IP address of the FTP server. FTP Username Enter the user name used to log in to the FTP server. FTP Password Enter the password used to log in to the FTP server. Confirm FTP Password Enter the same FTP password again. To export USB file transfer logs to the FTP server anonymously, select Anonymous User and enter the FTP server address in the FTP Server IP field. 6. Click OK. 175

187 Configuring desktop control schemes and policies A desktop control scheme contains a set of policies distributed by the DAM server to each inode client for controlling desktop assets. The policies are classified as follows: Peripheral policies Disables peripheral devices, and monitors the use of USB storage devices and printers. The inode client immediately reports an event to the DAM server for auditing when a peripheral device is enabled, a USB storage device is used, or a print task is submitted. Operators can view, add, modify, and delete peripheral policies. For more information, see "Configuring peripheral policies." Energy-saving policies Implements scheduled shutdown of assets. According to the energy-saving policy, the inode client displays a message 10 minutes before the scheduled shutdown time, requesting a computer shutdown, and then forcibly shuts down the computer if the user does not respond. Operators can view, add, modify, and delete energy-saving policies. For more information, see "Configuring energy-saving policies." Monitoring alarm policies Enables the DAM server to encapsulate monitoring information in syslogs and send them to the specified syslog server. The monitoring information is reported by the inode client and includes software and hardware changes of assets, unauthorized copying, and printing of sensitive files. Operators can view, add, modify, and delete monitoring alarm policies. For more information, see "Configuring monitoring alarm policies." Configuring desktop control schemes You can view, add, modify, and delete desktop control schemes. The desktop control scheme configuration can be assigned on a group basis or asset basis. The group basis configuration applies to all assets in the same group, but can be overridden by the asset basis configuration. Desktop control scheme list contents Name Name of the desktop control scheme. Click the name to view detailed information. Peripheral Policy Name of the peripheral policy assigned to the desktop control scheme. Energy-Saving Policy Name of the energy-saving policy assigned to the desktop control scheme. Monitoring Alarm Policy Name of the monitoring alarm policy assigned to the desktop control scheme. Description Description of the desktop control scheme. Service Group Service group to which the desktop control scheme belongs. Modify Click the Modify icon to modify the desktop control scheme settings. Delete Click the Delete icon to delete the desktop control scheme. Desktop control scheme details The desktop control scheme details page has a basic information area and a policy list area. Basic Information area Name Name of the desktop control scheme. Service Group Service group to which the desktop control scheme belongs. 176

188 Policy List area Description Description of the desktop control scheme. Policy Name Name of the policy assigned to the desktop control scheme. Click the name to view detailed information. Policy Type Policy type: Peripheral Policy Energy-Saving Policy Monitoring Alarm Policy Description A description of the policy. Service Group Service group to which the policy belongs. Viewing the desktop control scheme list 2. From the navigation tree, select Desktop Asset Manager > Control Scheme. The control scheme list displays all desktop control schemes. 3. Click Refresh to refresh the control scheme list. 4. To sort the control scheme list, click the Name or Service Group column label. Viewing desktop control scheme details 2. From the navigation tree, select Desktop Asset Manager > Control Scheme. The control scheme list displays all desktop control schemes. 3. Click the name of a desktop control scheme to view detailed information. The Control Scheme Details page appears. 4. Click Back to return to the control scheme list. Adding a desktop control scheme Each desktop control scheme can contain one peripheral policy, one energy-saving policy, and one monitoring alarm policy. You must create the policies before you add them to a desktop control scheme. For more information about the configuration procedure, see "Adding a peripheral policy," "Adding an energy-saving policy," and "Adding a monitoring alarm policy." To add a desktop control scheme: 2. From the navigation tree, select Desktop Asset Manager > Control Scheme. The control scheme list displays all desktop control schemes. 3. Click Add. The Add Control Scheme page appears. 4. Configure basic information for the desktop control scheme. 5. Assign policies to the desktop control scheme in the Policy List area. Select the policy you want to assign to the desktop control scheme. You can select one peripheral policy, one energy-saving policy, and one monitoring alarm policy. 6. Click OK. 177

189 After adding the desktop control scheme, you can assign it to a single asset or a group of assets. The group basis configuration applies to all assets in the same group, but can be overridden by the asset basis configuration. For more information, see "Modifying an asset group" and "Modifying an asset." Modifying a desktop control scheme 2. From the navigation tree, select Desktop Asset Manager > Control Scheme. The control scheme list displays all desktop control schemes. 3. Click the Modify icon for the desktop control scheme you want to modify. 4. Modify the description for the desktop control scheme. You cannot modify other basic information. 5. Reassign policies to the desktop control scheme in the Policy List area. Select the policy you want to assign to the desktop control scheme. To cancel a policy, clear its box. 6. Click OK. Deleting a desktop control scheme When you delete a desktop control scheme, the scheme is removed from all associated assets and asset groups. To assign new schemes, you must modify the assets and asset groups. To delete a desktop control scheme: 2. From the navigation tree, select Desktop Asset Manager > Control Scheme. The control scheme list displays all desktop control schemes. 3. Click the Delete icon for the desktop control scheme you want to delete. A confirmation dialog box appears. 4. Click OK. Configuring peripheral policies A peripheral policy is used to disable peripheral devices and monitor the use of USB storage devices and printers. The inode client immediately reports an event to the DAM server for auditing when a peripheral device is enabled, a USB storage device is used, or a print task is submitted. Operators can view, add, modify, and delete peripheral policies. Peripheral policy list contents Policy Name Name of the peripheral policy. Click the name to view detailed information. Description Description of the peripheral policy. Illegal Types of peripheral devices prohibited by the peripheral policy. Report Indicates whether the inode client reports to the DAM server that a prohibited peripheral device is enabled on the asset. If so, this field displays Report. If not, this field is empty. Service Group Service group to which the peripheral policy belongs. Modify Click the Modify icon to modify the policy settings. Delete Click the Delete icon to delete the peripheral policy. 178

190 Peripheral policy details The peripheral policy details page has a basic information area, an unauthorized devices area, and a client message area. Basic Information area Policy Name Name of the peripheral policy. Service Group Service group to which the peripheral policy belongs. Description Description of the peripheral policy. Report Use of Unauthorized Devices Indicates whether the inode client reports to the DAM server that a peripheral device selected in the Disable Devices area is enabled on the asset. Operators can audit the peripheral use violations on the DAM server. For more information, see "Unauthorized peripheral use record audit." Monitor USB File Transfer Indicates whether USB storage device monitoring is enabled. When enabled, the inode client reports the connection, disconnection, and write events of USB storage devices to the DAM server for auditing. For more information, see "USB file transfer log audit." Monitor Printer Usage Indicates whether printer monitoring is enabled. When enabled, the inode client monitors the printers in use, and reports the following information to the DAM server for auditing: Printer name Printer type (shared or not shared) Printed file names, number of printed file pages And printed file size For more information, see "Printer use log audit." Unauthorized Devices area Select types of peripheral devices for the DAM server to disable: USB Storage USB storage devices USB Nonstorage USB nonstorage devices USB Storage Device Whitelist A list of USB storage devices that are not disabled DVD/CD-ROM DVD/CD-ROM drives Floppy Floppy disk drives PCMCIA PCMCIA interfaces COM COM interfaces LPT LPTs Client Message area Infrared Infrared devices Bluetooth Bluetooth peripheral devices interfaces Modem Modems Device Unauthorized Message Indicates whether the inode client displays a message when peripheral devices are disabled and whether $Device$ represents the name of a disabled device. 179

191 Viewing the peripheral policy list 2. From the navigation tree, select Desktop Asset Manager > Desktop Control Policy > Peripheral. The peripheral policy list displays all peripheral policies. 3. Click Refresh to refresh the peripheral policy list. 4. To sort the peripheral policy list, click the Policy Name or Service Group column label. Viewing peripheral policy details 1. Select Desktop Asset Manager > Desktop Control Policy > Peripheral. The peripheral policy list displays all peripheral policies. 2. Click the name of the peripheral policy you want to view. The Peripheral Policy Details page appears. 3. Click Back to return to the peripheral policy list. Adding a peripheral policy 2. From the navigation tree, select Desktop Asset Manager > Desktop Control Policy > Peripheral. The peripheral policy list displays all peripheral policies. 3. Click Add. The Add Peripheral Policy page appears. 4. Configure basic information for the peripheral policy. Policy Name Enter a unique name for the peripheral policy. Service Group Select the service group to which the peripheral policy belongs. Description Enter a description for the peripheral policy. Report Use of Unauthorized Devices Select the box next to the Report Use of Unauthorized Devices field to generate reports of peripheral use violations for auditing. Monitor USB File Transfer Select the box next to the Monitor USB File Transfer field to monitor use of USB storage devices for auditing. Monitor Printer Usage Select the box next to the Monitor Printer Usage field to monitor use of printers for auditing. NOTE: When you select the Monitor USB File Transfer option, the USB Storage option in the Unauthorized Devices area turns gray. You cannot disable the USB storage devices for the asset. 5. In the Unauthorized Devices area, select the peripheral device types to disable for the asset: USB Storage USB Nonstorage DVD/CD-ROM Floppy PCMCIA 180

192 COM LPT Infrared Bluetooth 1394 Modem 6. If USB storage devices are disabled, you can enter the device ID of allowed devices in the USB Storage Device Whitelist field. Only one device ID is allowed per line. A device ID has a vendor ID (VID) and a product ID (PID), separated by a slash (/), which uniquely identifies a USB storage device. 7. Click OK. The new peripheral policy appears in the peripheral policy list and in the Policy List on the Add Control Scheme page. Modifying a peripheral policy 2. From the navigation tree, select Desktop Asset Manager > Desktop Control Policy > Peripheral. The peripheral policy list displays all peripheral policies. 3. Click the Modify icon for the peripheral policy you want to modify. 4. Modify the basic information for the peripheral policy. You cannot modify Policy Name or Service Group. Description Enter a new description for the peripheral policy. Report Use of Unauthorized Devices Select the box next to the Report Use of Unauthorized Devices field to report peripheral use violations for auditing, or clear the box to disable the function. Monitor USB File Transfer Select the box next to the Monitor USB File Transfer field to monitor use of USB storage devices for auditing, or clear the box to disable the function. Monitor Printer Usage Select the box next to the Monitor Printer Usage field to monitor use of printers for auditing, or clear the box to disable the function. 5. In the Unauthorized Devices area, reselect the following peripheral device types to disable for the asset: USB Storage USB Nonstorage DVD/CD-ROM Floppy PCMCIA COM LPT Infrared Bluetooth 1394 Modem Unknown USB Devices If USB storage devices are disabled, you can enter device IDs in the USB Storage Device Whitelist field. Only one device ID is allowed per line. A device ID uniquely identifies a USB 181

193 storage device and contains a vendor ID (VID) and a product ID (PID) that are separated by a slash (/). If unknown USB storage devices are disabled, you can enter device IDs in the Unknown USB Storage Device Whitelist field. Only one device ID is allowed per line. A device ID uniquely identifies a USB storage device and contains a vendor ID (VID) and a product ID (PID) that are separated by a slash (/). This option can be used to disable the USB storage function provided by mobile phones. 6. Click OK. Deleting a peripheral policy A peripheral policy cannot be deleted when it is assigned to a desktop control scheme. To delete the policy, first remove it from the scheme. For more information, see "Modifying a desktop control scheme." To delete a peripheral policy: 2. From the navigation tree, select Desktop Asset Manager > Desktop Control Policy > Peripheral. The peripheral policy list displays all peripheral policies. 3. Click the Delete icon for the peripheral policy you want to delete. A confirmation dialog box appears. 4. Click OK. Configuring energy-saving policies Use an energy-saving policy to implement a scheduled shutdown of assets. The inode client displays a message 10 minutes before the scheduled shutdown time, requesting that the user shut down the computer, and then forcibly shuts down the computer at the designated time if the user does not respond. Operators can view, add, modify, and delete energy-saving policies. Energy-saving policy list contents Policy Name Name of the energy-saving policy. Auto Shutdown at Automatic shutdown time configured for the asset. Description Description of the energy-saving policy. Service Group Service group to which the energy-saving policy belongs. Modify Click the Modify icon to modify the policy settings. Delete Click the Delete icon to delete the energy-saving policy. Viewing the energy-saving policy list 2. From the navigation tree, select Desktop Asset Manager > Desktop Control Policy > Energy Saving. The energy-saving policy list displays all energy-saving policies. 3. Click Refresh to refresh the energy-saving policy list. 4. To sort the energy-saving policy list, click the Policy Name or Service Group column label. 182

194 Adding an energy-saving policy 2. From the navigation tree, select Desktop Asset Manager > Desktop Control Policy > Energy Saving. The energy-saving policy list displays all energy-saving policies. 3. Click Add. The Add Energy-Saving Policy page appears. 4. Configure the following parameters for the energy-saving policy: Policy Name Enter a unique name for the energy-saving policy. Service Group Select the service group to which the energy-saving policy belongs. Auto Shutdown at Enter the automatic shutdown time in the format hh:mm, where hh represents the two-digit hour in 24-hour format, and mm represents the two-digit minute. Description Enter a description for the energy-saving policy 5. Click OK. The new energy-saving policy appears in the energy-saving policy list and in the Policy List on the Add Control Scheme page. Modifying an energy-saving policy 2. From the navigation tree, select Desktop Asset Manager > Desktop Control Policy > Energy-Saving. The energy-saving policy list displays all energy-saving policies. 3. Click the Modify icon for the energy-saving policy you want to modify. The Modify Energy-Saving Policy page appears. 4. Modify the following parameters for the energy-saving policy. You cannot modify the policy name or service group. Auto Shutdown at Enter a new automatic shutdown time in the format hh:mm, where hh represents the two-digit hour in 24-hour format, and mm represents the two-digit minute. Description Enter a new description for the energy-saving policy. 5. Click OK. Deleting an energy-saving policy An energy-saving policy cannot be deleted when it is assigned to a desktop control scheme. To delete the policy, first remove it from the scheme. For more information, see "Modifying a desktop control scheme." To delete an energy-saving policy: 2. From the navigation tree, select Desktop Asset Manager > Desktop Control Policy > Energy Saving. The energy-saving policy list displays all energy-saving policies. 3. Click the Delete icon for the energy-saving policy you want to delete. A confirmation dialog box appears. 4. Click OK. 183

195 Configuring monitoring alarm policies Monitoring alarm policies enable the DAM server to encapsulate monitoring information in syslogs and send them to the specified syslog server. The monitoring information is reported by the inode client, and includes software and hardware changes of assets, unauthorized copying, and printing of sensitive files. Operators can view, add, modify, and delete monitoring alarm policies. Before you configure monitoring alarm policies, select Enable for Send Syslogs on the Service Parameters page. Otherwise, the DAM server cannot send syslogs to the specified syslog server. For more information about the configuration procedure, see "DAM service parameters." The IMC platform can serve as the syslog server to receive syslogs from the DAM server. For more information about syslog management, see HPE Intelligent Management Center v7.0 Enterprise and Standard Administrator Guide. Monitoring alarm policy list contents Policy Name Name of the monitoring alarm policy. Click the name to view detailed information. Description Description of the monitoring alarm policy. Service Group Service group to which the monitoring alarm policy belongs. Modify Click the Modify icon to modify the policy settings. Delete Click the Delete icon to delete the monitoring alarm policy. Monitoring alarm policy details The Monitoring alarm policy details page has the following areas: Basic Information USB Monitoring Printer Monitoring Basic Information area USB Monitoring area Hardware Changes Monitoring Software Changes Monitoring Policy Name Name of the monitoring alarm policy. Service Group Service group to which the monitoring alarm policy belongs. Description Description of the monitoring alarm policy. Keywords to Trigger Alarms List of keywords for triggering alarms. When the DAM server receives information about files written from the asset to a USB storage device, it checks the file names for keywords. When a keyword is found, the DAM server encapsulates the information in syslogs and sends them to the specified syslog server. Operators can view the following information on the syslog server: asset number Asset name Owner Time when the USB storage device was connected to the asset Name, size, and write time of each file written to the USB storage device 184

196 Printer Monitoring area Keywords to Trigger Alarms List of keywords for triggering alarms. When the DAM server receives information about files printed by the asset, it checks the file names for keywords. When a keyword is found, the DAM server encapsulates the information in syslogs and sends them to the specified syslog server. Operators can view the following information on the syslog server: asset number, asset name, owner, printer name, and the name, number of pages, size, and print time of each printed file. Hardware Changes Monitoring area This area lists the hardware items to be monitored. When the content of a selected item changes, the DAM server encapsulates the changes in syslogs and sends them to the specified syslog server. CPU CPU number and name. Memory Total memory of the asset. Mainboard Vendor and product model of the main board. DVD/CD-ROM Device instance path of the DVD/CD-ROM drive. NIC Device instance path. Hard Disk Hard-disk interface type and device instance path. BIOS BIOS caption, vendor, release date, and version. Software Changes Monitoring area This area lists the software items to be monitored. When the content of a selected item changes, the DAM server encapsulates the changes in syslogs and sends them to the specified syslog server. Logical Disk Logical disk name, description, file system, serial number, and total size. The logical disks are scanned and checked only when the asset starts up. Network Connections NIC serial number, IP address, DHCP status, gateway IP address, asset MAC address, and subnet mask. Operating System Operating system name, version, service pack, installation date, and language. Screen Saver Screen-saver status (enabled or disabled), display of logon screen on resume (enabled or disabled), and idle time. System Information Login name of the asset. Computer Name Computer name of the asset. Partition Hard disk number, partition number, partition type, boot partition (yes or no), and partition capacity. Software Software name and version. Reinstall OS or Other Update Operating system reinstallation and recovery. Viewing the monitoring alarm policy list 2. From the navigation tree, select Desktop Asset Manager > Desktop Control Policy > Monitoring Alarm. The monitoring alarm policy list displays all monitoring alarm policies. 3. Click Refresh to refresh the monitoring alarm policy list. 4. To sort the monitoring alarm policy list, click the Policy Name or Service Group column label. 185

197 Viewing monitoring alarm policy details 2. From the navigation tree, select Desktop Asset Manager > Desktop Control Policy > Monitoring Alarm. The monitoring alarm policy list displays all monitoring alarm policies. 3. Click the name of the monitoring alarm policy you want to view. The Monitoring Alarm Policy Details page appears. 4. Click Back to return to the monitoring alarm policy list. Adding a monitoring alarm policy 2. From the navigation tree, select Desktop Asset Manager > Desktop Control Policy > Monitoring Alarm. The monitoring alarm policy list displays all monitoring alarm policies. 3. Click Add. The Add Monitoring Alarm Policy page appears. 4. Configure basic information for the monitoring alarm policy: Policy Name Enter a unique name for the monitoring alarm policy. Service Group Select the service group to which the monitoring alarm policy belongs. Description Enter a description for the monitoring alarm policy to facilitate maintenance. 5. Enter keywords in the Keywords to Trigger Alarms field of the USB Monitoring area. You can enter up to 100 keywords per line, with each keyword containing up to 32 characters. When the DAM server receives information about files written from the asset to a USB storage device, it checks the file names against these keywords. When a keyword is found, the DAM server encapsulates the information in syslogs and sends them to the specified syslog server. You can view the following information on the syslog server: Asset number Asset name Owner Time when the USB storage device was connected to the asset You can also view the name, size, and write time of each file written to the USB storage device. 6. Enter the keywords in the Keywords to Trigger Alarms field of the Printer Monitoring area. You can enter up to 100 keywords per line, with each keyword containing up to 32 characters. When the DAM server receives information about files printed by the asset, it checks the file names against these keywords. When a keyword is found, the DAM server encapsulates the information within syslogs and sends them to the specified syslog server. You can view the following information on the syslog server: Asset number Asset name Owner Printer name You can also view the name, number of pages, size, and print time of each printed file. 7. Select hardware items to monitor in the Hardware Changes Monitoring area. 186

198 Click the boxes next to target items to monitor them. When the content of a selected item changes, the DAM server encapsulates the changes within syslogs and sends them to the specified syslog server. CPU CPU number and CPU name. Memory Total memory of the asset. Mainboard Vendor and product model of the main board. DVD/CD-ROM Device instance path of the DVD/CD-ROM drive. NIC Device instance path. Hard Disk Hard-disk interface type and device instance path. BIOS BIOS caption, vendor, release date, and version. 8. Select the software items to monitor in the Software Changes Monitoring area. Click the boxes next to target items to monitor them. When the content of a selected item changes, the DAM server encapsulates the changes within syslogs and sends them to the specified syslog server. Logical Disk Logical disk name, description, file system, serial number, and total size. The logical disks are only scanned and checked when the asset starts up. Network Connections NIC serial number, IP address, DHCP status, gateway IP address, asset MAC address, and subnet mask. Operating System Operating system name, version, service pack, installation date, and language. Screen Saver Screen saver status (enabled or disabled), display of logon screen on resume (enabled or disabled), and idle time. System Information Login name of the asset. Computer Name Computer name of the asset. Partition Hard disk number, partition number, partition type, boot partition (yes or no), and partition capacity. Software Software name and version. Reinstall OS or Other Update Operating system reinstallation and recovery. 9. Click OK. The new monitoring alarm policy appears in the monitoring alarm policy list and the Policy List on the Add Control Scheme page. Modifying a monitoring alarm policy 2. From the navigation tree, select Desktop Asset Manager > Desktop Control Policy > Monitoring Alarm. The monitoring alarm policy list displays all monitoring alarm policies. 3. Click the Modify icon for the monitoring alarm policy you want to modify. The Modify Monitoring Alarm Policy page appears. 4. Modify the description for the monitoring alarm policy. You cannot modify other basic information. 5. Modify keywords in the Keywords to Trigger Alarms field of the USB Monitoring area. You can enter up to 100 keywords per line with each keyword containing up to 32 characters. When the DAM server receives information about files written from the asset to a USB storage device, it checks the file names against these keywords. When a keyword is found, the DAM server encapsulates the information within syslogs and sends them to the specified syslog server. 187

199 You can view the following information on the syslog server: asset number, asset name, owner, and time when the USB storage device was connected to the asset. You can also view the name, size, and write time of each file written to the USB storage device. 6. Modify keywords in the Keywords to Trigger Alarms field in the Printer Monitoring area. You can enter up to 100 keywords per line, with each keyword containing up to 32 characters. When the DAM server receives information about files printed by the asset, it checks the file names against these keywords. When a keyword is found, the DAM server encapsulates the information in syslogs and sends them to the specified syslog server. You can view the following information on the syslog server: asset number, asset name, owner, and printer name. You can also view the name, number of pages, size, and print time of each printed file. 7. Reselect the hardware items to monitor in the Hardware Changes Monitoring area. Select the boxes next to items to monitor them. To cancel monitoring an item, clear its box. When the content of a selected item changes, the DAM server encapsulates the changes in syslogs and sends them to the specified syslog server. 8. Reselect the software items to monitor in the Software Changes Monitoring area. Select the boxes next to items to monitor. To cancel monitoring an item, clear its box. When the content of a selected item changes, the DAM server encapsulates the changes in syslogs and sends them to the specified syslog server. 9. Click OK. Deleting a monitoring alarm policy A monitoring alarm policy cannot be deleted when it is assigned to a desktop control scheme. To delete the policy, first remove it from the scheme. For more information, see "Modifying a desktop control scheme." To delete a monitoring alarm policy: 2. From the navigation tree, select Desktop Asset Manager > Desktop Control Policy > Monitoring Alarm. The monitoring alarm policy list displays all monitoring alarm policies. 3. Click the Delete icon for the monitoring alarm policy you want to delete. A confirmation dialog box appears. 4. Click OK. 188

200 Auditing desktop assets DAM supports the following asset audit functions: Post audits Post-audit data shows asset usage based on the asset history records stored in DAM, including: Asset hardware changes Asset software changes Use of USB storage devices Use of printers Use of unauthorized peripherals Real-time audits Real-time audit data shows asset information in real time. DAM provides the terminal file audit function to show in real time whether a terminal asset contains specified files. Asset hardware change record audit DAM works with the inode client to support the asset hardware change record audit function. The inode client automatically collects changes to asset hardware shown in Table 27 and reports them to the DAM server. Operators can view the change time and change content by auditing these changes. Operators can configure the hardware items to monitor in a monitoring alarm policy, assign the policy to a desktop control scheme, and assign the desktop control scheme to the target asset or asset group. The DAM server collects hardware changes from the monitored asset or each asset in the monitored asset group, and then sends them in syslogs to the specified syslog server. DAM and the syslog server both are aware of the asset hardware changes. By default, asset hardware change records can be kept for 1,825 days (about five years). Operators can modify the record lifetime through the Asset Change Record Lifetime parameter. For more information about modifying the record lifetime, see "DAM service parameters." Table 27 Asset hardware changes Item CPU Changes CPU number CPU name Mainboard BIOS Vendor Product model Caption Vendor Release date Version Memory Total memory Hard Disk Interface type Device instance path NIC DVD/CD-ROM Device instance path Device instance path 189

201 Asset hardware change information list contents Asset Number Asset number of the asset. Click the asset number to view detailed information about the asset. Asset Name Name of the asset. Change Type Change type of the asset hardware. Options are: Common Update Reinstall OS Other Update Change Contents Content of the changed hardware. Options are: CPU Memory Mainboard DVD/CD-ROM NIC Hard Disk BIOS Owner Owner of the asset. Click the owner to view detailed information. Changed on System time of the server when the asset hardware was changed. Details Click the Details icon to view detailed information about the asset hardware change. Asset hardware change record details The asset hardware change record details page has the following parameters: CPU Change Information Appears only when the CPU number or the CPU name has changed. Operators can view CPU changes by comparing the new list with the old list. BIOS Change Information Appears only when the BIOS caption, vendor, release date, or version has changed. Operators can view BIOS changes by comparing the new list with the old list. Mainboard Change Information Appears only when the vendor or product model of the main board has changed. Operators can view main board changes by comparing the new list with the old list. Memory Change Information Appears only when the total memory of the asset has changed. Operators can view memory changes by comparing the new list with the old list. Hard Disk Change Information Appears only when the hard-disk interface type or device instance path has changed. Operators can view asset hard-disk changes by comparing the old list with the new list. NIC Change Information Appears only when the device instance path of the NIC has changed. Operators can view NIC changes by comparing the new list with the old list. The device instance path changes when the NIC or the position of the NIC PCI is changed. DVD/CD-ROM Change Information Appears only when the device instance path of the DVD/CD-ROM drive has changed. Operators can view asset DVD/CD-ROM drive changes by comparing the old list with new list. 190

202 Viewing the asset hardware change information list 2. From the navigation tree, select Desktop Asset Manager > Asset Hardware Change. The asset hardware change information list displays all asset hardware change records. 3. To sort the asset hardware change information list, click one of the following column labels: Asset Number Asset Name Change Type Owner Changed on Viewing asset hardware change record details 2. From the navigation tree, select Desktop Asset Manager > Asset Hardware Change. The asset hardware change information list displays all asset hardware change records. 3. Click the Details icon for the asset hardware change information you want to view. The Asset Hardware Change Details page appears. 4. Click Back to return to the asset hardware change information list. Querying asset hardware change records Basic query DAM allows operators to filter detailed asset hardware change records by using basic query mode or advanced query mode. 2. From the navigation tree, select Desktop Asset Manager > Asset Hardware Change. The asset hardware change information list displays all asset hardware change records. 3. Click Basic Query at the upper right corner of the page. When Advanced Query is displayed at the upper right corner, you are already in basic query mode. Skip this step. 4. Specify one or more of the following query criteria: Asset Number Enter a partial or complete asset number of the asset. Asset Name Enter a partial or complete name of the asset. Changed from/to Specify the time range when the asset hardware was changed. You can enter the time range, or click the Select Date and Time icon to bring up the time control page and select the time range. The time range must be in the format YYYY-MM-DD hh:mm:ss. 5. Click Query. The asset hardware change information list displays all asset hardware change records matching the query criteria. 6. To clear the query criteria, click Reset. The asset hardware change information list displays all hardware change records. 191

203 Advanced query 2. From the navigation tree, select Desktop Asset Manager > Asset Hardware Change. The asset hardware change information list displays all asset hardware change records. 3. Click Advanced Query at the upper right corner of the page. When Basic Query is displayed at the upper right corner, you are already in advanced query mode. Skip this step. 4. Specify one or more of the following query criteria: Asset Number Enter a partial or complete asset number of the asset. Asset Name Enter a partial or complete name of the asset. Owner Enter a partial or complete owner of the asset. Group Name Click the Select Asset Group icon to select the asset group where the asset is located. Change Type Select the change type from the list: Common Update Ordinary hardware changes on the asset, such as adding a memory bar to the computer, are categorized into this type. The inode client collects and reports to DAM the asset hardware change information. Reinstall OS All hardware information about the asset that the user re-registers through the inode client. The user re-registers the asset only after its operating system is reinstalled. The inode client re-collects and reports to DAM all asset information. Other Update Hardware changes that are not categorized into Common Update or Reinstall OS are categorized into Other Update, such as registering the asset on multiple DAMs. Change Contents Select the content of changed hardware from the list. Options are: CPU Memory Mainboard DVD/CD-ROM NIC Hard Disk BIOS Changed from/to Specify the time range when the asset hardware was changed. You can enter the time range, or click the Select Date and Time icon to bring up the time control page and select the time range. The time range must be in the format YYYY-MM-DD hh:mm:ss. 5. Click Query. The asset hardware change information list displays all asset hardware change records matching the query criteria. 6. To clear the query criteria, click Reset. The asset hardware change information list displays all hardware change records. Asset software change record audit DAM supports the asset software change record audit function with the cooperation of the inode client. The inode client automatically collects the asset software changes shown in Table 28 and 192

204 reports them to the DAM server. Operators can view the change time and change content by auditing these changes. Operators can configure the software items to be monitored in a monitoring alarm policy, assign the policy to a desktop control scheme, and assign the desktop control scheme to the target asset or asset group. The DAM server collects software changes from the monitored asset or each asset in the monitored asset group, and then sends them in syslogs to the specified syslog server. DAM and the syslog server are both notified of asset software changes. By default, asset software change records can be kept for 1,825 days (approximately five years). Operators can modify the record lifetime through the Asset Change Record Lifetime parameter. For more information about modifying the record lifetime, see "DAM service parameters." Table 28 Asset software change records Item Login Name Computer Name Changes Computer login name Computer name Logical Disk Operating System Screen Saver Partition Network Connections Software Name Description File system Serial number Total size Name Version Service pack Installation date Language Screen-saver status (enabled or disabled) Display of logon screen on resume (enabled or disabled) Idle time Hard disk number Partition number Partition type Boot partition (yes or no) Partition capacity NIC serial number IP address DHCP status Gateway IP address NIC MAC address Subnet mask Software name Software version Asset software change information list contents Asset Number Number of the asset. Click the asset number to view detailed information about the asset. Asset Name Name of the asset. Change Type Change type of the asset software. Options are: 193

205 Common Update Reinstall OS Other Update Change Contents Content of the changed software. Options are: Login Name Computer Name Logical Disk Operating System Screen Saver Partition Network Connections Software Owner Owner of the asset. Click the owner to view detailed information. Changed on System time of the server when the asset software was changed. Details Click the Details icon to view detailed information about the asset software change. Asset software change record details The asset software change record details page has the following parameters: Login Name Change Information Appears only when the computer login name has changed. Operators can view computer login name change by comparing the new list with the old list. Computer Name Change Information Appears only when the computer name has changed. Operators can view computer name change by comparing the new list with the old list. Logical Disk Change Information Appears only when the logical disk name, description, file system, serial number, or total size has changed. Operators can view logical disk change by comparing the new list with the old list. Network Connection Change Information Appears only when the NIC serial number, IP address, DHCP status, gateway IP address, MAC address, or subnet mask has changed. Make sure that the DAM service parameter Report Network Connection Changes is configured as Yes. Operators can view network configuration changes by comparing the new list with the old list. Operating System Change Information Appears only when the operating system name, version, service pack, installation time, or language has changed. Operators can view asset OS changes by comparing the new list with the old list. Screen Saver Change Information Appears only when the status of the screen saver (enable or disable), display of logon screen on resume (enabled or disabled), or the idle time length has changed. Operators can view screen saver changes on the asset by comparing the new list with the old list. Partition Change Information Appears only when the hard disk number, partition number, partition type, boot partition (yes or no), or partition capacity of the asset has changed. Operators can view partition changes by comparing the new list with the old list. Software Change Information Appears only when the name or software version installed on the asset has changed. Operators can view installed software changes on the asset by comparing the new list with the old list. 194

206 Viewing the asset software change record list 2. From the navigation tree, select Desktop Asset Manager > Asset Software Change. The Asset Software Change Information list displays all asset software change records. 3. To sort the list, click one of the following column labels: Asset Number Asset Name Change Type Owner Changed on Viewing the asset software change record details 2. From the navigation tree, select Desktop Asset Manager > Asset Software Change. The asset software change information list displays all asset software change records. 3. Click the Details icon for the asset software change information you want to view. The Asset Software Change Details page appears. 4. Click Back to return to the asset software change information list. Querying the asset software change records Basic query DAM allows operators to filter detailed asset software change records by using basic query mode or advanced query mode. 2. From the navigation tree, select Desktop Asset Manager > Asset Software Change. The asset software change information list displays all asset software change records. 3. Click Basic Query at the upper right corner of the page. When Advanced Query is displayed at the upper right corner, you are already in basic query mode. Skip this step. 4. Specify one or more of the following query criteria: Asset Number Enter a partial or complete asset number of the asset. Asset Name Enter a partial or complete name of the asset. Changed from/to Specify the time range when the asset software was changed. You can enter the time range, or click the Calendar icon to bring up the time control page and select the time range. The time range must be in the format YYYY-MM-DD hh:mm:ss. 5. Click Query. The asset software change information list displays all asset software change records matching the query criteria. 6. Click Reset to clear the query criteria. The asset software change information list displays all software change records. 195

207 Advanced query 2. From the navigation tree, select Desktop Asset Manager > Asset Software Change. The asset software change information list displays all asset software change records. 3. Click Advanced Query at the upper right corner of the page. When Basic Query is displayed at the upper right corner, you are already in advanced query mode. Skip this step. 4. Enter or select one or more of the following query criteria: Asset Number Enter a partial or complete asset number of the asset. Asset Name Enter a partial or complete name of the asset. Owner Enter a partial or complete owner of the asset. Software Name Enter a partial or complete name of software. Change type Select the change type from the list: Common Update Ordinary software changes on the asset, such as installing or uninstalling software, are categorized into this type. The inode client collects and reports to DAM the asset software change information. Reinstall OS All software information about the asset that the user re-registers through the inode client. The user re-registers the asset only after its operating system is reinstalled. The inode client re-collects and reports to DAM all the asset information. Other Update Software changes that are not categorized into Common Update or Reinstall OS are categorized into Other Update, such as registering the asset on multiple DAMs. Group Name Click the Select Asset Group icon to select an asset group where the asset is located. Changed from/to Specify the time range when the asset software was changed. You can enter the time range, or click the Calendar icon to bring up the time control page and select the time range. The time range must be in the format YYYY-MM-DD hh:mm:ss. 5. Click Query. The asset software change information list displays all asset software change records matching the query criteria. 6. Click Reset to clear the query criteria. The asset software change information list displays all software change records. USB file transfer log audit DAM supports the USB file transfer log audit function. To use this function, operators must configure the USB storage device monitoring function in a peripheral policy, assign the policy to a desktop control scheme, and assign the desktop control scheme to the target asset or asset group. The USB file transfer log audit function enables operators to view the time when a USB storage device was connected or disconnected, the logical drive letter of the USB storage device, and the contents written to the USB storage device. By default, monitoring records can be kept for 90 days before deletion. Operators can modify the record lifetime through the Life of Log parameter. For more information, see "DAM service parameters." USB file transfer log list contents Asset Number Asset number of the asset. Click the asset number to view detailed information about the asset. 196

208 Asset Name Name of the asset. Owner Owner of the asset. Click the owner to view detailed information. Logic Drive Logical drive letter of the USB storage device. USB Plugged (Server) System time of the DAM server when the USB storage device was connected to the asset. USB Unplugged (Server) System time of the DAM server when the USB storage device was disconnected from the asset. Details Click the Details icon to view detailed information about the USB monitoring record. USB file transfer log details The USB file transfer log details page has an Information of USB Copied Files area and a List of USB Copied Files area. Information of USB copied files area Owner Owner of the asset. Click the owner to view detailed information. Asset Name Name of the asset. Asset Number Asset number of the asset. Click the asset number to view detailed information about the asset. Logic Drive Logical drive letter of the USB storage device. USB Plugged (Client) System time of the client when the USB storage device was connected to the asset. USB Unplugged (Client) System time of the client when the USB storage device was disconnected from the asset. USB Plugged (Server) System time of the DAM server when the USB storage device was connected to the asset. USB Unplugged (Server) System time of the DAM server when the USB storage device was disconnected from the asset. Number of Copied Files Number of files copied to the USB storage device. Size of Copied Files (Byte) Total size of files copied to the USB storage device, in bytes. List of USB copied files area File Name Name of the file copied to the USB storage device. Operation Type Operation type of the file copied to the USB storage device, which can only be Write. File Size (Byte) Total size of the file copied to the USB storage device, in bytes. Operation Time (Client) System time of the client when the file was copied to the USB storage device. Operation Time (Server) System time of the server when the file was copied to the USB storage device. Viewing the USB file transfer log list 2. From the navigation tree, select Desktop Asset Manager > Desktop Control Audit > USB File Transfer. The USB file transfer log list displays the USB file transfer logs of all assets. 197

209 3. To sort the list, click one of the following column labels: Asset Number Asset Name Owner USB Plugged (Server) USB Unplugged (Server) Viewing the USB file transfer log details 2. From the navigation tree, select Desktop Asset Manager > Desktop Control Audit > USB File Transfer. The USB file transfer log list displays the USB file transfer logs of all assets. 3. Click the Details icon for the USB monitor log you want to view. The USB File Transfer Details page appears. 4. Click Back to return to the USB file transfer log list. 5. Click Refresh to refresh the List of USB Copied Files. 6. To sort the list, click one of the following column labels: File Name Operation type File Size (Byte) Operation Time (Client) Operation Time (Server) Querying the USB file transfer logs Basic query DAM allows operators to filter USB file transfer logs using either basic or advanced query mode. The USB file transfer logs include the time when a USB storage device is connected or disconnected, and information about any files copied to the USB storage device. 2. From the navigation tree, select Desktop Asset Manager > Desktop Control Audit > USB File Transfer. The USB file transfer log list displays USB file transfer logs for all assets. 3. Click Basic Query at the upper right corner of the page. When Advanced Query is displayed at the upper right corner of the page, you are already in basic query mode. Skip this step. 4. Specify one or more of the following query criteria: Asset Number Enter a partial or complete asset number of the asset. Asset Name Enter a partial or complete name of the asset. USB Plugged from/to Specify the time range when the USB storage device was connected to the asset. You can enter the time range, or click the Calendar icon to bring up the time control page and select the time range. The time range must be in the format YYYY-MM-DD hh:mm:ss. 5. Click Query. 198

210 Advanced query The USB file transfer log list displays all USB file transfer logs matching the query criteria. 6. Click Reset to clear the query criteria. The USB file transfer log list displays the USB file transfer logs of all assets. 2. From the navigation tree, select Desktop Asset Manager > Desktop Control Audit > USB File Transfer. The USB file transfer log list displays USB file transfer logs for all assets. 3. Click Advanced Query at the upper right corner of the page. When Basic Query is displayed at the upper right corner of the page, you are already in advanced query mode. Skip this step. 4. Specify one or more of the following query criteria: Asset Number Enter a partial or complete asset number of the asset. Asset Name Enter a partial or complete name of the asset. Owner Enter a partial or complete name of the asset owner. File Name Enter the name of the file copied to the USB storage device. USB Plugged from/to Specify the time range when the USB storage device was connected to the asset. You can enter the time range, or click the Calendar icon to bring up the time control page and select the time range. The time range must be in the format YYYY-MM-DD hh:mm:ss. Minimum File Size Enter the minimum size, in bytes, of a file copied to the USB storage device. The USB file transfer logs filter out any files smaller than this minimum value. 5. Click Query. The USB file transfer log list displays all USB file transfer logs matching the query criteria. 6. Click Reset to clear the query criteria. The USB file transfer log list displays the USB file transfer logs of all assets. Exporting USB file transfer logs DAM supports exporting USB file transfer logs. By default, USB file transfer logs are kept for 90 days. When the record lifetime expires, DAM automatically deletes the records. To prevent records being deleted after this period, operators can modify the Life of Log parameter. Operators can also save USB file transfer logs by exporting them manually or automatically. This information shows how to manually export the USB file transfer logs. For more information, see "Managing export tasks." USB file transfer log export history list contents Export File Name Name of the file that stores the export results. The file-name extension must be.zip. Export File Path Path of the export file. The export file is located in the installation path of IMC. In distributed deployment, the export file is located in the IMC installation path on the master server. Operator Name of the operator who exported the USB file transfer logs. Exported at Time when the USB file transfer logs were exported. Download File Click Download to save the export results. Delete Click the Delete icon to delete the export history of the USB file transfer logs. 199

211 Exporting USB file transfer records 2. From the navigation tree, select Desktop Asset Manager > Desktop Control Audit > USB File Transfer. The USB file transfer log list displays the USB file transfer logs of all assets. 3. Click Export. The Exporting File Format page appears. 4. Select the export file attributes: File Type Select the file format in which to export USB file transfer logs. Options are TXT and CSV. File Column Separator Select the separator for the text file when the export file is in TXT format. Options are space, tab, comma (,), colon (:), pound sign (#), and dollar sign ($). 5. Click OK. The Result of exporting USB File transfer page appears. 6. Click Download to save the export results. 7. Click Back to return to the USB file transfer log list. Viewing the USB file transfer log export history DAM supports viewing the export history of the USB file transfer logs. DAM automatically generates an export history record each time the USB file transfer logs are exported manually. Operators can download the export results or delete the export history. To view the export history of USB file transfer logs: 2. From the navigation tree, select Desktop Asset Manager > Desktop Control Audit > USB File Transfer. The USB file transfer log list displays USB file transfer logs of all assets. 3. Click Export History next to the USB file transfer log list. The Export History page appears. 4. Click Back to return to the USB file transfer log list. Printer use log audit DAM supports the printer use log audit function. To use this function, operators must configure the printer use log audit function in a peripheral policy, assign the policy to a desktop control scheme, and assign the desktop control scheme to the target asset or asset group. The printer use log audit function enables operators to view the name and number of printed pages for each printed file. By default, printer use logs are kept for 90 days before deletion. Operators can modify the log lifetime through the Life of Log parameter. For more information about modifying the log lifetime, see "DAM service parameters." Printer use log list contents Asset Number Asset number of the asset. Click the asset number to view detailed information about the asset. Asset Name Name of the asset. Owner Owner of the asset. Click the owner to view detailed information. 200

212 Printer Name Name of the printer. File Name Name of the printed file. Printed Pages Number of pages in the printed file. Report Time Time when the DAM server received the file printing message from the asset. Share Printer Indicates whether the file was printed on a shared printer. Details Click the Details icon to view detailed information about the printer use log. Printer use log details The printer use log details page has the following parameters: Asset Number Asset number of the asset. Click the asset number to view detailed information about the asset. Asset Name Name of the asset. Owner Owner of the asset. Click the owner to view detailed information. Printer Name Name of the printer. Share Printer Indicates whether the file was printed on a shared printer. File Name Name of the printed file. Name of the Computer Initiating Printing Computer name of the asset where the shared printer is located. This option appears only when a shared printer is used for printing. Asset Number of the Computer Initiating Printing Asset number of the asset where the shared printer is located. This option appears only when the file is printed by a shared printer. Owner of the Computer Initiating Printing Owner of the asset where the shared printer is located. This option appears only when the file is printed by a shared printer. Print Time System time of the client when the printer was used. Report Time System time of the DAM server when the printer was used. File Total Pages Total pages of the printed file. Printed Pages Number of pages that were printed. File Total Size Total size of the printed file, in bytes. Printed Size Size of the printed data, in bytes. Driver Info. Driver information of the printer. Port Computer port that the printer is connected to. Viewing the printer use log list 2. From the navigation tree, select Desktop Asset Manager > Desktop Control Audit > Printer Use. The printer use log list displays printer use logs of all assets. 3. To sort the list, click one of the following column labels: Asset Number Asset Name Owner Printer Name File Name Printed Pages 201

213 Report Time Share Printer Viewing the printer use log details To view the printer use log details: 2. From the navigation tree, select Desktop Asset Manager > Desktop Control Audit > Printer Use. The printer use log list displays the printer use logs of all assets. 3. Click the Details icon for the printer use log you want to view. The Printer Monitor Details page appears. 4. Click Back to return to the printer use log list. Querying the printer use logs Basic query DAM allows operators to filter printer use logs using either basic or advanced query mode. The printer use logs include information about printer use by assets. 2. From the navigation tree, select Desktop Asset Manager > Desktop Control Audit > Printer Use. The printer use log list displays the printer use logs of all assets. 3. Click Basic Query at the upper right corner of the page. When Advanced Query is displayed at the upper right corner of the page, you are already in basic query mode. Skip this step. 4. Specify one or both of the following query criteria: Asset Name Enter a partial or complete name of the asset. Asset Number Enter a partial or complete asset number of the asset. 5. Click Query. Advanced query The printer use log list displays all printer use logs matching the query criteria. 6. Click Reset to clear the query criteria. The printer use log list displays the printer use logs of all assets. 2. From the navigation tree, select Desktop Asset Manager > Desktop Control Audit > Printer Use. The printer use log list displays printer use logs of all assets. 3. Click Advanced Query at the upper right corner of the page. When Basic Query is displayed at the upper right corner of the page, you are already in advanced query mode. Skip this step. 4. Specify one or more of the following query criteria: Asset Name Enter a partial or complete name of the asset. Asset Number Enter a partial or complete asset number of the asset. Owner Enter a partial or complete name of the asset owner. 202

214 File Name Enter the name of the printed file, which must be exactly the same as that in the Windows printer task list. Name of the Computer Initiating Printing Enter a partial or complete name of the computer where the shared printer is located. This field is empty if the file was not printed on a shared printer. Asset Number of the Computer Initiating Printing Enter a partial or complete asset number of the asset where the shared printer is located. This field is empty if the file was not printed on a shared printer. Report Time from/to Specify the time range when the printer use log was reported. You can enter the time range, or click the Calendar icon to bring up the time control page and select the time range. The time range must be in the format YYYY-MM-DD hh:mm:ss. Printer Name Enter a partial or complete name of the printer. Share Printer Select whether the printer is a shared printer. Printed Pages from/to Enter the range of pages of the printed file. Printed Size from/to Enter the data size of the printed file. Port Enter the port of the computer that the printer is connected to. Driver Info. Enter the driver information of the printer. 5. Click Query. The printer use log list displays all printer use logs matching the query criteria. 6. Click Reset to clear the query criteria. The printer use log list displays the printer use logs of all assets. Exporting the printer use logs DAM supports exporting printer use logs. By default, the printer use logs are kept for 90 days. When the log lifetime expires, DAM automatically deletes the logs. Operators can modify the log lifetime through the Life of Log parameter. Operators can also save printer use logs by exporting them. To export printer use logs: 2. From the navigation tree, select Desktop Asset Manager > Desktop Control Audit > Printer Use. The printer use log list displays the printer use logs of all assets. 3. Click Export. The Exporting File Format page appears. 4. Select the export file attributes: File Type Select the format of the file you want to export printer use logs to. Options are TXT and CSV. File Column Separator Select the separator for the text file when the export file is in TXT format. Options are space, tab, comma (,), colon (:), pound sign (#), and dollar sign ($). 5. Click OK. The Result of exporting printer use page appears. 6. Click Download to save the export results. 7. Click Back to return to the printer use log list. 203

215 Viewing the export history of the printer use logs DAM supports viewing the export history of printer use logs. DAM automatically generates an export history record each time the printer use logs are exported. Operators can download the export results or delete the export history. To view the export history of printer use logs: 2. From the navigation tree, select Desktop Asset Manager > Desktop Control Audit > Printer Use. The printer use log list displays the printer use logs of all assets. 3. Click the Export History next to the printer use log list. The Export History page appears. 4. Click Back to return to the printer use log list. Printer use logs export history list contents Export File Name Name of the file that stores the export results. The file-name extension must be.zip. Export File Path Path of the export file. The export file is located in the installation path of IMC. In distributed deployment, the export file is located in the IMC installation path on the master server. Operator Name of the operator who exported the printer use logs. Content Exported Content description of the exported file. Exported at Time and date when the printer monitoring records were exported. Download File Click Download to save the export results. Delete Click the Delete icon to delete the export history of the printer use logs. Unauthorized peripheral use record audit DAM supports the unauthorized peripheral use record audit function. To use this function, operators must configure the unauthorized peripheral items in a peripheral policy, assign the policy to a desktop control scheme, and assign the desktop control scheme to the target asset or asset group. The unauthorized peripheral use record audit function enables operators to view the type of unauthorized peripherals, time, asset owner, and the unauthorized desktop control scheme. By default, the unauthorized peripheral use records are kept for 90 days. Operators can modify the record lifetime through the Life of Log parameter. For more information about modifying the record lifetime, see "DAM service parameters." Unauthorized peripheral use list contents Asset Number Asset number of the asset. Click the asset number to view detailed information about the asset. Asset Name Name of the asset. Owner Owner of the asset. Click the owner to view detailed information. Device Type Types of unauthorized peripheral types. Options are: DVD/CD-ROM FloppyDisk 204

216 Modem COM/LPT 1394 USB Infrared Bluetooth PCMCIA Operation Time (Server) Time when the DAM server detected the unauthorized peripheral use. Description Description of the unauthorized devices. Disable Result Indicates whether the authorized devices are disabled. Details Click the Details icon to view detailed information about the unauthorized peripheral use record. Unauthorized peripheral use log export history list contents Export File Name Name of the export that stores the export results. The file-name extension must be.zip. Export File Path Path of the export file. The export file is located in the installation path of IMC. In distributed deployment, the export file is located in the IMC installation path on the master server. Operator Name of the operator who exported the unauthorized peripheral use logs. Content Exported Content description of the exported file. Exported at Time and date when the unauthorized peripheral use logs were exported. Download File Click Download to save the export results. Delete Click the Delete icon to delete the export history of the unauthorized peripheral use logs. Viewing the unauthorized peripheral use record list 2. From the navigation tree, select Desktop Asset Manager > Desktop Control Audit > Peripheral Use. The unauthorized peripheral use list displays the unauthorized peripheral use records of all assets. 3. To sort the list, click one of the following column labels: Asset Number Asset Name Owner Device Type Operation Time (Server) Description Disable Result 205

217 Viewing the export history of unauthorized peripheral use records DAM supports viewing the export history of unauthorized peripheral use records. DAM automatically generates an export history record each time the unauthorized peripheral use records are manually exported. Operators can download the export results and delete the export history. To view the export history of unauthorized peripheral use records: 2. From the navigation tree, select Desktop Asset Manager > Desktop Control Audit > Peripheral Use. The unauthorized peripheral use list displays unauthorized peripheral use records of all assets. 3. Click the Export History next to the unauthorized peripheral use list. The Export History page appears. 4. View the unauthorized peripheral use log export history list. 5. Click Back to return to the unauthorized peripheral use list. Querying the unauthorized peripheral use records Basic query DAM allows operators to filter unauthorized peripheral use records by using basic or advanced query mode. The unauthorized peripheral use records include the use of peripherals by assets. 2. From the navigation tree, select Desktop Asset Manager > Desktop Control Audit > Peripheral Use. The unauthorized peripheral use list displays the unauthorized peripheral use records of all assets. 3. Click Basic Query at the upper right corner of the page. When Advanced Query is displayed at the upper right corner of the page, you are already in basic query mode. Skip this step. 4. Specify one or both of the following query criteria: Asset Number Enter a partial or complete asset number of the asset. Owner Enter a partial or complete name of the asset owner. 5. Click Query. Advanced query The unauthorized peripheral use list displays all unauthorized peripheral use records matching the query criteria. 6. Click Reset to clear the query criteria. The unauthorized peripheral use list displays the unauthorized peripheral use records of all assets. 2. From the navigation tree, select Desktop Asset Manager > Desktop Control Audit > Peripheral Use. The unauthorized peripheral use list displays the unauthorized peripheral use records of all assets. 3. Click Advanced Query at the upper right corner of the page. 206

218 When Basic Query is displayed at the upper right corner of the page, you are already in advanced query mode. Skip this step. 4. Specify one or more of the following query criteria: Asset Number Enter a partial or complete asset number of the asset. Asset Name Enter a partial or complete name of the asset. Owner Enter a partial or complete name of the asset owner. Group Name Click the Select Asset Group icon to select the asset group where the asset is located. Operation Time (Server) from/to Specify the time range when the unauthorized peripheral use record was reported. You can enter the time range, or click the Calendar icon to bring up the time control page and select the time range. The time range must be in the format YYYY-MM-DD hh:mm:ss. Peripheral Policy Select the peripheral policy that was violated. Device Type Select the type of the peripheral device. Options are: DVD/CD-ROM FloppyDisk Modem COM/LPT 1394 USB Infrared Bluetooth PCMCIA Device Instance Path Enter a partial or complete device instance path of the peripheral device. 5. Click Query. The unauthorized peripheral use list displays all unauthorized peripheral use records matching the query criteria. 6. Click Reset to clear the query criteria. The unauthorized peripheral use list displays the unauthorized peripheral use records of all assets. Exporting the unauthorized peripheral use records DAM supports exporting unauthorized peripheral use records. By default, the unauthorized peripheral use records are kept for 90 days. When the record lifetime expires, DAM automatically deletes the records. Operators can modify the record lifetime through the Life of Log parameter. Operators can also save unauthorized peripheral use records by exporting them. To export unauthorized peripheral use records: 2. From the navigation tree, select Desktop Asset Manager > Desktop Control Audit > Peripheral Use. The unauthorized peripheral use list displays the unauthorized peripheral use records of all assets. 3. Click Export. The Exporting File Format page appears. 207

219 4. Select the export file attributes: File Type Select the format of the file you want to export unauthorized peripheral use records to. Options are TXT and CSV. File Column Separator Select the separator for the text file when the export file is in TXT format. Options are space, tab, comma (,), colon (:), pound sign (#), and dollar sign ($). 5. Click OK. The Result of exporting unauthorized peripheral use report page appears. 6. Click Download to save the export results. 7. Click Back to return to the unauthorized peripheral use list. Terminal file audit DAM supports the terminal file audit function to show whether a terminal asset contains specified files in real time. DAM creates and immediately executes an audit task for each terminal file audit operation, and allows operators to view or export the audit results. Asset file check list contents Asset Number Asset number of the asset. Click the asset number to view detailed information about the asset. Group Name Group that the asset belongs to. Owner Owner of the asset. Click the owner to view detailed information. File Name Includes Check path of the audit task. Check Time Time when the audit task was created. Status Current status of the audit task. Export Click the Export icon to export the audit results of the terminal file audit task. Details Click the Details icon to view detailed information about terminal file audit task. Asset file check list details The asset file check list details page has a Basic Information area and a File List area. Basic Information area Asset Number Asset number of the asset. Asset Name Name of the asset. Asset User User of the asset. Report Time Time when the audit results of the terminal file were submitted to the DAM server. Owner Owner of the asset. Check Time Time when the audit task was created. Status Status of the audit task: Reported The audit task is complete and the audit result has been submitted to the DAM server. Not Reported The audit result has not been submitted to the DAM server. Check Files in Absolute path of the check files in the audit task list. The file path includes the directory and all subdirectories, which must end with a backslash (\). 208

220 File List area File Name Includes Name of the audited file. The file name can contain the wildcard characters asterisk (*) or question mark (?). An asterisk can match zero or more characters. A question mark can match only one character when it is placed after the dot (.), and can match all characters except the dot (.) when it is placed before the dot. Description Description of the audit task. File Name Name of the file. File Path Absolute path of the file. File Size Size of the file, in bytes. Viewing the terminal file audit task list 2. From the navigation tree, select Desktop Asset Manager > Desktop Control Audit > Asset File Check. The asset file check list displays the terminal file audit tasks of all assets. 3. To sort the list, click one of the following column labels: Asset Number Group Name Owner File Name Includes Check Time Status Querying terminal file audit tasks Operators can filter terminal file audit tasks through a query. To query terminal file audit tasks: 2. From the navigation tree, select Desktop Asset Manager > Desktop Control Audit > Asset File Check. The asset file check task list displays the terminal file audit tasks of all assets. 3. Specify or select one or more of the following query criteria: Asset Number Enter a partial or complete asset number of the asset. Owner Enter a partial or complete owner of the asset. Check Time from/to Specify the time range when the terminal file audit task was performed. You can enter a time range, or click the Calendar icon to bring up the time control page and select the time range. The time range must be in the format YYYY-MM-DD hh:mm:ss. 4. Click Query. The asset file check task list displays all terminal file audit tasks matching the query criteria. 5. To clear the query criteria, click Reset. The asset file check task list displays the terminal file audit tasks of all assets. 209

221 Auditing the terminal files 2. From the navigation tree, select Desktop Asset Manager > Desktop Control Audit > Asset File Check. The asset file check task list displays the terminal file audit tasks of all assets. 3. Click Audit. The Audit page appears. 4. Select the asset whose terminal files you want to audit: a. Click Select Asset. The asset list dialog box appears. b. Filter assets through a basic or advanced query. The Query Asset feature appears above the asset list. The Advanced Query link is a toggle between Basic Query and Advanced Query. When the link is Advanced Query, then you are in basic query mode, and vice versa. Specify one or more of the following query criteria: Asset Number Enter a partial or complete asset number of the asset. Asset Name Enter a partial or complete name of the asset. Owner Enter a partial or complete name of the asset owner. Group Name Click the Select Asset Group icon to select an asset group. In the Select Asset Group page that appears, select a group and click OK. Operating System Enter a partial or complete name of the operating system. This field is available only for advanced queries. Operating System Language Select the operating system language: Chinese (PRC) or English. This field is available only for advanced queries. Operating System Patch Enter the version of the service pack of the operating system, such as Service Pack 3. This field is available only for advanced queries. c. Click Query. d. Select the asset you want to add in the asset list. e. Click OK. The selected asset appears in the Asset Number field. 5. Enter the following parameters for the audit task: Check Files in Enter the absolute path of the files you want to check. File Name Includes Enter a partial or complete file name. The file name can contain the wildcard characters asterisk (*) or question mark (?). An asterisk can match zero or more characters. A question mark can match only one character when it is placed after the dot (.), and can match all characters except the dot (.) when it is placed before the dot. Description Enter the description of the audit. 6. Click Start. Viewing the terminal file audit results 2. From the navigation tree, select Desktop Asset Manager > Desktop Control Audit > Asset File Check. The asset file check task list displays the terminal file audit tasks of all assets. 210

222 3. Click the Details icon for an terminal file audit to view detailed information. The asset file check task list page appears. 4. Click Back to return to the asset file check task list. 5. To save the audit results, click Export. Exporting the terminal file audit results 2. From the navigation tree, select Desktop Asset Manager > Desktop Control Audit > Asset File Check. The asset file check task list displays the terminal file audit tasks of all assets. 3. Click Export icon in the asset file check task list for the terminal file audit result you want to export. The Exporting File Format page appears. 4. Select a format for the export file from the File Format list. Options are TXT and CSV. TXT indicates that the terminal file audit results are exported to the text file of the *.txt type. Excel indicates that the terminal file audit result is exported to the text file of the *.csv type. 5. Select the separator for the terminal file audit results that are exported to the text file of *.txt type. Options are space, tab, comma (,), colon (:), pound sign (#), and dollar sign ($). 6. Click OK. After the operation is complete, the Export Result page appears. 7. Click Download to save the export results. 211

223 Configuring software deployment The software deployment function allows operators to batch deploy the same software product to multiple assets. Preparing to use the software deployment function To use this function, complete the following tasks: 1. Set up a software deployment server, which can be an HTTP, FTP, or file share server. The server must be properly configured to allow assets to download software. 2. Add the server settings to DAM, such as the IP address, port, and username/password. 3. Configure a software deploy task in DAM. The task settings include the software deployment server, name and version of the software to be deployed, download path, installation mode, and deployment target (individual assets or asset groups). DAM sends the software deploy task to the inode client for execution, and then the inode client downloads and installs software from the software deployment server as specified in the task. Configuring software deployment server settings DAM supports the following types of software deployment servers: HTTP FTP File share Operators can add the server settings to DAM for management. Software server settings list contents Server Name Name of the software deployment server. Click the name to view detailed information. Deployment Method Software deployment method: HTTP FTP Share File IP Address IP address of the software deployment server. Modify Click the Modify icon to modify the server settings. Delete Click the Delete icon to delete the server settings. Software deployment server settings details The software deployment server settings details page has the following parameters: Server Name Name of the software deployment server. Deployment Method Software deployment method: HTTP, FTP, or Share File. When the deployment method is HTTP, the page also has the following parameter: 212

224 Port Number Listening port of the HTTP server, 80 by default. When the deployment method is FTP, the page also has the following parameters: Port Number Listening port of the FTP server, 21 by default. Transmission Mode FTP transfer mode to use when a firewall or NAT device exists between the FTP server and the inode client. The value can be PORT or PASV. PORT When the FTP server is protected by a firewall or NAT device, select the PORT mode. PASV When the inode client is protected by a firewall or NAT device, select the PASV mode. Anonymous User Indicates whether to allow anonymous login to the FTP server. User Name User name used to access the FTP server. This field appears only when Anonymous User is set to No. When the deployment method is Share File, the page also has the following parameters: Anonymous User Indicates whether to allow anonymous login to the file share server. User Name The user name used to access the file share server, in the format prefix\user ID. If the software deployment server has been assigned to a domain, use the domain name as the prefix. If not, use the computer name as the prefix. This parameter appears only when Anonymous User is set to No. IP Address IP address of the software deployment server. Viewing the software deployment server settings list 2. From the navigation tree, select Desktop Asset Manager > Software Server Settings. The software server setting list displays all software deployment server settings. 3. Click Refresh to refresh the software server setting list. 4. To sort the software server setting list, click the Server Name, Deployment Method, or IP Address column label. Viewing software deployment server settings details 2. From the navigation tree, select Desktop Asset Manager > Software Server Settings. The software server setting list displays all software deployment server settings. 3. Click the name of the software deployment server to view detailed settings. The Software Server Settings Details page appears. 4. Click Back to return to the software server setting list. Adding software deployment server settings 2. From the navigation tree, select Desktop Asset Manager > Software Server Settings. The software server setting list displays all software deployment server settings. 3. Click Add. The Add Software Server Settings page appears. 4. Configure basic server information. 5. Configure parameters related to the deployment method. 213

225 6. Click OK. Modifying software deployment server settings 2. From the navigation tree, select Desktop Asset Manager > Software Server Settings. The software server settings list displays all software deployment server settings. 3. Click the Modify icon for the software deployment server settings you want to modify. The Modify Software Server Settings page appears. 4. Modify basic server settings. 5. Modify parameters related to the deployment method. 6. Click OK. Deleting software deployment server settings You cannot delete the settings of a software deployment server when the server name is selected for a software deploy task. To delete server settings, you must first delete all software deploy tasks that use the server. For more information about deleting software deploy tasks, see "Deleting software deploy tasks." To delete software deployment server settings: 2. From the navigation tree, select Desktop Asset Manager > Software Server Settings. The software server settings list displays all software deployment server settings. 3. Click the Delete icon for the software deployment server settings you want to delete. A confirmation dialog box appears. 4. Click OK. Configuring software deploy tasks Operators must first add software deployment server settings before they can create software deploy tasks. Software deploy task settings include the software deployment server, name and version of the software to be deployed, download path, installation mode, and deployment target (assets or asset groups). The task is sent to the inode client for execution, which downloads and installs the software from the software deployment server as specified in the task. Operators can query, add, modify, and delete software deploy tasks. Software deploy task list contents Task Name Name of the software deploy task. Click the name to view detailed information. Created at Time when the task was created. Software Name Name of the software to be deployed in the task. Server Name Name of the software deployment server used in the task. Installation Type The type of installation: Quiet Installation Installs software automatically after it is downloaded, without any user intervention. Before selecting this installation type, make sure that the software supports quiet installation. The inode client can display a task message when quiet installation is complete. 214

226 Interactive Installation Interacts with the user to obtain the necessary information, such as the download path and serial number for installation. The inode client can display a task message when software requiring an interactive installation is downloaded. Portable Software Requires no installation and allows the user to use the software immediately after it is downloaded and decompressed. The inode client can display a task message when portable software is downloaded. Modify Click the Modify icon to modify the task settings. Software deploy task details The software deploy task details page has a Basic Information area and a Software Deployment Targets area. Basic Information area Task Name Name of the software deploy task. This name must be unique in DAM. Software Server Name of the software deployment server. Click the name to view detailed server settings. Task Message Prompt message that the inode client displays when a quiet software installation or a software download process is complete. Created at Time when the software deploy task was created. Execution Time Time when the software deploy task is to be executed. Download Delay Time delay for the software deploy task, in minutes. To avoid massive downloading from the server at the same time, this parameter allows the inode client to download software after a random interval between 0 and the specified Download Delay value. Software Name Name of the software to be deployed in the software deploy task. The name of the software to be deployed, which must be the same as that in the Add or Remove Programs tool of the Windows Control Panel. This field is available only when the Installation Type is set to Quiet Installation or Interactive Installation. Software Version Version of the software to be deployed in the software deploy task. The version must be the same as that in the Add or Remove Programs tool of the Windows Control Panel. This field is available only when the Installation Type is set to Quiet Installation or Interactive Installation. Execute Task When the software deploy task is executed: Execute Immediately Task starts immediately after the configuration is complete. Later Task starts at a specified time after the configuration is complete. Test Method Select Test Method to test whether the software download path is valid. Installation Type The type of installation: Quiet Installation Installs software automatically after it is downloaded, without any user intervention. Before selecting this installation type, make sure that the software supports quiet installation. The inode client can display a task message when quiet installation is complete. Interactive Installation Interacts with the user to obtain the necessary information, such as the download path and serial number for installation. The inode client can display a task message when software requiring an interactive installation is downloaded. Portable Software Requires no installation and allows the user to use the software immediately after it is downloaded and decompressed. The inode client can display a task message when portable software is downloaded. Software Name and Path Download path and source file name of the software: For an HTTP server, the value is in the following format: 215

227 address>:<port>/<path>/<software name> For example: For an FTP server, the value is in the following format: address>:<port>/<path>/<software name> For example: ftp:// :21/tools/md5.exe For a file-share server, the value is in the following format: \\<IP address>\<path>\<software name> For example: \\ \tools\MD5.exe CLI Parameters Enter the CLI script to perform a quiet software installation. This field is available only when the Installation Type is set to Quiet Installation. Setup File How the setup file is handled after the software installation process is complete, which can be Deleted after Installation or Kept after Installation. This parameter is available only when the Installation Type is set to Quiet Installation or Interactive Installation. Deleted after Installation The setup file is automatically deleted after the software installation process is complete. Kept after Installation The setup file is kept after the software installation process is complete. Software Deployment Targets area The deployment targets include asset groups and individual assets. For a target asset group, the software is downloaded to and installed on all assets in the asset group. Deploy group list contents All Asset Groups Name of the asset group. Click the Expand All icon to expand all asset groups. Click the Collapse All icon to collapse all asset groups. When the group name carries an icon on the left, the group has subgroups. Click the icon to view software deployment information of the subgroups. Click the group name to display the asset group details page. Success Downloads Number of assets in the asset group that have successfully downloaded the software. Total Deployed Number of assets in the asset group that are required to download the software. Details Click the Details icon to view the deploy task status of all assets in the asset group. Deploy asset list contents Asset Number Asset number of the asset. Click the asset number to view detailed information. Asset Name Name of the asset. Group Name Name of the group the asset belongs to. Click the group name to display the asset group details page. Asset Owner Owner of the asset. Task Status Execution status of the task, which can be: Not Executed Deployment Succeeded Deployment Failed Download Succeeded 216

228 Download Failed Click the content of this field to view the task execution result for the asset. When you click the content in the Task Status field for an asset in the Deploy Group List area or on the asset list of an asset group, you can view the list of all assets in the group. Redeploy Click the Redeploy icon to deploy the task again. This field is available only when the task status of the asset is Download Failed. Task execution result details The task execution result details page has the following parameters: Task Name Name of the software deploy task. Task Status Execution status of the task: Not Executed Deployment Succeeded Deployment Failed Download Succeeded Download Failed Asset Name Name of the asset. Asset Number Asset number of the asset. Asset Owner Owner of the asset. Asset Group Asset group to which the asset belongs. Execution Time Time when the software deploy task started. Finish Time Time when the software deploy task finished. This field is available only when the task status of the asset is Download Succeeded or Download Failed. Viewing the software deploy task list 2. From the navigation tree, select Desktop Asset Manager > Software Deploy Task. The software deploy task list displays all software deploy tasks. 3. Click Refresh to refresh the software deploy task list. 4. To sort the software deploy task list, click the Task Name, Created at, Software Name, or Server Name column label. Viewing software deploy task details 2. From the navigation tree, select Desktop Asset Manager > Software Deploy Task. The software deploy task list displays all software deploy tasks. 3. Click the name for the software deploy task you want to view. The software deploy task details page appears. 4. To view a list of all assets in a group, click the Details icon for the asset group in the Deploy Group List area. 5. Click Back to return to the software deploy task list. 217

229 Querying software deploy tasks Basic query DAM allows operators to filter software deploy tasks using basic or advanced query mode. Basic query criteria include several key parameters for quick search. Advanced query offers various query criteria for a precise match. 2. From the navigation tree, select Desktop Asset Manager > Software Deploy Task. The software deploy task list displays all software deploy tasks. 3. Click Basic Query at the upper right corner of the page. When Advanced Query is displayed at the upper right corner of the page, you are already in basic query mode. Skip this step. 4. Specify one or more of the following query criteria: Task Name Enter a partial or complete software deploy task name. Asset Number Enter a partial or complete asset number, which uniquely identifies an asset in DAM. All tasks that include the asset as the deployment target are queried. Group Name Click the Select Asset Group icon. The Select Asset Group page appears. Select a group and click OK. The Group Name field is automatically populated with the selected asset group. Software Name Enter a partial or complete name of the software deployed in the task. Empty fields are ignored. 5. Click Query. Advanced query The software deploy task list displays all software deploy tasks that match the query criteria. 6. Click Reset to clear the query criteria. The software deploy task list displays all software deploy tasks. 2. From the navigation tree, select Desktop Asset Manager > Software Deploy Task. The software deploy task list displays all software deploy tasks. 3. Click Advanced Query at the upper right corner of the page. When Basic Query is displayed at the upper right corner of the page, you are already in advanced query mode. Skip this step. 4. Enter or select one or more of the following query criteria: Task Name Enter Empty fields are ignored. software deploy task name. Asset Number Enter Empty fields are ignored. asset number. All tasks that include the asset as the deployment target are queried. Created From/To Specify the time range when the software deploy task was created. You can click the Select Date and Time icon the value in YYYY-MM-DD format. to select the date and time, or manually enter Group Name Click the Select Asset Group icon. The Select Asset Group page appears. Select a group and click OK. The Group Name field is automatically populated with the selected asset group. Server Name Enter the name of the software deployment server. Software Name Enter a partial or complete name of the software deployed in the task. Empty fields are ignored. 218

230 5. Click Query. The software deploy task list displays all software deploy tasks that match the query criteria. 6. Click Reset to clear the query criteria. The software deploy task list displays all software deploy tasks. Adding a software deploy task 2. From the navigation tree, select Desktop Asset Manager > Software Deploy Task. The software deploy task list displays all software deploy tasks. 3. Click Add. The Add Software Deploy Task page appears. 4. Configure basic task information. The task name must be unique in EAD. 5. Select target asset groups in the Deploy Group List area. Click the Expand All icon to display all asset groups. A group name with an Expand icon on the left indicates that the group contains subgroups. Click the Expand icon to display all subgroups of the group. 6. Select target assets in the Deploy Asset List area: a. Click Add Asset. The asset list dialog box appears. b. Filter assets with a basic or advanced query. The Query Asset feature is displayed above the asset list. The Advanced Query link is a toggle switch between Basic Query and Advanced Query. When the link is Advanced Query, you are in the basic query mode, and vice versa. Specify one or more of the following query criteria: Asset Number Enter a partial or complete asset number. Each asset is assigned a unique asset number. Asset Name Enter a partial or complete asset name. Owner Enter a partial or complete owner of the asset. Group Name Click the Select Asset Group icon. The Select Asset Group page appears. Select a group and click OK. The Group Name field is automatically populated with the selected asset group. Operating System Enter a partial or complete name of the operating system. This field is available only for advanced queries. Operating System Language Select the operating system language, Chinese (PRC) or English. This field is available only for advanced queries. Operating System Patch Enter a partial or complete version of the operating system patch. This field is available only for advanced queries. Status Select the status of the asset. Options are Online, Offline, and Unmanaged. This field is available only for advanced queries. Empty fields are ignored. c. Click Query. d. Select the assets you want to add in the asset list. e. Click OK. All selected assets appear in the asset list. 7. Click OK. 219

231 Modifying a software deploy task 2. From the navigation tree, select Desktop Asset Manager > Software Deploy Task. The software deploy task list displays all software deploy tasks. 3. Click the Modify icon for the software deploy task you want to modify. The Modify Software Deploy Task page appears. 4. Modify basic task information. 5. Modify the target asset groups in the Deploy Group List area. 6. Modify the target assets in the asset list area by using one or both of the following methods: Click Add Asset to select assets for the task. Click the Delete icon for the undesired assets to remove them from the task. 7. Click OK. Deleting software deploy tasks Deleting a software deploy task does not affect execution of the task on the client host when the task has already been received by the inode client. The inode client can continue to download and install the software specified in the task. To delete one or more software deploy tasks: 2. From the navigation tree, select Desktop Asset Manager > Software Deploy Task. The software deploy task list displays all software deploy tasks. 3. Select one or more software deploy tasks you want to delete. 4. Click Delete. A confirmation dialog box appears. 5. Click OK. 220

232 EAD audit EAD audit includes the following functions: Viewing access user security logs Record access information of access users and detailed information of security events. Operators can query security logs to identify security risks in the network, and take actions to enhance network security. Client driver audit Allows operators to query driver errors to identify and repair faulty endpoints. Viewing security status of online and roaming users Use the online and roaming user lists. The Online User List also displays client ACLs, device ACLs, traffic status, and online asset information. Online user security check Perform a security check for online user endpoints at any time. Security check items include: System information Screen saver protection and password setting Drive list information Shared directory information Installed software Installed patches Enabled services Running processes Performing a security check for an online user does not affect the security status of the user. Many EAD functions require cooperation of the inode client. When the inode client encounters driver errors, the security functions cannot work. The inode client can send these errors to the EAD server. Security logs EAD records security logs for the following security events: Assigning ACLs to users Security check Security recheck Real-time monitoring By default, EAD records security logs only for access users who fail security check. For EAD to record security logs for access users who pass security check, enable the Generate logs after the security check is passed feature. For more information, see "Configuring service parameters." Security log list contents Account Name Name of the account. Click the name to view detailed information about the user account. Service Name Service assigned to the access user. Click the name to view contents of the service configuration. Login Date/Time Date and time when the access user logged in. User MAC Address MAC address that the access user used for security check. User IP Address IP address that the access user used for security check. 221

233 Details Click the Details icon to view detailed information about the security log. Security log details The security log details page has a Basic Information area and a Details area to present access information and security log contents for an access user. Basic Information area Details area Account Name Name of the account. This field serves as a link for navigating to the Access Account Info page. For more information, see HPE IMC User Access Manager Administrator Guide. Service Name Service assigned to the access user. This field serves as a link for navigating to the Service Configuration Details page. For more information, see HPE IMC User Access Manager Administrator Guide. Login Time Time when the user logged in. User IP Address IP address that the access user used for security check. User MAC Address MAC address that the access user used for security check. Log Type Possible security log types: Security Check EAD performs security check for an access user when the user logs in. When such a security event occurs, EAD records the event as a Security Check log. Real-Time Monitoring EAD performs real-time monitoring for online access users. When an access user fails a check during real-time monitoring, EAD records the security event as a Real-Time Monitoring log. Security Re-Check EAD performs another security check for an access user that has stayed online for a long time. EAD records such a security event as a Security Re-Check log. Action EAD records a security ACL or an isolation ACL assignment action as an Action log. Alarm Time Time when EAD logs a security event or action. Security Policy Name Security policy used for the access user security check. Security Status Security status of the access user: Passed Security Check Monitored Informed Isolated Kicked out Details Detailed reason for the security check failed for the access user. This field is empty for access users whose security status is Passed security check. Viewing the security log list 2. From the navigation tree, select User Access Log > Security Log. The security log list displays security logs generated for all access users on the current day. 3. To sort the list, click the Account Name, Login Date/Time, User MAC Address, or User IP Address column label. 222

234 Viewing security log details Security log details include the access information of a user and the specific security log information recorded for the user while online. The security log information includes: Security ACL or isolation ACL assigned to the access user Security check information Security recheck information Real-time monitoring check result Security check failure reason To view security log details: 2. From the navigation tree, select User Access Log > Security Log. The security log list displays the security logs generated for all access users on the current day. 3. Click the Details icon for a security log view details. The Security Log Details page appears. 4. Click Back to return to the security log list. Querying security logs Basic query EAD provides a basic and advanced query mode for you to search within security logs. 2. From the navigation tree, select User Access Log > Security Log. The security log list displays security logs generated for all access users on the current day. 3. Click Basic Query at the upper right of the page. When Advanced Query is displayed at the upper right of the page, you are already in basic query mode. Skip this step. 4. Specify one or more of the following query criteria: Account Name Enter a partial or complete account name. Service Name Select a service from the service list. Time Range From/To Select a security log generation time range or click the Calendar icon to select the time range. The date and time settings must be in the format YYYY-MM-DD hh:mm. 5. Click Query. Advanced query The Security Log List displays the security logs that match the query criteria. 6. Click Reset to reset the query criteria. The Security Log List displays security logs generated for all access users on the current day. 2. From the navigation tree, select User Access Log > Security Log. The security log list displays security logs generated for all access users on the current day. 3. Click Advanced Query at the upper right of the page. When Basic Query is displayed at the upper right of the page, you are already in advanced query mode. Skip this step. 223

235 4. Specify one or more of the following query criteria: Account Name Enter a partial or complete account name. User Name Enter a user name. One user can have multiple accounts. User Group Click the Select User Group icon to select a user group. In the Select User Group page that appears, select a group and click OK. Service Name Select a service from the service list. User IP Address From/To Enter an IPv4 address range to match access users. Security Policy Name Select a security policy from the security policy list. User MAC Address Enter a MAC address string to match access users. This field supports these commonly used MAC address formats: XX-XX-XX-XX-XX-XX, XX:XX:XX:XX:XX:XX, and XXXX-XXXX-XXXX. For example, F , 02:50:F2:00:00:02, and 0250-F Time Range From/To Specify a security log generation time range or click the Calendar icon to select the time range. The date and time settings must be in the format YYYY-MM-DD hh:mm. Security Status Select the security status of access users. Options are: Passed security check Monitored Informed Isolated Kicked out When an access user's log details include multiple security statuses, the security log of the access user displays only when one security status matches the selected one. Security Check Item Select a security check item from the security check item list. Options are: Anti-virus software Anti-spyware software Firewall software Anti-phishing software Hard disk encrypt software Patches Patch Manager Applications software Applications processes Applications services Applications files Registry Traffic OS password Sharing 5. Click Query. Asset registration The Security Log List displays the security logs that match the query criteria. 6. Click Reset to reset the query criteria. 224

236 The Security Log List displays security logs generated for all access users on the current day. Client driver audit Many EAD functions require cooperation of the inode client, such as client ACL, locking Internet access, illegal ARP packet filtering, and illegal DHCP packet filtering. When a client driver error occurs, for example, because the access user uninstalled the client driver by accident, the inode client sends the error to the EAD server. Operators can use the inode Driver Audit function to identify inode client errors and repair the erroneous user endpoint. inode driver list contents Account Name Account name of the access user who encountered a client driver error. Click the name to view detailed information about the user account. Login Time Date and time when the access user logged in. Description Description of the client driver error. Viewing client driver errors in the inode Driver list 2. From the navigation tree, select User Access Log > inode Driver Audit. The inode Driver List displays client driver errors generated by all access users during the current month. Querying client driver errors 2. From the navigation tree, select User Access Log > inode Driver Audit. The inode driver list displays client driver errors generated by all access users on the current day. 3. Specify one or more of the following query criteria: Account Name Enter an account name string. User Group Click the Select User Group icon to select a user group. In the Select User Group page that appears, select a group and click OK. The User Group field is automatically populated with the selected user group. Start Time/End Time Specify a query time range or click the Calendar icon to select the time range. The date and time settings must be in the format YYYY-MM-DD hh:mm. 4. Click Query. The inode driver list displays the inode driver error logs that match the query criteria. 5. Click Reset to reset the query criteria. The inode driver list displays client driver errors generated by all access users during the current month. 225

237 Security status audit for local and roaming online users Operators can view the security status of online and roaming users on the online and roaming user lists. The Online User List also displays client ACLs, device ACLs, traffic status, and online asset information. Local online user list contents After the EAD service component is deployed, the Security Status column is automatically added to the local online user list. Operators can customize the local online user list to display the Traffic Status, Client ACL, and Device ACL columns. Security Status Security status of an online user: No Security Authentication The online user needs no security check. For Security Authentication Security check is ongoing for the online user. Secure The online user has passed all security check items and can access network resources. Monitored The online user fails some security check items but can access network resources. EAD only records security logs for users in this security status. Informed The online user fails some security check items, but can access network resources. EAD informs users of the failures for repair. Isolated The online user fails some security check items and is required to repair the failures. Users in this security status are isolated and can access only the network resources permitted by the isolation ACL. Offline The online user fails some security check items and is logged off immediately. For Isolation The online user fails some security check items and is to be isolated. Users in this security status are isolated when the configured waiting time is reached. For Offline The online user fails some security check items and is to be logged off. Users in this security status are logged off when the configured waiting time is reached. Client ACL Client ACL assigned to an online user. Device ACL Device ACL assigned to an online user. Operation This field contains five links: Details, Security Check of Computer, Remote Connect, Add to Blacklist or Release from Blacklist, and Asset details. Click the Security Check of Computer icon to perform a security check for the computer of an online user. This icon is available only after the EAD service component is deployed and the DAM component is undeployed. For more information, see "Performing a computer security check." Click the Asset details icon to view detailed asset information about an online user. This icon is available only after the DAM service component is deployed. For more information, see "Asset details." Roaming online user list contents The roaming online user list contents are the same as the local online user list contents. After the EAD service component is deployed, the roaming online user list displays the Security Status column. 226

238 Viewing the local online user list After the EAD service component is deployed, operators can view the security status, traffic status, client ACL, and device ACL of an online user. Operators can also perform a security check for the user on the local online user list. After the DAM service component is deployed, operators can also view the asset information of a user on the local online user list. To view the local online user list: 2. From the navigation tree, select Access User > Online Users. The Online Users page has the following tabs: Local, Roaming and By Device. By default, the Local tab is displayed. Click the Local tab to view the local online user list. 3. Click Refresh to refresh the local online user list. NOTE: UAM provides the ability to view online user details and remote desktop connections. You can also add or remove online users on a blacklist. For more information, see HPE IMC User Access Manager Administrator Guide. Viewing the roaming online user list After the EAD service component is deployed, operators can view the security status of roaming users on the roaming online user list. To view the roaming online user list: 2. From the navigation tree, select Access User > Online Users. The Online Users page has the following tabs: Local, Roaming and By Device. Click the Roaming tab to view the roaming online user list. 3. Click Refresh to refresh the roaming online user list. Customizing the local online user list After the EAD service component is deployed, the Security Status column is automatically added to the online user list. Operators can use the Customize GUI function to add Traffic Status, Client ACL, and Device ACL columns to the local online user list. To customize the local online user list: 2. From the navigation tree, select Access User > Online Users. The Online Users page has the following tabs: Local, Roaming and By Device. The Local tab is displayed by default. Click the Local tab to view the local online user list. 3. Click Customize GUI. The Customize GUI page appears. The Option List includes all columns that can be displayed in the Online User List. The Output List includes columns that are already displayed in the Online User List. The position of an item in the Output List determines the position of the column in the Online User List. The topmost item on the Output List becomes the right-most column of the Online User List, and so forth. You can select one or more list items at a time. To select multiple items, press and hold down the Ctrl key while selecting items. 227

239 Click to add all items in the Option List to the Output List. Click to add selected items in the Option List to the Output List. Click to remove selected items from the Output List. Click to remove all items from the Output List. Click to move selected items on the Output List to the top of the Output List. Click to move up selected items higher in the Output List. Click to move down selected items lower in the Output List. Click to move selected items to the bottom of the Output List. 4. Select Traffic Status, Client ACL, and Device ACL in the Option List, and click to add them to the Output List. 5. Click OK. The local online user list now displays the Traffic Status, Client ACL, and Device ACL columns. Performing a computer security check By using the computer security check function, operators can perform a security check for online user endpoints at any time without affecting the security status of the user. Computer security check result details The computer security check result details page has the following areas: Basic Information Screen Saver Settings Hard Disk Partition Table Share List Installed Software Installed Patches Running Services Running Processes Basic Information area Account Name Account name of the access user. Checked at Time when the security check was completed. Computer Name Computer name of the online user endpoint. User Name Online user name. OS Name of the operating system used by the online user endpoint. 228

240 Screen Saver Settings area Screen Saver Indicates whether the online user endpoint has enabled the screen saver. Display Logon Screen on Resume Indicates whether password protection is enabled for the screen saver. Screen Saver Startup Timeout Screen idle timeout (in seconds) before starting the screen saver. Password Length Length of the screen saver password, effective only for Windows 98. Hard Disk Partition Table area Share List area Installed Software area Hard Disk Number Physical disk number of a partition. Partition Number Number of the partition. Type Number of the partition type. Type Name Name of the partition type. Startup Partition Indicates whether the partition is the startup partition. Size Size of the partition in MB. No. Number of a shared directory. This number is assigned by EAD. Share Name Name of the shared directory. Local Path Path of the shared directory. Share Type Type of the shared directory: Common Share A relatively secure share type. The user can share files with specified users or user groups and set the permission level. The user must delete the Everyone group from the Group or user names list to prevent unauthorized users from accessing the shared files. Default Share An insecure share type. The Windows default share is likely to be used by attackers to attack the user endpoint. Others This type includes only one share named IPC$, which is used by Windows. Type Permission type for the specified user or user group to the shared directory. Options are Allow and Deny. This parameter is available only when the share type is Common Share. Object Name of the user or user group of the share. This parameter is available only when the share type is Common Share. Domain of Object Domain name of the user or user group of the share. This parameter is available only when the share type is Common Share. This field is empty when the user or user group has not joined a domain. Object Type Type of the user or user group of the share. This parameter is available only when the share type is Common Share. Object type can be System Group, Custom Group, or User. This field is empty when the user or user group does not have this parameter. System Group The object permitted or denied access to the shared directory is a system-defined operating system group. Custom Group The object permitted or denied access to the shared directory is a user-defined operating system group. User The object permitted or denied access to the shared directory is a user. Right of Object Permission that the user or user group has to the shared directory. This field contains data only when the share type is Common Share. The permission can be Read-Only, Read-Write, or All. No. Number of the software. This number is assigned by EAD. 229

241 Installed Patches area Running Services area Name Name of the software. Version The software version. Installed on Time when the software was installed. No. Number of a patch. This number is assigned by EAD. Software Name Name of the software for which the patch is installed. Software Version The software version for which the patch is installed. Name Name of the patch. Description Description of the patch. Installed at Time when the patch was installed. Type Type of the patch. No. Number of a service. This number is assigned by EAD. Name Name of a service. Running Processes area No. Number of a process. This number is assigned by EAD. Name Name of the process. Performing a computer security check 2. From the navigation tree, select Access User > Online Users. The Online Users page has the following tabs: Local, Roaming and By Device. The Local tab is displayed by default. Click the Local tab to view the local online user list. 3. Click the Security Check of Computer icon for an online user for which you want to perform a security check. The Computer Security Check page appears. 4. Click Select All to select all check items, or select the specific boxes next to the check items that you want to execute. Check items are: Check System Information Check Screen Saver and Password Check Partition Table Check Shares Check Installed Software Check Installed Patches Check Running Services Check Running Processes 5. Click OK. The Computer Security Check Result page appears. 6. Click Back to return to the Computer Security Check page. 230

242 EAD service reports The EAD service report function is implemented through the report feature of the IMC platform. All reports on the Report tab are generated from system or user-defined templates. IMC platform offers various reporting options. From the Report tab, you can quickly and easily access EAD service reports. Through the report feature of the IMC platform, you can view and export real-time reports and scheduled reports. The EAD component provides the system-defined service report templates shown in Table 29. Table 29 EAD service report templates Template name All-Node Online Users 24-Hour Trend Graph V2 Dependent service component Real-time report Scheduled report User Security Policy Available Unavailable Asset Information Report V2 DAM Available Unavailable Asset Report by Software V2 DAM Available Available Asset Type Report V2 DAM Available Available Asset Usage Report V2 DAM Available Available CPU Report V2 DAM Available Available Hard Disk Capacity Report V2 DAM Available Available Illegal Peripheral Use Report V2 DAM Available Available Insecurity Category Statistic Report V2 User Security Policy Available Available Multi-Node Certain Security Policy Statistics Report V2 Multi-Node Online Users Comparison Chart V2 User Security Policy Available Unavailable User Security Policy Available Unavailable Multi-Node Security Check Items Report V2 User Security Policy Available Unavailable Multi-Node Single-Security Check Item Failures Comparison Chart V2 Multi-Node User Counts Comparison Chart V2 User Security Policy Available Unavailable User Security Policy Available Unavailable Multi-Node User Data Statistics Report V2 User Security Policy Available Unavailable Online User Security Status Report V2 User Security Policy Available Available OS Language Report V2 DAM Available Available OS Version Report V2 DAM Available Available Safe Log Gather Statistic Report V2 User Security Policy Available Available Single-Node Online Users 24-Hour Trend Graph V2 Single-Node Security Check Failure Report V2 User Security Policy Available Unavailable User Security Policy Available Unavailable Software Installation Report V2 DAM Available Available Software Report by Asset V2 DAM Available Available 231

243 With the real-time report feature, you can configure your Report main page to include any of the real-time reports that IMC offers, for quick and easy access to the report. With the scheduled report feature, you can schedule the reports to run on a daily, weekly, monthly, quarterly, semi-annually, or annual basis. You can define the start dates of data collection for scheduled reports and the end dates and times for the corresponding scheduled report tasks. Scheduled reports are stored on the IMC server for later viewing and downloading. Also, you can include recipients who will receive a copy of all scheduled reports. You can configure the reports to be generated in one of the following formats: Adobe Acrobat Portal Document Format (PDF) Comma-Separated Value (CSV) Microsoft Excel (XLS) The Report main page is accessed through the Report tab. The Report page begins as a blank page that every IMC operator can customize to meet individual reporting needs. For more information about the IMC platform reports, see HPE Intelligent Management Center v7.0 Enterprise and Standard Administrator Guide. Real-time reports Real-time reports offer historical reporting capabilities on the User Security Policy and DAM service components. Table 30 lists the real-time reports that an operator can generate, based on the system-defined report templates provided by the EAD component. IMC also allows you to define new templates as needed. Table 30 Real-time reports provided by EAD Real-time reports All-Node Online Users 24-Hour Trend Graph V2 Asset Information Report V2 Asset Type Report V2 Asset Usage Report V2 CPU Report V2 Hard Disk Capacity Report V2 Illegal Peripheral Use Report V2 Insecurity Category Statistic Report V2 Multi-Node User Data Statistics Report V2 Online User Security Status Report V2 OS Language Report V2 OS Version Report V2 Safe Log Gather Statistic Report V2 Single-Node Online Users 24-Hour Trend Graph V2 Single-Node Security Check Failure Report V2 Software Installation Report V2 Service component User Security Policy DAM DAM DAM DAM DAM DAM User Security Policy User Security Policy User Security Policy DAM DAM User Security Policy User Security Policy User Security Policy DAM 232

244 All-node online users 24-hour trend graph This report collects statistics about the number of online users throughout a 24 hour period, for the current node and all its child nodes. Online users are categorized as secure online users, insecure online users, and unknown online users. To view the all-node online users 24-hour trend graph: 1. Click the Report tab. 2. Click the All-Node Online Users 24-Hour Trend Graph link in the My Real-Time Reports [Edit Mode] area. (Verify that this link displays [Edit Mode], as this confirms that you are in view mode.) The Set Parameter dialog box appears. 3. Click the Query Time field to select the date for querying the report statistics. 4. Click OK. The all-node online users 24-hour trend graph appears in an Intelligent Analysis Report Viewer page, as shown in Figure 22. Figure 22 All-node online users 24-hour trend graph All-Node Online Users 24-Hour Trend Graph parameters Statistics Time Date when statistics were collected by the report. Report Time Time when the report was generated. All-Node Online Users 24-Hour Trend Graph fields Number of online users Displays the total number of online users for all nodes at each hour of a 24 hour period, including the secure online users, insecure online users, and unknown online users. Number of secure online users Displays the total number of secure online users for all nodes at each hour of a 24 hour period. Number of insecure online users Displays the total number of insecure online users for all nodes at each hour of a 24 hour period. 233

245 Number of unknown online users Displays the total number of unknown online users for all nodes at each hour of a 24 hour period. Asset information report This report collects statistics about newly added and existing assets, memory size, and hard-disk capacity of an asset group (excluding its subgroups) during each month during a specified time range. The report displays only statistics for asset groups to which the current operator has privileges, and does not include the asset statistics for the current month. To view the asset information report: 1. Click the Report tab. 2. Click the Asset Information Report link in the My Real-Time Reports [Edit Mode] area. (Verify that this link displays [Edit Mode], as this confirms that you are in view mode.) The Set Parameter dialog box appears. 3. In the Start Month area, select the start month for report statistics collection. In the End Month area, select the end month for report statistics collection. The asset statistics of the current month are not included in the report. 4. Click OK. The asset information report appears in an Intelligent Analysis Report Viewer page, as shown in Figure 23. Figure 23 Asset information report Asset Information Report parameters Start Month Start month for report statistics collection. End Month End month for report statistics collection. Report Time Time when the report was generated. Asset Information Report fields This report displays the per-month asset statistics. Table 31 describes the fields in the report. Table 31 Statistical items Statistical item Description Asset Group Name of the asset group. Asset New Number of newly added assets in the asset group during a specified time range. Total Total number of assets in the asset group during a specified time range. 234

246 Statistical item Memory Hard disk New (GB) Total (GB) New (GB) Total (GB) Description Size of newly added memory in the asset group during a specified time range. Total size of memory in the asset group during a specified time range. Capacity of newly added hard disks in the asset group during a specified time range. Total capacity of hard disks in the asset group during a specified time range. Asset Report by Software This report allows you to query all assets on which a specified software product is installed. You can query assets only for asset groups to which you have operation privileges. To view the asset report by software: 1. Click the Report tab. 2. Click the Asset Type Report link in the My Real-Time Reports [Edit Mode] area. (Verify that this link displays [Edit Mode], as this confirms that you are in view mode.) The Set Parameter dialog box appears. 3. In the Software Name field, enter a partial or complete software name. 4. In the Software Version field, enter a partial or complete version number of the software. 5. Click OK. The asset report appears in an Intelligent Analysis Report Viewer page, as shown in Figure 24. Figure 24 Asset Report by Software Asset Report by Software parameters Report Time Time when the report was generated. Software Name Name of the specified software. Software Version Version of the specified software. Asset Report by Software fields Asset Number Number of the asset on which the specified software is installed. Asset Name Name of the asset on which the specified software is installed. Group Name Name of the asset group to which the asset installed with the specified software belongs. Owner Owner of the asset on which the specified software is installed. Software Name Name of the specified software. Software Version Version of the specified software. 235

247 Installed On Installation time of the specified software. Asset type report This report collects statistics about the asset types and the number of assets of each type for all registered assets in the specified asset group, including its subgroups. The asset types are Laptop, PC, Server, Workstation, and Others. The report displays only statistics of asset group to which the current operator has privileges. To view the asset type report: 1. Click the Report tab. 2. Click the Asset Type Report link in the My Real-Time Reports [Edit Mode] area. (Verify that this link displays [Edit Mode], as this confirms that you are in view mode.) The Set Parameter dialog box appears. 3. In the Asset Group area, select the asset group whose statistics are to be collected. The system collects statistics about the types of assets in the asset group and its subgroups. 4. Click OK. The asset type report appears in an Intelligent Analysis Report Viewer page, as shown in Figure 25. Figure 25 Asset type report Asset Type Report parameters Report Time Time when the report was generated. Group Name Name of the asset group. The report collects statistics about the asset types and the number of assets of each type for all registered assets in an asset group, including its subgroups. All indicates all asset groups. The report collects statistics about only asset groups to which the current operator has privileges. Asset Type Statistics pie chart The asset type statistics pie chart displays the distribution of asset types. The asset type can be PC, Workstation, Laptop, Server, or Others. Click a slice in the pie chart to see statistics about the type of assets. shows statistics for asset types. 236

248 Figure 26 Asset type statistics Asset Number Asset number of the asset. Asset Name Name of the asset. Status Status of the asset. Options are Online and Offline. Owner Owner of the asset. Managed at Time when the asset began to be managed. Location Room where the asset resides. Remarks Remarks on the asset. Asset usage report This report collects statistics about assets which have been offline for more than the specified number of days. This report displays only statistics for asset groups to which the current operator has privileges. To view the asset usage report: 1. Click the Report tab. 2. Click the Asset Usage Report link in the My Real-Time Reports [Edit Mode] area. (Verify that this link displays [Edit Mode], as this confirms that you are in view mode.) The Set Parameter dialog box appears. 3. In the Min. Idle Time field, enter the minimum number of idle days. The system collects statistics about assets that have been offline for more than the specified number of days. 4. Click OK. The asset usage report appears in an Intelligent Analysis Report Viewer page, as shown in Figure 27. Figure 27 Asset usage report Asset Usage Report parameters Report Time Time when the report was generated. Min. Idle Time Minimum number of idle days. Statistics about assets that have been offline for more than the specified number of days are displayed in the report. Asset Usage Report fields Asset Number Asset number of the idle asset. 237

249 CPU report Asset Group Asset group of the idle asset. Owner Owner of the asset. Management Time Time when the asset began to be managed. Last Off-line Time when the asset last went offline. Idle Period Days for which the asset has been idle. This report collects statistics about assets whose CPU frequencies meet the specified conditions in the specified asset group, including its subgroups. This report displays statistics about only the asset groups to which the current operator has privileges. To view the CPU report: 1. Click the Report tab. 2. Click the CPU Report link in the My Real-Time Reports [Edit Mode] area. (Verify that this link displays [Edit Mode], as this confirms that you are in view mode.) The Set Parameter dialog box appears. 3. In the Minimum Frequency (MHz) field, enter the minimum frequency value for the CPU frequency range. In the Maximum Frequency (MHz) field, enter the maximum frequency value for the CPU frequency range. The CPU frequencies shown in the report must meet the following criteria: Minimum Frequency CPU Frequency < Maximum Frequency. 4. From the Asset Group list, select the asset group whose statistics are to be collected. The system collects CPU statistics about assets in the asset group and its subgroups. 5. Click OK. The CPU report appears in an Intelligent Analysis Report Viewer page, as shown in Figure 28. Figure 28 CPU report CPU Report parameters Minimum Frequency Minimum frequency (in MHz) of the CPU frequency range. Maximum Frequency Maximum frequency (in MHz) of the CPU frequency range. Report Time Time when the report was generated. Group Name Name of the asset group. The report collects CPU statistics about registered assets in an asset group, including its subgroups. All indicates all asset groups. The report collects statistics about only the asset groups to which the current operator has privileges. CPU Report fields Asset Number Asset number of the asset. Asset Name Name of the asset. 238

250 Owner Owner of the asset. CPU SN Number of the CPU in the operating system. CPU Name Product name of the CPU. Frequency Frequency (in MHz) of the asset's CPU. Hard Disk capacity report This report collects statistics about the number of hard disks in the specified asset group, including its subgroups, and classifies the hard disks according to their capacity: <80 GB, [80 GB to 160 GB), [160 GB to 250 GB), [250 GB to 500 GB), [500 GB to 1024 GB), and >=1024 GB. The report displays only the hard disk capacity statistics of asset groups to which the current operator has privileges. To view the hard disk capacity report: 1. Click the Report tab. 2. Click the Hard Disk Capacity Report link in the My Real-Time Reports [Edit Mode] area. (Verify that this link displays [Edit Mode], as this confirms that you are in view mode.) The Set Parameter dialog box appears. 3. From the Asset Group area, select the asset group whose statistics are to be collected. The system collects hard disk capacity statistics about assets in the asset group and its subgroups. 4. Click OK. The hard disk capacity report appears in an Intelligent Analysis Report Viewer page, as shown in Figure 29. Figure 29 Hard disk capacity report Hard Disk Capacity Report parameters Report Time Time when the report was generated. Group Name Name of the asset group. The report collects hard-disk capacity statistics about registered assets in an asset group, including its subgroups. All indicates all asset 239

251 groups. The report collects statistics about only the asset groups to which the current operator has privileges. Hard Disk Capacity Statistics pie chart The hard disk capacity statistics pie chart displays the distribution of hard-disk capacity. The hard-disk capacity is classified into the following levels: <80 GB, [80 GB to 160 GB), [160 GB to 250 GB), [250 GB to 500 GB), [500 GB to 1024 GB), and >=1024 GB. Click a slice in the pie chart to see statistics about the type of hard disks. Hard disk type statistics Figure 30 shows statistics for one type of hard disk. Figure 30 Hard disk type statistics Asset Name Name of the asset where the hard disk resides. Owner Owner of the asset where the hard disk resides. Hard Disk Number Number of the hard disk in the operating system. Interface Type Interface type of the hard disk. Model Model of the hard disk. Total Partitions Number of partitions on the hard disk. Hard Disk Size Size of the hard disk (in GB). Illegal peripheral use report This report collects statistics about illegal peripheral usage types and the times of each type for the specified asset group, including its subgroups, during a specified time range. The peripheral types include: USB Storage USB Nonstorage DVD/CD-ROM Floppy PCMCIA COM/LPT Infrared 1394 Bluetooth Modem The report displays only the illegal peripheral usage types and the times of each type for asset groups to which the current operator has privileges. To view the illegal peripheral use report: 1. Click the Report tab. 2. Click the Illegal Peripheral Use Report link in the My Real-Time Reports [Edit Mode] area. (Verify that this link displays [Edit Mode], as this confirms that you are in view mode.) The Set Parameter dialog box appears. 3. In the Start Time and End Time area, select a time range for the report. 240

252 Options are Last Five Minutes, Last Ten Minutes, Last Thirty Minutes, and Custom Range. When you select Custom Range, the Start Time and End Time fields appear. a. Click the Start Time field, and select the start time in a calendar. This parameter sets the start date for the specific time range in a data collection period. b. Click the End Time field, and select the end time in a calendar. This parameter sets the end date for the specific time range in a data collection period. 4. From the Asset Group list, select the asset group whose statistics are to be collected. The system then collects statistics about illegal peripheral usage types and the times of each type for the asset group and its subgroups. 5. Click OK. The illegal peripheral use report appears in an Intelligent Analysis Report Viewer page, as shown in Figure 31. Figure 31 Illegal peripheral use report Illegal Peripheral Use Report parameters Start Time Start time for the report statistics. End Time End time for the report statistics. Report Time Time when the report was generated. Group Name Name of the asset group. This report collects statistics about illegal peripheral usage types and the times of each type for the specified asset group, including its subgroups, during a specified time range. All indicates all asset groups. The report collects statistics about only asset groups to which the current operator has privileges. Illegal Peripheral Use Statistics pie chart The pie chart displays the distribution of illegal peripheral usage types during a specified time range. The illegal peripheral usage types include: USB Storage 241

253 USB Nonstorage DVD/CD-ROM Floppy PCMCIA COM/LPT Infrared Bluetooth 1394 Modem Click a slice in the pie chart to see statistics about the type of illegal peripheral usage. Illegal peripheral usage type statistics Figure 32 shows statistics about the illegal peripheral usage type. Figure 32 Illegal peripheral usage type statistics Total Number of times of the illegal peripheral use occurred. Asset Number Asset number of the asset. Owner Owner of the asset. Operation Time Time when the server recorded the illegal peripheral usage. Disable Result Indicates whether the inode client successfully disables the illegal peripheral. Device Description of the peripheral illegally used. Insecurity category statistic report This report collects statistics about security check failures of each insecurity category type for the current EAD node during a specified time range. To view the insecurity category statistic report: 1. Click the Report tab. 2. Click the Insecurity Category Statistic Report link in the My Real-Time Reports [Edit Mode] area. (Verify that this link displays [Edit Mode], as this confirms that you are in view mode.) The Set Parameter dialog box appears. 3. Click the Start Date field, and select the start date in a calendar. This parameter sets the start date for the specific time range in a data collection period. 4. Click the End Date field, and select the end date in a calendar. This parameter sets the end date for the specific time range in a data collection period. 5. Click OK. The insecurity category statistic report appears in an Intelligent Analysis Report Viewer page, as shown in Figure

254 Figure 33 Insecurity category statistic report Insecurity Category Statistic Report parameters Start Time Start time for the report statistics. End Time End time for the report statistics. Report Time Time when the report was generated. Insecurity Category Statistic pie chart The insecurity category statistic pie chart displays the percentage of security check failures of each insecurity category to the total security check failures. Click a slice in the pie chart to see statistics about the specified insecurity category. Insecurity Category statistics Figure 34 shows statistics for an insecurity category. Figure 34 Insecurity category statistics Account Account name of the access user. Full Name Full name of the access user. User Group User group to which the access user belongs. Service Name Name of the service which the access user applies for. Strategy Name Name of the security policy that the access user uses. User IP Address IP address of the access user. User MAC Address MAC address of the access user. Date Date when the security check failure occurs. Insecurity Description Description of the security check failure. Multi-node user data statistics report This report collects and compares user data statistics of the current EAD node and all its child EAD nodes. User data statistics include the number of access users, blacklisted users, guests, online users, secure online users, insecure online users, and unknown online users. To view the multi-node user data statistics report: 243

255 1. Click the Report tab. 2. Click the Multi-Node User Data Statistics Report link in the My Real-Time Reports [Edit Mode] area. (Verify that this link displays [Edit Mode], as this confirms that you are in view mode.) The multi-node user data statistics report appears in an Intelligent Analysis Report Viewer page, as shown in Figure 35. Figure 35 Multi-node user data statistics report Multi-Node User Data Statistics Report parameters Report Time Time when the report was generated. Multi-Node User Data Statistics Report fields Node Name Name of the node. This column displays the name of the current node and its child node. Access Users Number of access users on the node. Blacklisted Users Number of blacklisted users on the node. Guests Number of guests on the node. Online Users Number of online users on the node. Secure Online Users Number of secure online users on the node. Insecure Online Users Number of insecure online users on the node. Unknown Online Users Number of unknown online users on the node. Statistics Time Time when statistics are collected. Online user security status report This report collects statistics about the security status of all users in a specified user group, including its subgroups. The report collects statistics about only user groups to which the current operator has privileges. The security status of an online user can be No Security Authentication Needed, Waiting for Security Authentication, Secure, Insecure, or Others. To view the online user security status report: 1. Click the Report tab. 2. Click Online User Security Status Report link in the My Real-Time Reports [Edit Mode] area. (Verify that this link displays [Edit Mode], as this confirms that you are in view mode.) The Set Parameter dialog box appears. 3. From the User Group list, select the user group whose statistics are to be collected. The system then collects user security status statistics about the users in the user group and its subgroups. 4. Click OK. The online user security status report appears in an Intelligent Analysis Report Viewer page, as shown in Figure

256 Figure 36 Online user security status report Online User Security Status Report parameters User Group Name of the user group. This report collects statistics about the security status of all users in a user group, including its subgroups. All indicates all user groups. The report collects statistics about only user groups to which the current operator has privileges. Report Time Time when the report was generated. Online User Security Status Category Statistics pie chart This report displays the distribution of the security status of all users in a user group, including its subgroups. The security status of an online user can be No Security Authentication Needed, Waiting for Security Authentication, Secure, Insecure, or Others. Click a slice in the pie chart to see statistics about online users in the specified security status. Online user security status statistics Figure 37 shows statistics about online users with the specified security status. Figure 37 Online user security status statistics Service Name of the service that the user uses for login. Device IP Access device IP address of the user. User IP IP address of the online user. Access Time Time when the user logs in. OS language report This report collects statistics about OS language types and the number of assets using each OS language type for all registered assets in the specified asset group, including its subgroups. The report collects statistics about only asset groups to which the current operator has privileges. The language types are Chinese (PRC), English, and Others. To view the OS language report: 1. Click the Report tab. 2. Click the OS Language Report link in the My Real-Time Reports [Edit Mode] area. (Verify that this link displays [Edit Mode], as this confirms that you are in view mode.) 245

257 The Set Parameter dialog box appears. 3. From the Asset Group list, select the asset group whose statistics are to be collected. The system collects statistics about OS language types and the number of assets using each OS language type for all registered assets in the asset group, including its subgroups. 4. Click OK. The OS language report appears in an Intelligent Analysis Report Viewer page, as shown in Figure 38. Figure 38 OS language report OS Language Report parameters Report Time Time when the report was generated. Group Name Name of the asset group. This report collects statistics about OS language types and the number of assets using each OS language type for all registered assets in the specified asset group, including its subgroups. All indicates all asset groups. The report collects statistics about only the asset groups to which the current operator has privileges. OS Language Statistics pie chart This report displays the distribution of OS language types of all registered assets in the specified asset group, including its subgroups. The recognized language types are Chinese (PRC), English, and Others. Click a slice in the pie chart to see asset statistics about the specified OS language type. Asset statistics Figure 39 shows asset statistics for an OS language type. Figure 39 Asset statistics for an OS language type Asset Number Asset number of the asset. Asset Name Name of the asset. Owner Owner of the asset. Operating System Operating system running on the asset. 246

258 Version Version of the operating system running on the asset. Patch Service pack version of the operating system running on the asset. Installed on Time when the operating system was installed on the asset. OS version report This report collects statistics about OS versions and the number of assets running each OS version for all registered assets, and displays the distribution of top five OS versions. The report collects statistics about only asset groups to which the current operator has privileges. To view the OS version report: 1. Click the Report tab. 2. Click the OS Version Report link in the My Real-Time Reports [Edit Mode] area. (Verify that this link displays [Edit Mode], as this confirms that you are in view mode.) 3. Click OK. The OS version report appears in an Intelligent Analysis Report Viewer page, as shown in Figure 40. Figure 40 OS version report OS Version Report parameters Report Time Time when the report was generated. Description A brief description of the report. OS Version Statistics pie chart The pie chart displays the distribution of the top five OS versions for all the registered assets. Click a slice in the pie chart to see asset statistics for the specified OS version. Asset statistics Figure 41 shows asset statistics for an OS version. Figure 41 Asset statistics for an OS version 247

259 Asset Number Asset number of the asset. Asset Name Name of the asset. Owner Owner of the asset. OS Language OS language type of the asset. Patch Service pack version of the operating system running on the asset. Installed on Time when the operating system was installed on the asset. Safe log gather statistic report This report collects statistics from security logs of the current EAD node and all of its child nodes, and displays the distribution of insecurity events. To view the safe log gather statistic report: 1. Click the Report tab. 2. Click the Safe Log Gather Statistic Report link in the My Real-Time Reports [Edit Mode] area. (Verify that this link displays [Edit Mode], as this confirms that you are in view mode.) The Set Parameter dialog box appears. 3. Click the Start Date field to select the start date in a calendar. This parameter sets the start date for the data collection period. 4. Click the End Date field to select the end date in a calendar. This parameter sets the end date for the data collection period. 5. From the Grade Node list, select the node whose statistics are to be collected. The system collects statistics from security logs of the current EAD node and all its child nodes, and displays the distribution of each type of insecurity events. 6. Click OK. The safe log gather statistic report appears in an Intelligent Analysis Report Viewer page, as shown in Figure 42. Figure 42 Safe log gather statistic report Safe Log Gather Statistic Report parameters Start Time Start time for the report statistics. 248

260 End Time End time for the report statistics. Report Time Time when the report was generated. Grade Node Name of the node whose statistics are collected by the report. All indicates all nodes. The report collects statistics about only nodes to which the current operator has privileges. Safe Log Gather Statistic pie chart The pie chart displays the distribution of insecurity events on a node and all of its child nodes. The insecurity events are: Anti-virus software Anti-spyware software Firewall software Anti-phishing software Hard disk encryption software Windows patches Patch manager Applications - software Applications - processes Applications - services Applications - files Registry Traffic OS password Sharing Asset registration Click a slice in the pie chart to see statistics for the specified insecurity category. Insecurity Category statistics Figure 43 shows statistics for an insecurity category. Figure 43 Insecurity category statistics Node Name Name of the current node or child node. Statistics Date Date when the statistics were collected. Amount Number of insecurity events. Single-node online users 24-hour trend graph This report displays the number of online users on a single EAD node at each hour of the specified day. Online users are categorized as secure online users, insecure online users, and unknown online users. The total number of online users is the sum of the number of online users of each type. To view the single-node online users 24-hour trend graph: 1. Click the Report tab. 2. Click the Single-Node Online Users 24-Hour Trend Graph link in the My Real-Time Reports [Edit Mode] area. (Verify that this link displays [Edit Mode], as this confirms that you are in view mode.) 249

261 The Set Parameter dialog box appears. 3. Click the Query Date field to select the date in a calendar. 4. From the Grade Node list, select the node whose statistics are to be collected. The system collects the number of online users on the node at each of the 24 hours in the day. 5. Click OK. The single-node online users 24-hour trend graph appears in an Intelligent Analysis Report Viewer page, as shown in Figure 44. Figure 44 Single-node online users 24-hour trend graph Single-Node Online Users 24-Hour Trend Graph parameters Statistics Time Day for which statistics were collected by the report. Report Time Time when the report was generated. Node Name Name of the node whose statistics were collected. Single-Node Online Users 24-Hour Trend Graph Number of online users Number of online users of the specified node at each hour of the specified day. Online users include secure online users, insecure online users, and unknown online users. Number of secure online users Number of secure online users at each hour of the specified day. Number of insecure online users Number of insecure online users at each hour of the specified day. Number of unknown online users Number of unknown online users at each hour of the specified day. Single-node security check failure report This report collects statistics about security check failures on a single EAD node (the current node or its child node). The report statistics can be collected on a per-day, per-week, or per-month basis. To view the single-node security check failure report: 1. Click the Report tab. 250

262 2. Click the Single-Node Security Check Failure Report link in the My Real-Time Reports [Edit Mode] area. (Verify that this link displays [Edit Mode], as this confirms that you are in view mode.) The Set Parameter dialog box appears. 3. From the Grade Node list, select the node whose statistics are to be collected. The system collects statistics about the security check failure reasons and the number of security check failures for access users on the node. 4. Click the Query Date field to select the date in a calendar. 5. From the Report Type list, select a report type. The report types include Daily Report, Weekly Report, and Monthly Report. The report statistics can be collected on a per-day, per-week, or per-month basis in the specified time range. 6. Click OK. The single-node security check failure report appears in an Intelligent Analysis Report Viewer page, as shown in Figure 45. Figure 45 Single-node security check failure report Single-Node Security Check Failure Report parameters Start Date Start date for the report statistics. End Date End date for the report statistics. Report Time Time when the report was generated. Node Name Name of the node whose statistics were collected. Description A brief description of the report. 251

263 Single-Node Security Check Failure bar chart This chart displays statistics about security check failures of a single EAD node (the current node or its child node). The security check failure reasons are: Anti-virus software check failures Anti-phishing software check failures Firewall software check failures Anti-spyware software check failures Hard disk encryption software check failures Windows patch check failures Patch management software check failures Application check failures Registry check failures Shared-directory check failures Traffic monitoring check failures Operating system password check failures Asset registration check failures The security check failure statistics are collected by account, service, and security check item. For example, when an account encounters two security check failures on the same service and security check item, the report considers them as one failure. However, when an account encounters two security check failures on different services,, even if they are for the same security check item, the report considers them as two failures. Software installation report This report collects statistics about software names and the number of assets with each type of software installed for all registered assets in the specified asset group, including its subgroups. The report collects statistics only about asset groups to which the current operator has privileges. To view the software installation report: 1. Click the Report tab. 2. Click the Software Installation Report link in the My Real-Time Reports [Edit Mode] area. (Verify that this link displays [Edit Mode], as this confirms that you are in view mode.) The Set Parameter dialog box appears. 3. From the Asset Group list, select the asset group whose statistics are to be collected. The system collects statistics about software names and the number of assets with each type of software installed for all registered assets in the asset group, including its subgroups. 4. Click OK. The software installation report appears in an Intelligent Analysis Report Viewer page, as shown in Figure

264 Figure 46 Software installation report Software Installation Report parameters Report Time Time when the report was generated. Group Name Name of the asset group. This report collects statistics about software names and the number of assets with each type of software installed for all registered assets in the specified asset group, including its subgroups. All indicates all asset groups. The report collects statistics about only asset groups to which the current operator has privileges. Description A brief description of the report. Software Installation Report fields Software Name Name of the software installed on the assets. Software Version The software version. The software installation report separately collects statistics about software products with the same name but different versions. Assets Number of assets with the software installed. Software Report by Asset This report allows you to query all software products that are installed on the specified asset in an asset group to which you have the operation privileges. To view the software report by asset: 1. Click the Report tab. 2. Click the Software Report by Asset link in the My Real-Time Reports [Edit Mode] area. (Verify that this link displays [Edit Mode], as this confirms that you are in view mode.) 3. The Set Parameter dialog box appears. 4. In the Asset Number field, enter the number of the asset. 5. Click OK. The software report appears in an Intelligent Analysis Report Viewer page, as shown in Figure

265 Figure 47 Software Report by Asset Software Report by Asset parameters Report Time Time when the report was generated. Asset Number Number of the asset. Asset Name Name of the asset. Group Name Asset group to which the asset belongs. Owner Owner of the asset. Description A brief description of the report. Software Report by Asset fields Software Name Name of the software that is installed on the asset. Software Version Version number of the software that is installed on the asset. Installed On Time when the software was installed on the asset. Scheduled reports You can schedule all real-time reports to run on a periodic basis. Define the start dates of data collection for generating scheduled reports, and the end dates and times for the corresponding scheduled report tasks. Then select the reporting period for the data in which you are interested. The report runs at 04:00 AM and includes data from the reporting period you specified until 00:00 on the day that the report was generated. The following reporting periods are available for scheduled reports: Daily When you select the Daily schedule type, reports from the previous day are generated after every day. For example, when you set the report start date to , the first daily report is generated at 04:00 AM on 08/11/2011, and data collected between 08/10/2011 and 08/11/2011 is displayed in the report. Weekly When you select the Weekly schedule type, reports from the previous seven days are generated after every seven days. For example, when you set the report start date to , the first weekly report is generated at 04:00 AM on 08/17/2011, and data collected between 08/10/2011 and 08/16/2011 is displayed in the report. 254

266 Monthly When you select the Monthly schedule type, reports from the previous month are generated after every month. For example, when you set the report start date to , the first monthly report is generated at 04:00 AM on 09/10/2011, and data collected between 08/10/2011 and 09/10/2011 is displayed in the report. Quarterly When you select the Quarterly schedule type, reports from the previous three months are generated after every three months. For example, when you set the report start date to , the first quarterly report is generated at 04:00 AM on 11/10/2011, and data collected between 08/10/2011 and 11/10/2011 is displayed in the report. Half Yearly When you select the Half Yearly schedule type, reports from the last half year are generated after every half year. For example, when you set the report start date to , the first half yearly report is generated at 04:00 AM on 02/10/2012, and data collected between 08/10/2011 and 02/10/2012 is displayed in the report. Yearly When you select the Yearly schedule type, reports from the last year are generated after every year. For example, when you set the report start date to , the first yearly report is generated at 04:00 AM on 08/10/2012, and data collected between 08/10/2011 and 08/10/2012 is displayed in the report. You can configure the report to be generated in any of the following formats: Adobe Acrobat Portal Document Format (PDF) Comma Separated Value (CSV) Microsoft Excel (XLS) You can include recipients for all scheduled reports. When reports are scheduled, IMC generates the reports in the specified report format, s them to specified recipients, and stores the reports for future access. You can also access reports generated by IMC scheduling. IMC retains all scheduled reports indefinitely. Retention and deletion of all historical reports must be managed manually. Table 32 provides a list of available reports and the service component responsible for them. Table 32 Scheduled reports for the EAD component Scheduled report Asset Report by Software Asset Type Report Asset Usage Report CPU Report Hard Disk Capacity Report Illegal Peripheral Use Report Insecurity Category Statistic Report Online User Security Status Report OS Language Report OS Version Report Safe Log Gather Statistic Report Software Installation Report Software Report by Asset Service component DAM DAM DAM DAM DAM DAM User Security Policy User Security Policy DAM DAM User Security Policy DAM DAM 255

267 Asset Report by Software This report allows you to query all assets on which a specified software product is installed. You can query assets only in asset groups to which you have the operation privileges. Adding an asset report by software 1. Display the page for adding a scheduled report in one of the following ways: Click the Report tab and select Reports > Add Scheduled Report from the navigation tree. Click the Report tab and select Scheduled Reports > All Scheduled Reports from the navigation tree. When the All Scheduled Reports page appears, click Add. 2. Select a template: a. Click Select next to the Template Name field. b. Select EAD Service Report from the Type list in the Query Template area, and click Query. c. Select Asset Report by Software and click OK. 3. Enter the report name in the Scheduled Report Name field. 4. Select an operator group that can view the report. When you select an operator group, all operators that belong to the group can view the report. To view the operators who belong to an operator group: a. Click the Operator Group Information icon next to the Access Right field. The Operator Group Information page appears. a. Select one or more operator groups in the Group Name area. The operators that belong to the selected operator groups are displayed. b. Click Close to return to the page for adding a report. 5. Specify the period for which report will be generated. A scheduled report period is determined by both the schedule type and schedule time settings. Schedule Type Select one of the following scheduling options: Daily Weekly Monthly Quarterly Half Yearly Yearly Report Start Date Click the field to select the start date for the report in a calendar. 6. Set the time when a report becomes invalid and the EAD component no longer generates the report. Click the End by box. Enter an end time in the format YYYY-MM-DD hh:mm. You can also click the field and select the end time in a calendar. 7. From the Report File Format list, select a report file format. Options are PDF, CSV, MSExcel, and MSExcel (Data-only). 8. Send a report by . Click the Send by box, and enter the address of the receiver. Reports can be sent to one address. 9. Set the software name and version. 256

268 The asset report by software allows you to query all assets on which a specified software product is installed. You can query assets only in asset groups to which you have the operation privileges. a. Click the Set Parameter icon for the software name, and enter the name of the target software. You can enter a complete or partial name. b. Click OK to return to the page for adding a report. The Set Parameter icon changes from to. c. Click the Set Parameter icon for the software version, and enter the version number of the target software. d. Click OK to return to the page for adding a report. 10. Click OK. The Set Parameter icon changes from to. Viewing a software report by asset 1. Click the Report tab. 2. From the navigation tree, select Scheduled Reports > All Scheduled Reports. The All Scheduled Reports page appears. 3. Click the History Report icon for the asset information reports. The History Report page appears. 4. Click the View link to open a statistics report, or save the statistics report (see Figure 48). Figure 48 Asset Report by Software Asset Report by Software parameters Report Time Time when the report was generated. Software Name Name of the specified software. Software Version Version number of the specified software. Description A brief description of the report. Asset Report by Software fields Asset Number Number of the asset on which the specified software is installed. Asset Name Name of the asset on which the specified software is installed. Group Name Name of the asset group to which the asset installed with the specified software belongs. Owner Owner of the asset on which the specified software is installed. Software Name Name of the specified software. Software Version Version of the specified software. Installed On Installation time of the specified software. 257

269 Asset type report This report collects statistics about asset types and the number of assets of each type for all registered assets in the specified asset group, including its subgroups. The asset types are Laptop, PC, Server, Workstation, and Others. The report collects statistics about only asset groups to which the current operator has privileges. Adding an asset type report 1. Display the page for adding a scheduled report in one of the following ways: Click the Report tab and select Reports > Add Scheduled Report from the navigation tree. Click the Report tab and select Scheduled Reports > All Scheduled Reports from the navigation tree. When the All Scheduled Reports page appears, click Add. 2. Select a template: a. Click Select next to the Template Name field. b. Select EAD Service Report from the Type list in the Query Template area, and click Query. c. Select Asset Type Report and click OK. 3. Enter the report name in the Scheduled Report Name field. 4. Select an operator group that can view the report. When you select an operator group, all operators that belong to the group can view the report. To view the operators who belong to an operator group: a. Click the Operator Group Information icon next to the Access Right field. The Operator Group Information page appears. a. Select one or more operator groups in the Group Name area. The operators that belong to the selected operator groups are displayed. b. Click Close to return to the page for adding a report. 5. Specify the period for which a report will be generated. A scheduled report period is determined by both the schedule type and schedule time settings. Schedule Type Select one of the following scheduling options: Daily Weekly Monthly Quarterly Half Yearly Yearly Report Start Date Click the field to select the start date for the report in a calendar. 6. Set the time when a report becomes invalid and the EAD component no longer generates the report. Click the End by box. Enter an end time in the format YYYY-MM-DD hh:mm. You can also click the field to select the end time in a calendar. 7. From the Report File Format list, select a report file format. Options are PDF, CSV, MSExcel, and MSExcel (Data-only). 8. Send a report by . Click the Send by box, and enter the address of the receiver. Reports can be sent to one address. 258

270 9. Set the asset group. The asset type report collects statistics about asset types and the number of assets of each type for all registered assets in the specified asset group, including its subgroups. You can query assets only in asset groups to which you have the operation privileges. a. Click the Set Parameter icon for the asset group. b. Select an asset group from the Parameter Value list. The options are asset group names. c. Click OK to return to the page for adding a report. 10. Click OK. Viewing asset type reports The Set Parameter icon changes from to. 1. Click the Report tab. 2. From the navigation tree, select Scheduled Reports > All Scheduled Reports. The All Scheduled Reports page appears. 3. Click the History Report icon for the asset type reports. The History Report page appears. 4. Click the View link to open a statistics report, or save the statistics report (see Figure 49). Figure 49 Asset type report Asset Type Report parameters Report Time Time when the report was generated. Group Name Name of the asset group. This report collects statistics about asset types and the number of assets of each type for all registered assets in the specified asset group, including its subgroups. All indicates all asset groups. The report collects statistics about only asset groups to which the current operator has privileges. Asset Type Statistics pie chart The asset type statistics pie chart displays the distribution of asset types. Asset types can be: PC Workstation 259

271 Laptop Server Others Asset usage report This report collects statistics about assets which have been offline for more than the specified number of days. The report displays asset statistics of only asset groups to which the current operator has privileges. Adding an asset usage report 1. Display the page for adding a scheduled report in one of the following ways: Click the Report tab and select Reports > Add Scheduled Report from the navigation tree. Click the Report tab and select Scheduled Reports > All Scheduled Reports from the navigation tree. When the All Scheduled Reports page appears, click Add. 2. Select a template: a. Click Select next to the Template Name field. b. Select EAD Service Report from the Type list in the Query Template area, and click Query. c. Select Asset Usage Report and click OK. 3. Enter the report name in the Scheduled Report Name field. 4. Select an operator group that can view the report. When you select an operator group, all operators that belong to the group can view the report. To view the operators who belongs to an operator group: a. Click the Operator Group Information icon next to the Access Right field. The Operator Group Information page appears. a. Select one or more operator groups in the Group Name area. The operators that belongs to the selected operator groups are displayed. b. Click Close to return to the page for adding a report. 5. Specify the period for which a report will be generated. A scheduled report period is determined by both the schedule type and schedule time settings. Schedule Type Select one of the following scheduling options: Daily Weekly Monthly Quarterly Half Yearly Yearly Report Start Date Click the field to select the start date in a calendar. 6. Set the time when a report becomes invalid and the EAD component no longer generates the report. Click the End by box. Enter an end time in the format YYYY-MM-DD hh:mm. You can also click the field to select the end time in a calendar. 7. From the Report File Format list, select a report file format. Options are PDF, CSV, MSExcel, and MSExcel (Data-only). 260

272 8. Send a report by . Click the Send by box, and enter the address of the receiver. Reports can be sent to one address. 9. Set the asset idle period. The asset usage report collects statistics about assets which have been offline for more than the specified number of days. a. Click the Set Parameter icon to set the idle period. b. In the Parameter Value field, enter the minimum number of idle days. c. Click OK to return to the page for adding a report. 10. Click OK. Viewing asset usage reports The Set Parameter icon changes from to. 1. Click the Report tab. 2. From the navigation tree, select Scheduled Reports > All Scheduled Reports. The All Scheduled Reports page appears. 3. Click the History Report icon for the asset usage reports. The History Report page appears. 4. Click the View link to open a statistics report, or save the statistics report (see Figure 50). Figure 50 Asset usage report Asset Usage Report parameters Report Time Time when the report was generated. Min. Idle Time Minimum number of idle days. Assets which have been offline for more than the specified days are displayed in the report. Description A brief description of the report. Asset Usage Report fields Asset Number Asset number of the idle asset. Asset Group Name of the asset group to which the asset belongs. Owner Owner of the asset. Management Time Time when the asset began to be managed. Last Off-line Last time when the asset went offline. Idle Period Period for which the asset has been idle. 261

273 CPU report This report collects statistics about assets whose CPU frequencies match certain criteria in the specified asset group, including its subgroups. The report displays CPU statistics of only asset groups to which the current operator has privileges. Adding a CPU report 1. Display the page for adding a scheduled report in one of the following ways: Click the Report tab and select Reports > Add Scheduled Report from the navigation tree. Click the Report tab and select Scheduled Reports > All Scheduled Reports from the navigation tree. When the All Scheduled Reports page appears, click Add. 2. Select a template: a. Click Select next to the Template Name field. b. Select EAD Service Report from the Type list in the Query Template area, and click Query. c. Select CPU Report and click OK. 3. Enter the report name in the Scheduled Report Name field. 4. Select an operator group that can view the report. When you select an operator group, all operators that belong to the group can view the report. To view the operators who belong to an operator group: a. Click the Operator Group Information icon next to the Access Right field. The Operator Group Information page appears. b. Select one or more operator groups in the Group Name area. The operators that belong to the selected operator groups are displayed. c. Click Close to return to the page for adding a report. 5. Specify the period for which a report will be generated. A scheduled report period is determined by both the schedule type and schedule time settings. Schedule Type Select one of the following scheduling options: Daily Weekly Monthly Quarterly Half Yearly Yearly Report Start Date Click the field to select the start date or the report in a calendar. 6. Set the time when a report becomes invalid and the EAD component no longer generates the report. Click the End by box. Enter an end time in the format YYYY-MM-DD hh:mm. You can also click the field to select the end time in a calendar. 7. From the Report File Format list, select a report file format. Options are PDF, CSV, MSExcel, and MSExcel (Data-only). 8. Send a report by . Click the Send by box, and enter the address of the receiver. Reports can be sent to one address. 262

274 9. Set the minimum CPU frequency (in MHz) and maximum CPU frequency (in MHz). The CPU report collects statistics about assets whose CPU frequencies are between the minimum frequency and the maximum frequency. a. Click the Set Parameter icon for the Minimum Frequency. b. In the Parameter Value field, enter the minimum CPU frequency. c. Click OK to return to the page for adding a report. The Set Parameter icon changes from to. d. Click the Set Parameter icon for the Maximum Frequency. e. In the Parameter Value field, enter the maximum CPU frequency. f. Click OK to return to the page for adding a report. The Set Parameter icon changes from to. 10. Set the asset group. The CPU report collects statistics about the CPU frequencies of all registered assets in the specified asset group, including its subgroups. a. Click the Set Parameter icon for the asset group. b. Select an asset group from the Parameter Value list. The options are asset group names. c. Click OK to return to the page for adding a report. 11. Click OK. Viewing CPU reports The Set Parameter icon changes from to. 1. Click the Report tab. 2. From the navigation tree, select Scheduled Reports > All Scheduled Reports. The All Scheduled Reports page appears. 3. Click the History Report icon for the CPU reports. The History Report page appears. 4. Click the View link to open a statistics report, or save the statistics report (see Figure 51). Figure 51 CPU report CPU Report parameters Minimum Frequency Minimum frequency (in MHz) of the CPU frequency range. Maximum Frequency Maximum frequency (in MHz) of the CPU frequency range. Report Time Time when the report was generated. Group Name Name of the asset group. This report collects CPU frequency statistics for the specified asset group, including its subgroups. All indicates all asset groups. The report collects statistics about only asset groups to which the current operator has privileges. 263

275 Description A brief description of the report. CPU Report fields Asset Number Asset number of the asset. Asset Name Name of the asset. Owner Owner of the asset. CPU SN Number of the CPU in the operating system. CPU Name Product name of the CPU. Frequency CPU frequency (in MHz) of the asset. Hard disk capacity report This report collects statistics about the number of hard disks of assets in the specified asset group, including its subgroups, and classifies the hard disks according to their capacity: <80 GB [80 GB to 160 GB) [160 GB to 250 GB) [250 GB to 500 GB) [500 GB to 1024 GB) >=1024 GB The report displays the hard disk capacity statistics of only asset groups to which the current operator has privileges. Adding a hard disk capacity report 1. Display the page for adding a scheduled report in one of the following ways: Click the Report tab and select Reports > Add Scheduled Report from the navigation tree. Click the Report tab and select Scheduled Reports > All Scheduled Reports from the navigation tree. When the All Scheduled Reports page appears, click Add. 2. Select a template: a. Click Select next to the Template Name field. b. Select EAD Service Report from the Type list in the Query Template area, and click Query. c. Select Hard Disk Capacity Report and click OK. 3. Enter the report name in the Scheduled Report Name field. 4. Select an operator group that can view the report. When you select an operator group, all operators that belong to the group can view the report. To view the operators who belong to an operator group: a. Click the Operator Group Information icon next to the Access Right field. The Operator Group Information page appears. b. Select one or more operator groups in the Group Name area. The operators that belong to the selected operator groups are displayed. c. Click Close to return to the page for adding a report. 5. Specify the period for which a report will be generated. A scheduled report period is determined by both the schedule type and schedule time settings. Schedule Type Select one of the following scheduling options: 264

276 Daily Weekly Monthly Quarterly Half Yearly Yearly Report Start Date click the field to select the start date for the report in a calendar. 6. Set the time when a report becomes invalid and the EAD component no longer generates the report. Click the End by box. Enter an end time in the format YYYY-MM-DD hh:mm. You can also click the field to select the end time in a calendar. 7. From the Report File Format list, select a report file format. Options are PDF, CSV, MSExcel, and MSExcel (Data-only). 8. Send a report by . Click the Send by box, and enter the address of the receiver. Reports can be sent to one address. 9. Set the asset group. The hard disk capacity report collects the hard disk capacity statistics of all registered assets in the specified asset group, including its subgroups. a. Click the Set Parameter icon for the asset group. b. Select an asset group from the Parameter Value list. The options are asset group names. c. Click OK to return to the page for adding a report. 10. Click OK. The Set Parameter icon changes from to. Viewing hard disk capacity reports 1. Click the Report tab. 2. From the navigation tree, select Scheduled Reports > All Scheduled Reports. The All Scheduled Reports page appears. 3. Click the History Report icon for the hard disk capacity reports. The History Report page appears. 4. Click the View link to open a statistics report, or save the statistics report (see Figure 52). 265

277 Figure 52 Hard disk capacity report Hard Disk Capacity Report parameters Report Time Time when the report was generated. Group Name Name of the asset group. This report collects the hard disk capacity statistics for the specified asset group, including its subgroups. All indicates all asset groups. The report collects statistics about only asset groups to which the current operator has privileges. Description A brief description of the report. Hard Disk Capacity Statistics pie chart The hard disk capacity statistics pie chart displays the distribution of hard-disk capacities. Hard-disk capacity is classified into the following levels: <80 GB [80 GB to 160 GB) [160 GB to 250 GB) [250 GB to 500 GB) [500 GB to 1024 GB) >=1024 GB Illegal peripheral use report This report collects statistics about illegal peripheral usage types and the times of each type for the specified asset group, including its subgroups, during a specified time range. The peripheral types are: USB Storage USB Nonstorage DVD/CD-ROM Floppy 266

278 PCMCIA COM/LPT Infrared 1394 Bluetooth Modem The report displays illegal peripheral usage types and the times of each type for only asset groups to which the current operator has privileges. Adding an illegal peripheral use report 1. Display the page for adding a scheduled report in one of the following ways: Click the Report tab and select Reports > Add Scheduled Report from the navigation tree. Click the Report tab and select Scheduled Reports > All Scheduled Reports from the navigation tree. When the All Scheduled Reports page, click Add. 2. Select a template: a. Click Select next to the Template Name field. b. Select EAD Service Report from the Type list in the Query Template area, and click Query. c. Select Illegal Peripheral Use Report and click OK. 3. Enter the report name in the Scheduled Report Name field. 4. Select an operator group that can view the report. When you select an operator group, all operators that belong to the group can view the report. To see the operators who belong to an operator group: a. Click the Operator Group Information icon next to the Access Right field. The Operator Group Information page appears. b. Select one or more operator groups in the Group Name area. The operators that belong to the selected operator groups are displayed. c. Click Close to return to the page for adding a report. 5. Specify the period for which a report will be generated. A scheduled report period is determined by both the schedule type and schedule time settings. Schedule Type Select one of the following scheduling options: Daily, Weekly, Monthly, Quarterly, Half Yearly, and Yearly. Report Start Date Click the field to select the start date for the report in a calendar. 6. Set the time when a report becomes invalid and the EAD component no longer generates the report. Click the End by box. Enter an end time in the format YYYY-MM-DD hh:mm. You can also click the field to select the end time in a calendar. 7. From the Report File Format list, select a report file format. Options are PDF, CSV, MSExcel, and MSExcel (Data-only). 8. Send a report by . Click the Send by box, and enter the address of the receiver. Reports can be sent to one address. 9. Set the begin time and end time. The illegal peripheral use report collects statistics about the illegal peripheral usage types and the times of each type during a specified time range. 267

279 a. Click the Set Parameter icon for the start time. b. Select a begin time from the Schedule Parameter list. The options on the list depend on the schedule type configured in step 5. Daily Options are Begin time, One hour after begin time through Twenty-three hours after begin time, and End time. Weekly Options are Begin time, One day after begin time through Six days after begin time, and End time. Monthly Options are Begin time, One day after begin time through Thirty days after begin time, and End time. Quarterly Options are Begin time, One month after begin time, Two months after begin time, and End time. Half Yearly Options are Begin time, One month after begin time through Five months after begin time, and End time. Yearly Options are Begin time, One month after begin time through Eleven months after begin time, and End time. c. Click OK to return to the page for adding a report. The Set Parameter icon changes from to. d. Click the Set Parameter icon for the end time. e. Select an end time from the Schedule Parameter list. The options on the list depend on the schedule type configured in step 5. f. Click OK to return to the page for adding a report. The Set Parameter icon changes from to. The end time must be later than the begin time. 10. Set the asset group. The illegal peripheral use report collects statistics about illegal peripheral usage types and the times of each type for assets in the specified asset group, including its subgroups. a. Click the Set Parameter icon for the asset group. b. Select an asset group from the Parameter Value list. The options are asset group names. c. Click OK to return to the page for adding a report. 11. Click OK. The Set Parameter icon changes from to. Viewing illegal peripheral use reports 1. Click the Report tab. 2. Select Scheduled Reports > All Scheduled Reports from the navigation tree. The All Scheduled Reports page appears. 3. Click the History Report icon for the illegal peripheral use reports. The History Report page appears. 4. Click the View link to open a statistics report, or save the statistics report (see Figure 53). 268

280 Figure 53 Illegal peripheral use report Illegal Peripheral Use Report parameters Start Time Start time for the report statistics. End Time End time for the report statistics. Report Time Time when the report was generated. Group Name Name of the asset group. This report collects statistics about illegal peripheral usage types and the times of each type for the specified asset group, including its subgroups, during a specified time range. All indicates all asset groups. The report collects statistics about only asset groups to which the current operator has privileges. Description A brief description of the report. Illegal Peripheral Use Statistic pie chart The pie chart displays the distribution of illegal peripheral usage types and the times of each type during a specified time range. The illegal peripheral usage types are: USB Storage USB Nonstorage DVD/CD-ROM Floppy PCMCIA COM/LPT Infrared Bluetooth 1394 Modem 269

281 Insecurity category statistic report This report collects statistics about security check failures of each insecurity category for the current EAD node during a specified time range. An insecurity category refers to the type of reason for a security check to fail. Adding an insecurity category statistic report 1. Display the page for adding a scheduled report in one of the following ways: Click the Report tab and select Reports > Add Scheduled Report from the navigation tree. Click the Report tab and select Scheduled Reports > All Scheduled Reports from the navigation tree. When the All Scheduled Reports page appears, click Add. 2. Select a template: a. Click Select next to the Template Name field. b. Select EAD Service Report from the Type list in the Query Template area, and click Query. c. Select Insecurity Category Statistic Report and click OK. 3. Enter the report name in the Scheduled Report Name field. 4. Select an operator group that can view the report. When you select an operator group, all operators that belong to the group can view the report. To view the operators who belong to an operator group: a. Click the Operator Group Information icon next to the Access Right field. The Operator Group Information page appears. b. Select one or more operator groups in the Group Name area. The operators that belong to the operator groups are displayed. c. Click Close to return to the page for adding a report. 5. Specify the period for which a report will be generated. A scheduled report period is determined by both the schedule type and schedule time settings. Schedule Type Select one of the following scheduling options: Daily Weekly Monthly Quarterly Half Yearly Yearly Report Start Date Click the field to select the start date for the report in a calendar. 6. Set the time when a report becomes invalid and the EAD component does not generate the report. Click the End by box. Enter an end time in the format YYYY-MM-DD hh:mm. You can also click the field to select the end time in a calendar. 7. From the Report File Format list, select a report file format. Options are PDF, CSV, MSExcel, and MSExcel (Data-only). 8. Send a report by . Click the Send by box, and enter the address of the receiver. Reports can be sent to one address. 270

282 9. Set the begin time and end time. The insecurity category statistic report collects statistics about security check failures of each insecurity category during a specified time range. An insecurity category refers to the type of reason for security check failures. a. Click the Set Parameter icon for the start time. b. Select a begin time from the Schedule Parameter list. The options on the list depend on the schedule type configured in step 5. Daily Options are Begin time, One hour after begin time through Twenty-three hours after begin time, and End time. Weekly Options are Begin time, One day after begin time through Six days after begin time, and End time. Monthly Options are Begin time, One day after begin time through Thirty days after begin time, and End time. Quarterly Options are Begin time, One month after begin time, Two months after begin time, and End time. Half Yearly Options are Begin time, One month after begin time through Five months after begin time, and End time. Yearly Options are Begin time, One month after begin time through Eleven months after begin time, and End time. c. Click OK to return to the page for adding a report. The Set Parameter icon changes from to. d. Click the Set Parameter icon for the end time. e. Select an end time from the Schedule Parameter list. The options on the list depend on the schedule type configured in step 5. f. Click OK to return to the page for adding a report. 10. Click OK. The Set Parameter icon changes from to. The end time must be later than the begin time. Viewing insecurity category statistic reports 1. Select Scheduled Reports > All Scheduled Reports from the navigation tree. The All Scheduled Reports page appears. 2. Click the History Report icon for the insecurity category statistic reports. The History Report page appears. 3. Click the View link to open a statistics report, or save the statistics report (see Figure 54). 271

283 Figure 54 Insecurity category statistic report Insecurity Category Statistic Report parameters Start Time Start time for the report statistics. End Time End time for the report statistics. Report Time Time when the report was generated. Description A brief description of the report. Insecurity Category Statistic pie chart The insecurity category statistic pie chart displays the percentage of security check failures of each insecurity category compared to the total security check failures. Online user security status report This report collects statistics about the security status of all users in a user group, including its subgroups. The report collects statistics about only user groups to which the current operator has privileges. The security status of an online user can be: No Security Authentication Needed Waiting for Security Authentication Secure Insecure Others Adding an online user security status report 1. Display the page for adding a scheduled report in one of the following ways: Click the Report tab and select Reports > Add Scheduled Report from the navigation tree. Click the Report tab and select Scheduled Reports > All Scheduled Reports from the navigation tree. When the All Scheduled Reports page appears, click Add. 2. Select a template: a. Click Select next to the Template Name field. b. Select EAD Service Report from the Type list in the Query Template area, and click Query. 272

284 c. Select Online User Security Status Report and click OK. 3. Enter the report name in the Scheduled Report Name field. 4. Select an operator group that can view the report. When you select an operator group, all operators that belong to the group can view the report. To view the operators who belong to an operator group: a. Click the Operator Group Information icon next to the Access Right field. The Operator Group Information page appears. b. Select one or more operator groups in the Group Name area. The operators that belong to the operator groups are displayed. c. Click Close to return to the page for adding a report. 5. Specify the period for which a report will be generated. A scheduled report period is determined by both the schedule type and schedule time settings. Schedule Type Select one of the following scheduling options: Daily Weekly Monthly Quarterly Half Yearly Yearly Report Start Date Click the field to select the start date of the report in a calendar. 6. Set the time when a report becomes invalid. The EAD component no longer generates any scheduled report. Click the End by box. Enter an end time in the format YYYY-MM-DD hh:mm. You can also click the field to select the end time in a calendar. 7. From the Report File Format list, select a report file format. Options are PDF, CSV, MSExcel, and MSExcel (Data-only). 8. Send a report by . Click the Send by box, and enter the address of the receiver. Reports can be sent to one address. 9. Set the user group. The online user security status report collects statistics about the security status of all users in a user group, including its subgroups. a. Click the Set Parameter icon for the user group. b. Select a user group from the Parameter Value list. The options are user group names. c. Click OK to return to the page for adding a report. 10. Click OK. The Set Parameter icon changes from to. Viewing online user security status reports 1. Click the Report tab. 2. Select Scheduled Reports > All Scheduled Reports from the navigation tree. The All Scheduled Reports page appears. 3. Click the History Report icon for the online user security status reports. The History Report page appears. 273

285 4. Click the View link to open a statistics report, or save the statistics report (see Figure 55). Figure 55 Online user security status report Online User Security Status Report parameters User Group Name of the user group. This report collects statistics about the security status of all users in a user group, including its subgroups. All indicates all user groups. The report collects statistics about only user groups to which the current operator has privileges. Report Time Time when the report was generated. Description A brief description of the report. Online User Security Status Category Statistics pie chart This report displays the distribution of security statuses of all users in a user group, including its subgroups. The security status of an online user can be: No Security Authentication Needed Waiting for Security Authentication Secure Insecure Others OS language report This report collects statistics about OS language types and the number of assets using each OS language type for all registered assets in the specified asset group, including its subgroups. The report collects statistics about only asset groups to which the current operator has privileges. The language types include Chinese (PRC), English, and Others. Adding an OS language report 1. Display the page for adding a scheduled report in one of the following ways: Click the Report tab and select Reports > Add Scheduled Report from the navigation tree. Click the Report tab and select Scheduled Reports > All Scheduled Reports from the navigation tree. When the All Scheduled Reports page appears, click Add. 2. Select a template: a. Click Select next to the Template Name field. 274

286 b. Select EAD Service Report from the Type list in the Query Template area, and click Query. c. Select OS Language Report and click OK. 3. Enter the report name in the Scheduled Report Name field. 4. Select an operator group that can view the report. When you select an operator group, all operators that belong to the group can view the report. To view the operators who belong to an operator group: a. Click the Operator Group Information icon next to the Access Right field. The Operator Group Information page appears. b. Select one or more operator groups in the Group Name area. The operators that belong to the operator groups are displayed. c. Click Close to return to the page for adding a report. 5. Specify the period for which a report will be generated. A scheduled report period is determined by both the schedule type and schedule time settings. Schedule Type Select one of the following scheduling options: Daily Weekly Monthly Quarterly Half Yearly Yearly Report Start Date Click the field to select the start date for the report in a calendar. 6. Set the time when a report becomes invalid and the EAD component no longer generates the report. Click the End by box. Enter an end time in the format YYYY-MM-DD hh:mm. You can also click the field to select the end time in a calendar. 7. From the Report File Format list, select a report file format. Options are PDF, CSV, MSExcel, and MSExcel (Data-only). 8. Send a report by . Click the Send by box, and enter the address of the receiver. Reports can be sent to one address. 9. Set the asset group. The OS language report collects statistics about OS language types and the number of assets using each OS language type for all registered assets in the specified asset group, including its subgroups. a. Click the Set Parameter icon for the asset group. b. Select an asset group from the Parameter Value list. The options are asset group names. c. Click OK to return to the page for adding a report. 10. Click OK. Viewing OS language reports The Set Parameter icon changes from to. 1. Click the Report tab. 2. Select Scheduled Reports > All Scheduled Reports from the navigation tree. The All Scheduled Reports page appears. 275

287 3. Click the History Report icon for the OS language reports. The History Report page appears. 4. Click the View link to open a statistics report, or save the statistics report (see Figure 56). Figure 56 OS language report OS Language Report parameters Report Time Time when the report was generated. Description A brief description of the report. Group Name Name of the asset group. This report collects statistics about OS language types and the number of assets using each OS language type for all registered assets in the specified asset group, including its subgroups. All indicates all asset groups. The report collects statistics about only asset groups to which the current operator has privileges. OS Language Statistics pie chart This report displays the distribution of OS language types of all registered assets in the specified asset group, including its subgroups. The recognizable language types include Chinese (PRC), English, and Others. OS version report This report collects statistics about OS versions and the number of assets running each OS version for all registered assets. It displays the distribution of top five OS versions. The report collects statistics about only asset groups to which the current operator has privileges. Adding an OS version report 1. Display the page for adding a scheduled report in one of the following ways: Click the Report tab and select Reports > Add Scheduled Report from the navigation tree. Click the Report tab and select Scheduled Reports > All Scheduled Reports from the navigation tree. When the All Scheduled Reports page appears, click Add. 2. Select a template: a. Click Select next to the Template Name field. 276

288 b. Select EAD Service Report from the Type list in the Query Template area, and click Query. c. Select Online User Security Status Report and click OK. 3. Enter the report name in the Scheduled Report Name field. 4. Select an operator group that can view the report. When you select an operator group, all operators that belong to the group can view the report. To view the operators who belong to an operator group: a. Click the Operator Group Information icon next to the Access Right field. The Operator Group Information page appears. b. Select one or more operator groups in the Group Name area. The operators that belong to the operator groups are displayed. c. Click Close to return to the page for adding a report. 5. Specify the period for which a report will be generated. A scheduled report period is determined by both the schedule type and schedule time settings. Schedule Type Select one of the following scheduling options: Daily, Weekly, Monthly, Quarterly, Half Yearly, and Yearly. Report Start Date Click the field to select the start date for the report in a calendar. 6. Set the time when a report becomes invalid and the EAD component no longer generates the report. Click the End by box. Enter an end time in the format YYYY-MM-DD hh:mm. You can also click the field to select the end time in a calendar. 7. From the Report File Format list, select a report file format. Options are PDF, CSV, MSExcel, and MSExcel (Data-only). 8. Send a report by . Click the Send by box, and enter the address of the receiver. Reports can be sent to one address. 9. Click OK. Viewing OS version reports 1. Click the Report tab. 2. Select Scheduled Reports > All Scheduled Reports from the navigation tree. The All Scheduled Reports page appears. 3. Click the History Report icon for the OS version reports. The History Report page appears. 4. Click the View link to open a statistics report, or save the statistics report (see Figure 57). 277

289 Figure 57 OS version report OS Version Report parameters Report Time Time when the report was generated. Description A brief description of the report. OS Version Statistics pie chart The pie chart displays the distribution of the top five OS versions for all registered assets. Safe log gather statistic report This report collects statistics about security logs of the current EAD node and all its child nodes, and displays the distribution of each type of insecurity event during a specified time range. Adding a safe log gather statistic report 1. Display the page for adding a scheduled report in one of the following ways: Click the Report tab and select Reports > Add Scheduled Report from the navigation tree. Click the Report tab and select Scheduled Reports > All Scheduled Reports from the navigation tree. When the All Scheduled Reports page appears, click Add. 2. Select a template: a. Click Select next to the Template Name field. b. Select EAD Service Report from the Type list in the Query Template area, and click Query. c. Select Safe Log Gather Statistic Report and click OK. 3. Enter the report name in the Scheduled Report Name field. 4. Select an operator group that can view the report. When you select an operator group, all operators that belong to the group can view the report. To view the operators who belong to an operator group: a. Click the Operator Group Information icon next to the Access Right field. The Operator Group Information page appears. b. Select one or more operator groups in the Group Name area. 278

290 The operators that belong to the selected operator groups are displayed. c. Click Close to return to the page for adding a report. 5. Specify the period for which a report will be generated. A scheduled report period is determined by both the schedule type and schedule time settings. Schedule Type Select one of the following scheduling options: Daily Weekly Monthly Quarterly Half Yearly Yearly Report Start Date Click the field to select the start date for the report in a calendar. 6. Set the time when a report becomes invalid and the EAD component no longer generates the report. Click the End by box. Enter an end time in the format YYYY-MM-DD hh:mm. You can also click the field to select the end time in a calendar. 7. From the Report File Format list, select a report file format. Options are PDF, CSV, MSExcel, and MSExcel (Data-only). 8. Send a report by . Click the Send by box, and enter the address of the receiver. Reports can be sent to one address. 9. Set the begin time and end time. The safe log gather statistic report collects statistics about security logs of the current EAD node and all its child nodes, and displays the distribution of each type of insecurity event during a specified time range. a. Click the Set Parameter icon for the begin time. b. Select a begin time from the Schedule Parameter list. The options on the list depend on the schedule type configured in step 5. Daily Options are Begin time, One hour after begin time through Twenty-three hours after begin time, and End time. Weekly Options are Begin time, One day after begin time through Six days after begin time, and End time. Monthly Options are Begin time, One day after begin time through Thirty days after begin time, and End time. Quarterly Options are Begin time, One month after begin time, Two months after begin time, and End time. Half Yearly Options are Begin time, One month after begin time through Five months after begin time, and End time. Yearly Options are Begin time, One month after begin time through Eleven months after begin time, and End time. c. Click OK to return to the page for adding a report. The Set Parameter icon changes from to. d. Click the Set Parameter icon for the end time. e. Select an end time from the Schedule Parameter list. The options on the list depend on the schedule type configured in step 5. f. Click OK to return to the page for adding a report. 279

291 The Set Parameter icon changes from to. The end time must be later than the begin time. 10. Set the grade node. Safe log gather statistic report collects statistics about security logs of the node and all its child nodes. a. Click the Set Parameter icon for the grade node. b. Select a grade node from the Parameter Value list. The options are EAD grade node names. c. Click OK to return to the page for adding a report. 11. Click OK. The Set Parameter icon changes from to. Viewing safe log gather statistic reports 1. Click the Report tab. 2. Select Scheduled Reports > All Scheduled Reports from the navigation tree. The All Scheduled Reports page appears. 3. Click the History Report icon for the safe log gather statistic reports. 4. The History Report page appears. 5. Click the View link to open a statistics report, or save the statistics report (Figure 58). Figure 58 Safe log gather statistic report Safe Log Gather Statistic Report parameters Start Time Start time for the report statistics. End Time End time for the report statistics. Report Time Time when the report was generated. Grade Node Name of the asset group whose statistics are collected by the report. The report collects statistics about only nodes to which the current operator has privileges. Description A brief description of the report. Safe Log Gather Statistic pie chart 280

292 The pie chart displays the distribution of the insecurity events on the specified node and all its child nodes. The insecurity event types are: Anti-virus software Anti-spyware software Firewall software Anti-phishing software Hard disk encryption software Windows patches Patch manager Applications - software Applications - processes Applications - services Applications - files Registry Traffic OS password Sharing Asset registration Software installation report This report collects statistics about the software names and the number of assets with each type of software installed for all registered assets in the specified asset group, including its subgroups. The report collects statistics about only asset groups to which the current operator has privileges. Adding a software installation report 1. Display the page for adding a scheduled report in one of the following ways: Click the Report tab and select Reports > Add Scheduled Report from the navigation tree. Click the Report tab and select Scheduled Reports > All Scheduled Reports from the navigation tree. When the All Scheduled Reports page appears, click Add. 2. Select a template: a. Click Select next to the Template Name field. b. Select EAD Service Report from the Type list in the Query Template area, and click Query. c. Select Software Installation Report and click OK. 3. Enter the report name in the Scheduled Report Name field. 4. Select an operator group that can view the report. When you select an operator group, all operators that belong to the group can view the report. To view the operators who belong to an operator group: a. Click the Operator Group Information icon next to the Access Right field. The Operator Group Information page appears. b. Select one or more operator groups in the Group Name area. The operators that belong to the operator groups are displayed. c. Click Close to return to the page for adding a report. 5. Specify the period for which a report will be generated. 281

293 A scheduled report period is determined by both the schedule type and schedule time settings. Schedule Type Select one of the following scheduling options: Daily Weekly Monthly Quarterly Half Yearly Yearly Report Start Date Click the field to select the start date for the report in a calendar. 6. Set the time when a report becomes invalid and the EAD component no longer generates the report. Click the End by box. Enter an end time in the format YYYY-MM-DD hh:mm. You can also click the field to select the time in a calendar. 7. From the Report File Format list, select a report file format. Options are PDF, CSV, MSExcel, and MSExcel (Data-only). 8. Send a report by . Click the Send by box, and enter the address of the receiver. Reports can be sent to one address. 9. Set the asset group. The software installation report collects statistics about the software names and the number of assets with each type of software installed for all registered assets in the specified asset group, including its subgroups. a. Click the Set Parameter icon for the asset group. b. Select an asset group from the Parameter Value list. The options are asset group names. c. Click OK to return to the page for adding a report. 10. Click OK. The Set Parameter icon changes from to. Viewing software installation reports 1. Click the Report tab. 2. Select Scheduled Reports > All Scheduled Reports from the navigation tree. The All Scheduled Reports page appears. 3. Click the History Report icon for the software installation reports. The History Report page appears. 4. Click the View link to open a statistics report, or save the statistics report (see Figure 59). 282

294 Figure 59 Software installation report Software Installation Report parameters Report Time Time when the report was generated. Group Name Name of the asset group. This report collects statistics about the software names and the number of assets with each type of software installed for all registered assets in the specified asset group, including its subgroups. All indicates all asset groups. The report collects statistics about only asset groups to which the current operator has privileges. Description A brief description of the report. Software Installation Report fields Software Name Name of the software installed on the assets. Software Version The software version. The software installation report separately collects statistics about software products with the same name but different versions. Assets Number of assets with the software installed. Software Report by Asset This report allows you to query all software products that are installed on the specified asset in an asset group to which you have the operation privileges. Adding an asset software by report 1. Display the page for adding a scheduled report in one of the following ways: Click the Report tab and select Reports > Add Scheduled Report from the navigation tree. Click the Report tab and select Scheduled Reports > All Scheduled Reports from the navigation tree. When the All Scheduled Reports page appears, click Add. 2. Select a template: a. Click Select next to the Template Name field. b. Select EAD Service Report from the Type list in the Query Template area, and click Query. c. Select Software Report by Asset and click OK. 283

295 3. Enter the report name in the Scheduled Report Name field. 4. Select an operator group that can view the report. When you select an operator group, all operators that belong to the group can view the report. To view the operators who belong to an operator group: a. Click the Operator Group Information icon next to the Access Right field. The Operator Group Information page appears. b. Select one or more operator groups in the Group Name area. The operators that belong to the operator groups are displayed. c. Click Close to return to the page for adding a report. 5. Specify the period for which a report will be generated. A scheduled report period is determined by both the schedule type and schedule time settings. Schedule Type Select one of the following scheduling options: Daily Weekly Monthly Quarterly Half Yearly Yearly Report Start Date Click the field to select the start date for the report in a calendar. 6. Set the time when a report becomes invalid and the EAD component no longer generates the report. Click the End by box. Enter an end time in the format YYYY-MM-DD hh:mm. You can also click the field to select the time in a calendar. 7. From the Report File Format list, select a report file format. Options are PDF, CSV, MSExcel, and MSExcel (Data-only). 8. Send a report by . Click the Send by box, and enter the address of the receiver. Reports can be sent to one address. 9. Set the asset number. The software report by asset allows you to query all software products that are installed on the specified asset in an asset group to which you have the operation privileges. a. Click the Set Parameter icon for the asset number, and enter the number of the target asset. b. Click OK to return to the page for adding a report. 10. Click OK. Viewing software reports The Set Parameter icon changes from to. 1. Click the Report tab. 2. Select Scheduled Reports > All Scheduled Reports from the navigation tree. The All Scheduled Reports page appears. 3. Click the History Report icon for the asset information reports. The History Report page appears. 4. Click the View link to open a statistics report, or save the statistics report (see Figure 60). 284

296 Figure 60 Software Report by Asset Software Report by Asset parameters Report Time Time when the report was generated. Asset Number Number of the target asset. Asset Name Name of the target asset. Group Name Asset group to which the target asset belongs. Owner Owner of the target asset. Description A brief description of the report. Software Report by Asset fields Software Name Name of the software that is installed on the asset. Software Version Version of the software that is installed on the asset. Installed On Time when the software was installed on the asset. 285

HPE Intelligent Management Center v7.3

HPE Intelligent Management Center v7.3 HPE Intelligent Management Center v7.3 Service Operation Manager Administrator Guide Abstract This guide contains comprehensive conceptual information for network administrators and other personnel who

More information

HPE Intelligent Management Center

HPE Intelligent Management Center HPE Intelligent Management Center Service Health Manager Administrator Guide Abstract This guide provides introductory, configuration, and usage information for Service Health Manager (SHM). It is for

More information

HP Intelligent Management Center Remote Site Management User Guide

HP Intelligent Management Center Remote Site Management User Guide HP Intelligent Management Center Remote Site Management User Guide Abstract This book provides overview and procedural information for Remote Site Management, an add-on service module to the Intelligent

More information

HP Intelligent Management Center SOM Administrator Guide

HP Intelligent Management Center SOM Administrator Guide HP Intelligent Management Center SOM Administrator Guide Abstract This guide contains comprehensive conceptual information for network administrators and other personnel who administrate and operate the

More information

QuickSpecs. Aruba ClearPass OnGuard Software. Overview. Product overview. Key Features

QuickSpecs. Aruba ClearPass OnGuard Software. Overview. Product overview. Key Features Enterprise-class endpoint protection, posture assessments and health checks Product overview ClearPass OnGuard agents perform advanced endpoint posture assessments on leading computer operating systems

More information

HP 3PAR OS MU1 Patch 11

HP 3PAR OS MU1 Patch 11 HP 3PAR OS 313 MU1 Patch 11 Release Notes This release notes document is for Patch 11 and intended for HP 3PAR Operating System Software HP Part Number: QL226-98041 Published: December 2014 Edition: 1

More information

HPE Intelligent Management Center

HPE Intelligent Management Center HPE Intelligent Management Center Branch Intelligent Management System Administrator Guide Abstract This document describes how to administer the HPE IMC Branch Intelligent Management System. Part number:

More information

HP 3PAR OS MU3 Patch 18 Release Notes

HP 3PAR OS MU3 Patch 18 Release Notes HP 3PAR OS 3.2.1 MU3 Patch 18 Release Notes This release notes document is for Patch 18 and intended for HP 3PAR Operating System Software 3.2.1.292 (MU3). HP Part Number: QL226-98326 Published: August

More information

HPE ALM Excel Add-in. Microsoft Excel Add-in Guide. Software Version: Go to HELP CENTER ONLINE

HPE ALM Excel Add-in. Microsoft Excel Add-in Guide. Software Version: Go to HELP CENTER ONLINE HPE ALM Excel Add-in Software Version: 12.55 Microsoft Excel Add-in Guide Go to HELP CENTER ONLINE http://alm-help.saas.hpe.com Document Release Date: August 2017 Software Release Date: August 2017 Legal

More information

HPE 3PAR OS GA Patch 12

HPE 3PAR OS GA Patch 12 HPE 3PAR OS 3.3.1 GA Patch 12 Upgrade Instructions Abstract This upgrade instructions document is for installing Patch 12 on the HPE 3PAR Operating System Software OS-3.3.1.215-GA. This document is for

More information

HP Business Service Management

HP Business Service Management HP Business Service Management Software Version: 9.26 Getting Started With BPM - Best Practices Document Release Date: September 2015 Software Release Date: September 2015 Legal Notices Warranty The only

More information

HPE Intelligent Management Center

HPE Intelligent Management Center HPE Intelligent Management Center VAN Connection Manager Administrator Guide Abstract This guide contains comprehensive information for network administrators, engineers, and operators who manage the VAN

More information

HP IMC Smart Connect Virtual Appliance Software

HP IMC Smart Connect Virtual Appliance Software Data sheet HP IMC Smart Connect Virtual Appliance Software Key features Identity-based access, advanced device profiling, and real-time traffic quarantining Converged network support with universal policies

More information

IMC inode Intelligent Client v7.0 (E0106) Copyright (c) Hewlett-Packard Development Company, L.P. and its licensors.

IMC inode Intelligent Client v7.0 (E0106) Copyright (c) Hewlett-Packard Development Company, L.P. and its licensors. IMC inode Intelligent Client v7.0 (E0106) Copyright (c) 2011-2014 Hewlett-Packard Development Company, L.P. and its licensors. Table of Contents 1. What's New in this Release 2. Problems Fixed in this

More information

HPE 3PAR OS MU5 Patch 49 Release Notes

HPE 3PAR OS MU5 Patch 49 Release Notes HPE 3PAR OS 3.2.1 MU5 Patch 49 Release Notes This release notes document is for Patch 49 and intended for HPE 3PAR Operating System Software + P39. Part Number: QL226-99362a Published: October 2016 Edition:

More information

HPE 3PAR OS MU2 Patch 36 Release Notes

HPE 3PAR OS MU2 Patch 36 Release Notes HPE 3PAR OS 321 MU2 Patch 36 Release Notes This release notes document is for Patch 36 and intended for HPE 3PAR Operating System Software 321200 (MU2)+P13 Part Number: QL226-99149 Published: May 2016

More information

ALM. What's New. Software Version: Go to HELP CENTER ONLINE

ALM. What's New. Software Version: Go to HELP CENTER ONLINE ALM Software Version: 12.55 What's New Go to HELP CENTER ONLINE http://admhelp.microfocus.com// Document Release Date: August 2017 Software Release Date: August 2017 ALM ALM (12.55) Page 2 of

More information

HP Intelligent Management Center v7.1 Branch Intelligent Management System Administrator Guide

HP Intelligent Management Center v7.1 Branch Intelligent Management System Administrator Guide HP Intelligent Management Center v7.1 Branch Intelligent Management System Administrator Guide Abstract This document describes how to administer the HP IMC Branch Intelligent Management System. HP Part

More information

HPE 3PAR OS MU3 Patch 18 Upgrade Instructions

HPE 3PAR OS MU3 Patch 18 Upgrade Instructions HPE 3PAR OS 3.1.3 MU3 Patch 18 Upgrade Instructions This upgrade instructions document is for installing Patch 18 on the HPE 3PAR Operating System Software 3.1.3.334 (MU3). This document is for Hewlett

More information

HP 3PAR OS MU3 Patch 17

HP 3PAR OS MU3 Patch 17 HP 3PAR OS 3.2.1 MU3 Patch 17 Release Notes This release notes document is for Patch 17 and intended for HP 3PAR Operating System Software. HP Part Number: QL226-98310 Published: July 2015 Edition: 1 Copyright

More information

HPE StoreEver MSL6480 Tape Library CLI Utility Version 1.0 User Guide

HPE StoreEver MSL6480 Tape Library CLI Utility Version 1.0 User Guide HPE StoreEver MSL6480 Tape Library CLI Utility Version 1.0 User Guide Abstract This document explains how to install and use the HPE StoreEver MSL6480 Tape Library CLI utility, which provides a non-graphical

More information

HP Operations Orchestration Software

HP Operations Orchestration Software HP Operations Orchestration Software Software Version: 7.51 HP SiteScope Integration Guide Document Release Date: August 2009 Software Release Date: August 2009 Legal Notices Warranty The only warranties

More information

HPE 3PAR OS MU3 Patch 24 Release Notes

HPE 3PAR OS MU3 Patch 24 Release Notes HPE 3PAR OS 3.1.3 MU3 Patch 24 Release Notes This release notes document is for Patch 24 and intended for HPE 3PAR Operating System Software + P19. Part Number: QL226-99298 Published: August 2016 Edition:

More information

HP Intelligent Management Center Remote Site Manager

HP Intelligent Management Center Remote Site Manager HP Intelligent Management Center Remote Site Manager Administrator Guide Abstract This guide contains comprehensive information for network administrators, engineers, and operators who manage the IMC Remote

More information

ForeScout Extended Module for MobileIron

ForeScout Extended Module for MobileIron Version 1.8 Table of Contents About MobileIron Integration... 4 Additional MobileIron Documentation... 4 About this Module... 4 How it Works... 5 Continuous Query Refresh... 5 Offsite Device Management...

More information

HP Intelligent Management Center Branch Intelligent Management System (BIMS) User Guide

HP Intelligent Management Center Branch Intelligent Management System (BIMS) User Guide HP Intelligent Management Center Branch Intelligent Management System (BIMS) User Guide Abstract This guide contains basic information for network administrators, engineers, and operators who use the Branch

More information

ForeScout Extended Module for MaaS360

ForeScout Extended Module for MaaS360 Version 1.8 Table of Contents About MaaS360 Integration... 4 Additional ForeScout MDM Documentation... 4 About this Module... 4 How it Works... 5 Continuous Query Refresh... 5 Offsite Device Management...

More information

HPE 3PAR OS MU3 Patch 28 Release Notes

HPE 3PAR OS MU3 Patch 28 Release Notes HPE 3PAR OS 3.2.1 MU3 Patch 28 Release tes This release notes document is for Patch 28 and intended for HPE 3PAR Operating System Software 3.2.1.292 (MU3)+Patch 23. Part Number: QL226-99107 Published:

More information

HP Web Jetadmin 8.0 Credential Store Feature

HP Web Jetadmin 8.0 Credential Store Feature HP Web Jetadmin 8.0 Credential Store Feature Table of Contents: Overview...1 The Credential Store...1 Interacting with the Credential Store...2 Configuration of Device Credentials...2 Example...3 Credential

More information

QuickSpecs. HP IMC Branch Intelligent Management Software. Models HP IMC Branch Intelligent Management System Software Module w/50-node E-LTU

QuickSpecs. HP IMC Branch Intelligent Management Software. Models HP IMC Branch Intelligent Management System Software Module w/50-node E-LTU Overview Models HP IMC Branch Intelligent Management System Software Module w/50-node E-LTU JG265AAE Key features Unified resource management Single-pane visibility Integrated access and user management

More information

Ekran System v Program Overview

Ekran System v Program Overview Ekran System v. 6.2 Program Overview Contents About the Program Login Ekran Server & Management Tool Notifying Users about Being Database Management Monitored Licensing User Blocking Client Installation

More information

HP OfficeJet 200 Mobile Printer series. Bluetooth Setup Guide

HP OfficeJet 200 Mobile Printer series. Bluetooth Setup Guide HP OfficeJet 200 Mobile Printer series Bluetooth Setup Guide Copyright information Copyright 2017 HP Development Company, L.P Edition 1, 4/2017 HP Company notices The information contained in this document

More information

HPE 3PAR OS MU3 Patch 23 Release Notes

HPE 3PAR OS MU3 Patch 23 Release Notes HPE 3PAR OS 321 MU3 Patch 23 Release tes This release notes document is for Patch 23 and intended for HPE 3PAR Operating System Software 321292 (MU3)+Patch 18 Part Number: QL226-98364 Published: December

More information

HP ALM Performance Center

HP ALM Performance Center HP ALM Performance Center Software Version: 12.53 Quick Start Document Release Date: May 2016 Software Release Date: May 2016 Legal Notices Warranty The only warranties for Hewlett Packard Enterprise Development

More information

HPE FlexFabric 5950 Switch Series

HPE FlexFabric 5950 Switch Series HPE FlexFabric 5950 Switch Series About the HPE FlexFabric 5950 Configuration Guides Part number: 5200-0808 Software version: Release 6106 and later Document version: 6W100-20160513 Copyright 2016 Hewlett

More information

HP Data Center Automation Appliance

HP Data Center Automation Appliance HP Data Center Automation Appliance DCAA at-a-glance Express Edition Software Version: 1.00 Release Date: April 2015 Legal Notices Warranty The only warranties for HP products and services are set forth

More information

HP Device as a Service (DaaS)

HP Device as a Service (DaaS) HP Device as a Service (DaaS) Smart, simplified computing solutions for today s world. Proud Technology Services Industry Association (TSIA) award winner Managing and securing multi-os environments can

More information

HPE Project and Portfolio Management Center

HPE Project and Portfolio Management Center HPE Project and Portfolio Management Center Software Version: 9.41 Getting Started Go to HELP CENTER ONLINE http://ppm-help.saas.hpe.com Document Release Date: March 2017 Software Release Date: March 2017

More information

HPE 1/8 G2 Tape Autoloader and MSL Tape Libraries Encryption Kit User Guide

HPE 1/8 G2 Tape Autoloader and MSL Tape Libraries Encryption Kit User Guide HPE 1/8 G2 Tape Autoloader and MSL Tape Libraries Encryption Kit User Guide Abstract This guide provides information about developing encryption key management processes, configuring the tape autoloader

More information

Seqrite Endpoint Security

Seqrite Endpoint Security Enterprise Security Solutions by Quick Heal Integrated enterprise security and unified endpoint management console Enterprise Suite Edition Product Highlights Innovative endpoint security that prevents

More information

HPE SiteScope. SiteScope Public API Reference Guide. Software Version: Go to HELP CENTER ONLINE

HPE SiteScope. SiteScope Public API Reference Guide. Software Version: Go to HELP CENTER ONLINE HPE SiteScope Software Version: 11.40 SiteScope Public API Reference Guide Go to HELP CENTER ONLINE http://sitescope-help.saas.hpe.com Document Release Date: August 2017 Software Release Date: August 2017

More information

ForeScout Extended Module for VMware AirWatch MDM

ForeScout Extended Module for VMware AirWatch MDM ForeScout Extended Module for VMware AirWatch MDM Version 1.7.2 Table of Contents About the AirWatch MDM Integration... 4 Additional AirWatch Documentation... 4 About this Module... 4 How it Works... 5

More information

HP Database and Middleware Automation

HP Database and Middleware Automation HP Database and Middleware Automation For Windows Software Version: 10.10 SQL Server Database Refresh User Guide Document Release Date: June 2013 Software Release Date: June 2013 Legal Notices Warranty

More information

HP UFT Connection Agent

HP UFT Connection Agent HP UFT Connection Agent Software Version: For UFT 12.53 User Guide Document Release Date: June 2016 Software Release Date: June 2016 Legal Notices Warranty The only warranties for Hewlett Packard Enterprise

More information

GLOBALPROTECT. Key Usage Scenarios and Benefits. Remote Access VPN Provides secure access to internal and cloud-based business applications

GLOBALPROTECT. Key Usage Scenarios and Benefits. Remote Access VPN Provides secure access to internal and cloud-based business applications GLOBALPROTECT Prevent Breaches and Secure the Mobile Workforce GlobalProtect extends the protection of Palo Alto Networks Next-Generation Security Platform to the members of your mobile workforce, no matter

More information

HPE FlexFabric 5940 Switch Series

HPE FlexFabric 5940 Switch Series HPE FlexFabric 5940 Switch Series MCE Configuration Guide Part number: 5200-1024b Software version: Release 25xx Document version: 6W102-20170830 Copyright 2017 Hewlett Packard Enterprise Development LP

More information

HPE ALM Client MSI Generator

HPE ALM Client MSI Generator HPE ALM Client MSI Generator Software Version: 12.55 User Guide Document Release Date: August 2017 Software Release Date: August 2017 HPE ALM Client MSI Generator Legal Notices Warranty The only warranties

More information

HPE Insight Online User Guide

HPE Insight Online User Guide HPE Insight Online User Guide Document Release Date: October 2017 Software Release Date: October 2017 Legal Notices Warranty The only warranties for Hewlett Packard Enterprise Development LP products and

More information

HP AutoPass License Server

HP AutoPass License Server HP AutoPass License Server Software Version: 9.0 Windows, Linux and CentOS operating systems Support Matrix Document Release Date: October 2015 Software Release Date: October 2015 Page 2 of 10 Legal Notices

More information

Oracle Hospitality RES 3700 Server Setup Guide Release 5.5 E May 2016

Oracle Hospitality RES 3700 Server Setup Guide Release 5.5 E May 2016 Oracle Hospitality RES 3700 Server Setup Guide Release 5.5 E76174-01 May 2016 Copyright 1998, 2016, Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided

More information

HP Automation Insight

HP Automation Insight HP Automation Insight For the Red Hat Enterprise Linux and SUSE Enterprise Linux operating systems AI SA Compliance User Guide Document Release Date: July 2014 Software Release Date: July 2014 Legal Notices

More information

HPE Security ArcSight User Behavior Analytics

HPE Security ArcSight User Behavior Analytics HPE Security ArcSight Analytics Software Version: 5.0 Integration and Content Guide July 21, 2016 Legal Notices Warranty The only warranties for Hewlett Packard Enterprise products and services are set

More information

Project and Portfolio Management Center

Project and Portfolio Management Center Project and Portfolio Management Center Software Version: 9.42 Getting Started Go to HELP CENTER ONLINE http://admhelp.microfocus.com/ppm/ Document Release Date: September 2017 Software Release Date: September

More information

Lookout Mobile Endpoint Security. Deploying Lookout with BlackBerry Unified Endpoint Management

Lookout Mobile Endpoint Security. Deploying Lookout with BlackBerry Unified Endpoint Management Lookout Mobile Endpoint Security Deploying Lookout with BlackBerry Unified Endpoint Management June 2018 2 Copyright and disclaimer Copyright 2018, Lookout, Inc. and/or its affiliates. All rights reserved.

More information

Deploying Lookout with IBM MaaS360

Deploying Lookout with IBM MaaS360 Lookout Mobile Endpoint Security Deploying Lookout with IBM MaaS360 February 2018 2 Copyright and disclaimer Copyright 2018, Lookout, Inc. and/or its affiliates. All rights reserved. Lookout, Inc., Lookout,

More information

HP Real User Monitor. Software Version: Real User Monitor Sizing Guide

HP Real User Monitor. Software Version: Real User Monitor Sizing Guide HP Real User Monitor Software Version: 9.26 Real User Monitor Sizing Guide Document Release Date: September 2015 Software Release Date: September 2015 Real User Monitor Sizing Guide Legal Notices Warranty

More information

OMi Management Pack for Microsoft SQL Server. Software Version: For the Operations Manager i for Linux and Windows operating systems.

OMi Management Pack for Microsoft SQL Server. Software Version: For the Operations Manager i for Linux and Windows operating systems. OMi Management Pack for Microsoft Software Version: 1.01 For the Operations Manager i for Linux and Windows operating systems User Guide Document Release Date: April 2017 Software Release Date: December

More information

BYOD: BRING YOUR OWN DEVICE.

BYOD: BRING YOUR OWN DEVICE. white paper BYOD: BRING YOUR OWN DEVICE. On-BOaRDING and Securing DEVICES IN YOUR Corporate NetWORk PrepaRING YOUR NetWORk to MEEt DEVICE DEMaND The proliferation of smartphones and tablets brings increased

More information

HP Business Availability Center

HP Business Availability Center HP Business Availability Center for the Windows and Solaris operating systems Software Version: 8.00 Embedded UCMDB Applets Using Direct Links Document Release Date: January 2009 Software Release Date:

More information

HP Identity Driven Manager Software Series

HP Identity Driven Manager Software Series HP Identity Driven Manager Software Series Data sheet Product overview HP Identity Driven Manager (IDM), a plug-in to HP PCM+, dynamically provisions network security and performance settings based on

More information

HPE Aruba Airwave Installation and Startup Service

HPE Aruba Airwave Installation and Startup Service Data sheet HPE Aruba Airwave Installation and Startup Service Support Services HPE Installation and Startup Service for select Aruba Airwave products coordinates installation, configuration, and verification

More information

HPE FlexNetwork MSR Router Series

HPE FlexNetwork MSR Router Series HPE FlexNetwork MSR Router Series Comware 7 OAA Configuration Guides Part number: 5998-8789 Software version: CMW710-E0407 Document version: 6W100-20160526 Copyright 2016 Hewlett Packard Enterprise Development

More information

HP Service Manager. Software Version: 9.41 For the supported Windows and UNIX operating systems. Service catalog help topics for printing

HP Service Manager. Software Version: 9.41 For the supported Windows and UNIX operating systems. Service catalog help topics for printing HP Service Manager Software Version: 9.41 For the supported Windows and UNIX operating systems Service catalog help topics for printing Document Release Date: September 2015 Software Release Date: September

More information

ProCurve Manager Plus 2.3

ProCurve Manager Plus 2.3 ProCurve Manager Plus 2.3 is a secure, advanced Windows-based network management platform that allows administrators to configure, update, monitor, and troubleshoot ProCurve devices centrally with easy-to-use

More information

HPE Security ArcSight Connectors

HPE Security ArcSight Connectors HPE Security ArcSight Connectors SmartConnector for Application Security AppDetective DB Configuration Guide October 17, 2017 SmartConnector for Application Security AppDetective DB October 17, 2017 Copyright

More information

IDE Connector Customizer Readme

IDE Connector Customizer Readme IDE Connector Customizer Readme Software version: 1.0 Publication date: November 2010 This file provides information about IDE Connector Customizer 1.0. Prerequisites for IDE Connector Customizer The Installation

More information

Cisco Network Admission Control (NAC) Solution

Cisco Network Admission Control (NAC) Solution Data Sheet Cisco Network Admission Control (NAC) Solution New: Updated to include the Cisco Secure Network Server (SNS) Cisco Network Admission Control (NAC) solutions allow you to authenticate wired,

More information

IDOL Site Admin. Software Version: User Guide

IDOL Site Admin. Software Version: User Guide IDOL Site Admin Software Version: 11.5 User Guide Document Release Date: October 2017 Software Release Date: October 2017 Legal notices Warranty The only warranties for Hewlett Packard Enterprise Development

More information

Oracle Hospitality e7 Point-of-Sale. Security Guide

Oracle Hospitality e7 Point-of-Sale. Security Guide Oracle Hospitality e7 Point-of-Sale Security Guide Release 4.4 EU E95133-01 May 2018 Oracle Hospitality e7 Point-of-Sale Security Guide, Release 4.4 EU E95133-01 Copyright 2004, 2018, Oracle and/or its

More information

Mobile Devices prioritize User Experience

Mobile Devices prioritize User Experience Mobile Security 1 Uniqueness of Mobile Mobile Devices are Shared More Often Mobile Devices are Used in More Locations Mobile Devices prioritize User Experience Mobile Devices have multiple personas Mobile

More information

HP ProCurve Manager Plus 3.0

HP ProCurve Manager Plus 3.0 Product overview HP ProCurve Manager Plus is a Microsoft Windows-based network management platform that enables mapping, configuration, and monitoring. HP ProCurve Manager Plus 3.0 provides security and

More information

QuickStart Guide for Managing Computers. Version

QuickStart Guide for Managing Computers. Version QuickStart Guide for Managing Computers Version 10.6.0 copyright 2002-2018 Jamf. All rights reserved. Jamf has made all efforts to ensure that this guide is accurate. Jamf 100 Washington Ave S Suite 1100

More information

HPE 3PAR OS MU3 Patch 97 Upgrade Instructions

HPE 3PAR OS MU3 Patch 97 Upgrade Instructions HPE 3PAR OS 3.2.2 MU3 Patch 97 Upgrade Instructions Abstract This upgrade instructions document is for installing Patch 97 on the HPE 3PAR Operating System Software. This document is for Hewlett Packard

More information

HP Operations Orchestration

HP Operations Orchestration HP Operations Orchestration Software Version: 7.20 HP Network Node Manager (i series) Integration Document Release Date: July 2008 Software Release Date: July 2008 Legal Notices Warranty The only warranties

More information

HP Project and Portfolio Management Center

HP Project and Portfolio Management Center HP Project and Portfolio Management Center Software Version: 9.30 HP Demand Management User s Guide Document Release Date: September 2014 Software Release Date: September 2014 Legal Notices Warranty The

More information

CompTIA A+ Certification ( ) Study Guide Table of Contents

CompTIA A+ Certification ( ) Study Guide Table of Contents CompTIA A+ Certification (220-902) Study Guide Table of Contents Course Introduction About This Course About CompTIA Certifications Module 1 / Supporting Windows 1 Module 1 / Unit 1 Windows Operating System

More information

HP Service Manager. Software Version: 9.41 For the supported Windows and UNIX operating systems. Collaboration Guide

HP Service Manager. Software Version: 9.41 For the supported Windows and UNIX operating systems. Collaboration Guide HP Service Manager Software Version: 9.41 For the supported Windows and UNIX operating systems Collaboration Guide Document Release Date: September 2015 Software Release Date: September 2015 Legal Notices

More information

HP 3PAR OS MU2 Patch 11

HP 3PAR OS MU2 Patch 11 HP 3PAR OS 321 MU2 Patch 11 Release Notes This release notes document is for Patch 11 and intended for HP 3PAR Operating System Software 321200 (MU2) Patch 11 (P11) HP Part Number: QL226-98118 Published:

More information

HPE 3PAR OS MU2 Patch 53 Release Notes

HPE 3PAR OS MU2 Patch 53 Release Notes HPE 3PAR OS 3.2.2 MU2 Patch 53 Release Notes Abstract This release notes document is for Patch 53 and intended for HPE 3PAR Operating System Software 3.2.2.390 (MU2). Part Number: QL226-99481 Published:

More information

HPE Automatic Number Plate Recognition Software Version: Automatic Number Plate Recognition Release Notes

HPE Automatic Number Plate Recognition Software Version: Automatic Number Plate Recognition Release Notes HPE Automatic Number Plate Recognition Software Version: 14.5.0 Automatic Number Plate Recognition Release Notes Document Release Date: July 2016 Software Release Date: July 2016 Legal Notices Warranty

More information

DesktopPlayer for Windows

DesktopPlayer for Windows DesktopPlayer for Windows Getting Started Version 2.3.0 February 2017 Table of Contents About this Release... 3 About the Citrix DesktopPlayer for Windows Solution... 3 Remote versus Local Desktops...

More information

HP Service Manager. Software Version: 9.41 For the supported Windows and UNIX operating systems. SM Reports help topics for printing

HP Service Manager. Software Version: 9.41 For the supported Windows and UNIX operating systems. SM Reports help topics for printing HP Service Manager Software Version: 9.41 For the supported Windows and UNIX operating systems SM Reports help topics for printing Document Release Date: September 2015 Software Release Date: September

More information

HP Operations Manager

HP Operations Manager HP Operations Manager Software Version: 9.22 UNIX and Linux operating systems Java GUI Operator s Guide Document Release Date: December 2016 Software Release Date: December 2016 Legal Notices Warranty

More information

THE HP Storageworks X510 Data Vault

THE HP Storageworks X510 Data Vault THE HP Storageworks X510 Data Vault REVIEWER S GUIDE STORe it. SECURE it. SHARE it. October 2009 introducing the NEW THE HP Storageworks X510 Data Vault If, like many small business firms, you are sharing

More information

HPE Storage Optimizer Software Version: 5.4. Best Practices Guide

HPE Storage Optimizer Software Version: 5.4. Best Practices Guide HPE Storage Optimizer Software Version: 5.4 Best Practices Guide Document Release Date: November 2016 Software Release Date: November 2016 Legal Notices Warranty The only warranties for Hewlett Packard

More information

HPE Security ArcSight Connectors

HPE Security ArcSight Connectors HPE Security ArcSight Connectors SmartConnector Parser Update Release Notes 7.6.2.8023.0 July 14, 2017 HPE Security ArcSight SmartConnector Parser Update Release Notes 7.6.2.8023.0 July 14, 2017 Copyright

More information

HP Intelligent Management Center v7.1

HP Intelligent Management Center v7.1 HP Intelligent Management Center v7.1 iar Quick Start Guide Part number: 5998-6863 Published: September 2014 Software Version: IMC PLAT 7.1 (E0302) Edition: 1.0 Legal and notice information Copyright 2014

More information

HP ALM Client MSI Generator

HP ALM Client MSI Generator HP ALM Client MSI Generator Software Version: 1.00 User Guide Document Release Date: October 2010 Software Release Date: October 2010 Legal Notices Warranty The only warranties for HP products and services

More information

Symantec Network Access Control Starter Edition

Symantec Network Access Control Starter Edition Symantec Network Access Control Starter Edition Simplified endpoint compliance Overview makes it easy to begin implementing a network access control solution. It offers a subset of Symantec Network Access

More information

Ensuring Desktop Central Compliance to Payment Card Industry (PCI) Data Security Standard

Ensuring Desktop Central Compliance to Payment Card Industry (PCI) Data Security Standard Ensuring Desktop Central Compliance to Payment Card Industry (PCI) Data Security Standard Introduction Manage Engine Desktop Central is part of ManageEngine family that represents entire IT infrastructure

More information

QuickSpecs HP ProCurve Manager Plus 3.1

QuickSpecs HP ProCurve Manager Plus 3.1 Overview HP ProCurve Manager Plus is a Microsoft Windows-based network management platform that enables mapping, configuration, and monitoring. HP ProCurve Manager Plus provides security and extensibility

More information

ALM. Tutorial. Software Version: Go to HELP CENTER ONLINE

ALM. Tutorial. Software Version: Go to HELP CENTER ONLINE ALM Software Version: 12.55 Tutorial Go to HELP CENTER ONLINE http://admhelp.microfocus.com/alm/ Document Release Date: August 2017 Software Release Date: August 2017 ALM Legal Notices Disclaimer Certain

More information

HPE Enterprise Integration Module for SAP Solution Manager 7.1

HPE Enterprise Integration Module for SAP Solution Manager 7.1 HPE Enterprise Integration Module for SAP Solution Manager 7.1 Software Version: 12.55 User Guide Document Release Date: August 2017 Software Release Date: August 2017 HPE Enterprise Integration Module

More information

Oracle Hospitality OPERA Cloud Services Security Guide Release 1.20 E June 2016

Oracle Hospitality OPERA Cloud Services Security Guide Release 1.20 E June 2016 Oracle Hospitality OPERA Cloud Services Security Guide Release 1.20 E69079-01 June 2016 Copyright 2016, Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided

More information

HPE Operations Agent. Concepts Guide. Software Version: For the Windows, HP-UX, Linux, Solaris, and AIX operating systems

HPE Operations Agent. Concepts Guide. Software Version: For the Windows, HP-UX, Linux, Solaris, and AIX operating systems HPE Operations Agent Software Version: 12.02 For the Windows, HP-UX, Linux, Solaris, and AIX operating systems Concepts Guide Document Release Date: December 2016 Software Release Date: December 2016 Legal

More information

Oracle. Field Service Cloud Using Android and ios Mobile Applications 18B

Oracle. Field Service Cloud Using Android and ios Mobile Applications 18B Oracle Field Service Cloud Using Android and ios Mobile Applications 18B Part Number: E94755-02 Copyright 2018, Oracle and/or its affiliates. All rights reserved Authors: The Field Service Cloud Information

More information

HPE Security Fortify WebInspect Enterprise Software Version: Windows operating systems. Installation and Implementation Guide

HPE Security Fortify WebInspect Enterprise Software Version: Windows operating systems. Installation and Implementation Guide HPE Security Fortify WebInspect Enterprise Software Version: 17.10 Windows operating systems Installation and Implementation Guide Document Release Date: May 2017 Software Release Date: April 2017 Legal

More information

HPE Knowledge Article

HPE Knowledge Article HPE Knowledge Article HPE Integrated Lights Out (ilo 5) for Gen10 Servers - What is System Recovery Set? Article Number mmr_sf-en_us000021097 Environment HPE Integrated Lights Out (ilo 5) HPE ProLiant

More information

HPE FlexFabric 12900E & 12900

HPE FlexFabric 12900E & 12900 HPE FlexFabric 12900E & 12900 IRF Configuration Guide Part number: 5998-8351s Software version: Release 1135 and later Document version: 6W102-20151124 Copyright 2015 Hewlett Packard Enterprise Development

More information

Configure Client Posture Policies

Configure Client Posture Policies Posture is a service in Cisco Identity Services Engine (Cisco ISE) that allows you to check the state, also known as posture, of all the endpoints that are connecting to a network for compliance with corporate

More information