AEG SCN91800C1 User Manual
Hide thumbs Also See for SCN91800C1:

Advertisement

Quick Links

Hitachi IT Operations Director
Software Version 3.0.0-14 Release Notes
Contents
About This Document .................................................................................. 2
Intended Audience ...................................................................................... 2
Getting Help ............................................................................................... 2
About This Release ...................................................................................... 3
Features and Enhancements ......................................................................... 3
System Specification Changes....................................................................... 6
System and Hardware Requirements ............................................................. 8
Fixed Problems ........................................................................................... 9
Known Problems ....................................................................................... 76
Installation Notes ...................................................................................... 76
Precautions .............................................................................................. 77
Documentation ....................................................................................... 103
Copyright and License Information ............................................................ 104
© 2014 Hitachi, Ltd. All rights reserved. © 1998-2004 Trend Micro Incorporated. All rights reserved.
RN-91IOS020-15
1

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the SCN91800C1 and is the answer not in the manual?

Questions and answers

Summary of Contents for AEG SCN91800C1

  • Page 1: Table Of Contents

    Hitachi IT Operations Director Software Version 3.0.0-14 Release Notes Contents About This Document .................. 2 Intended Audience ..................2 Getting Help ....................2 About This Release ..................3 Features and Enhancements ................. 3 System Specification Changes............... 6 System and Hardware Requirements ............. 8 Fixed Problems ...................
  • Page 2: About This Document

    About This Document This document describes the revisions made to Hitachi IT Operations Director, software version 3.0.0-14. The document includes information that was not available at the time the technical documentation for this product was published, and a list of known problems and solutions. Intended Audience This document is intended for Hitachi Data Systems customers and authorized service partners who license and use Hitachi IT Operations Director.
  • Page 3: About This Release

    About This Release These release notes apply to version 3.0.0-14 of Hitachi IT Operations Director. Features and Enhancements These functionalities are described in the IT Operations Director Help System. In 3.0.0-08 Operating Systems for Network Access Control IT Operations Director 3.0.0-08 supports the English version (only) of the following operating systems for Network Access Control: ...
  • Page 4 In 3.0.0-04 License Activation The description of problem cause and associated workaround that is displayed in the license activation message has been improved. Task Status The message displayed in Task Status in the Distribution module has been improved to include the return code of the program execution in the Task Status Details dialog box in the Task List.
  • Page 5 In 3.0.0-03 Operations Logs Collection IT Operations Director 3.0.0-03 supports Internet Explorer 9, Firefox 4 or 5, and Windows Live Mail 2011 to be able to collect the Operations Logs relating to Web access, sending/receiving e-mail with attachments, and using FTP. In 3.0.0-00 Network Access Control IT Operations Director provides you with the option to control which...
  • Page 6: System Specification Changes

    System Specification Changes In 3.0.0-13 Firefox has been excluded from the supported Web browsers for operation logs Firefox cannot be used to collect the following operation logs:  Upload File  Download File  Send File  Receive File  Web Access You can collect the above mentioned operation logs from the following Internet Explorer versions, only: Internet Explorer 6, 7, 8, and 9.
  • Page 7 The security policy conditions: 1. In Security policy > Operations Logs > Target Operations to be Logged, the [Select target operations] is selected. In the subcategory of [File Operation/Print Operation] and [Folder Operation], an item other than [Copy file], [Move file], [Rename file], [Create file], [Delete file], [Copy folder], [Move folder], [Rename folder], [Create folder], and [Delete folder] is not selected.
  • Page 8: System And Hardware Requirements

    Note: Previously, the report was created when any of the following conditions were met: 1. In Operations Logs > Target Operations to be Logged, one or more sub-items are enabled in either the “File Operation/Print Operation” or “Folder Operation” categories. 2.
  • Page 9: Fixed Problems

    Fixed Problems From 3.0.0-13 to 3.0.0-14 Summary Description Denial of Service The following problem has been corrected: (DoS) might occur. Denial of Service (DoS) might occur. (CVE-ID: CVE-2014-0050) This problem occurred when IT Operations Director processed data in multipart format that contains an incorrect Content-Type. From 3.0.0-10 to 3.0.0-13 Summary Description...
  • Page 10 Summary Description Windows Explorer The following problem has been corrected: might stop Windows Explorer might stop responding on an agent-installed machine responding on an when a copy or move operation is performed on a file that has a specific agent-installed file name.
  • Page 11 Summary Description Windows Explorer The following problem has been corrected: might stop Windows Explorer might stop responding on an agent-installed machine. responding on an agent-installed This problem occurred when all of the following conditions were met: machine. The operating system is Windows 2000. A file is opened in an application such as Microsoft Excel, or a file operation is performed in Windows Explorer.
  • Page 12 Summary Description Internet Explorer The following problem has been corrected: might stop Internet Explorer might stop responding on an agent-installed machine. responding on an agent-installed This problem occurred when all of the following conditions were met: machine. Internet Explorer is started and a Web site is accessed. Any of the following security policies are assigned to the agent- installed machine: (a) Operation Logs are enabled.
  • Page 13 Summary Description Either agent The following problem has been corrected: registration or When agent registration performed in the management server and package creation package creation performed in the management window are done fails. simultaneously, either operation fails. This problem occurred when the following operations were done simultaneously: From Windows Start menu >...
  • Page 14 Summary Description The IT Operations The following problem has been corrected: Director Agent The IT Operations Director Agent Control service might terminate Control service might abnormally. terminate abnormally. This problem occurred if you defined more than a certain amount of data for an asset custom field.
  • Page 15: Hitachi, Ltd. All Rights Reserved. © 1998-2004 Trend Micro Incorporated. All Rights Reserved Rn-91Ios020

    Summary Description Windows Explorer The following problem has been corrected: might terminate Windows Explorer might terminate abnormally when the folder operation abnormally on an is performed on an agent-installed machine. agent-installed machine during the This problem occurred when all of the following conditions were met: folder operation.
  • Page 16 Summary Description The export might fail The following problem has been corrected: when you use an old When you export the Device List (Details) by using a template that you version of a template. saved before you upgraded the management server, the export might fail. This problem occurred when all of the following conditions were met: ...
  • Page 17 Summary Description Software is not The following problem has been corrected: blocked. Software is not blocked when a user starts it if the software has no version information. This problem occurred when all of the following conditions were met: In Security Policy > Other Access Restrictions > Blocked Software, software is registered.
  • Page 18 Summary Description When a device is The following problem has been corrected: discovered, another After you add a hardware asset by any of the following operations, and if asset that is identical you perform a discovery using SNMP to discover a device which is identical to the device, is to the asset, then another hardware asset identical to the device is registered.
  • Page 19 Summary Description Operation logs for The following problem has been corrected: printing might not be Operation logs for printing might not be obtained and printing might not obtained and printing be restricted. might not be restricted. This problem occurred when all of the following conditions were met: An agent-installed machine has a computer name that exceeds 15 characters.
  • Page 20 From 3.0.0-09 to 3.0.0-10 Summary Description Explorer might stop The following problem has been corrected: responding on an Explorer might stop responding on an agent computer. agent computer. This problem occurred when any of the following security policies were applied to an agent computer: Operations Logs are enabled.
  • Page 21 Summary Description Inventory information The following problem has been corrected: might not be obtained The following pieces of inventory information might not be obtained from from a device that has a device that has already been discovered by Discovery from IP Address already been Range using Windows authentication: discovered by...
  • Page 22 Summary Description After clicking on the # The following problem has been corrected: of Not Compliant In Security > Security Policy List > the Antivirus Software tab, Computers link, the when you click on the # of Not Compliant Computers link, the corresponding number Computer Security Status >...
  • Page 23 Summary Description Agent Control service The following problem has been corrected: stops. The IT Operations Director Agent Control service stops when a device with a host name of 62 characters is discovered. This problem occurred when a device with a host name of 62 characters was discovered by either of the following operations: Discovery from IP Address Range.
  • Page 24 Summary Description Explorer might The following problem has been corrected: terminate abnormally Explorer might terminate abnormally on an agent computer. on an agent computer. This problem occurred when either of the following items was changed in a security policy:  Operations Logs ...
  • Page 25 Summary Description Discovery from the The following problem has been corrected: Active Directory cannot When you attempt to perform a Discovery from the Active Directory, the be executed. progress bar remains at 0 percent and the discovery cannot be executed. This problem occurred when either of the following cases existed in the Settings >...
  • Page 26 Summary Description An item that cannot be The following problem has been corrected: deleted from the An item that cannot be deleted from the Network Filter List is created. Network Filter List is created. This problem occurred when all of the following conditions were met. One of the following conditions applies: ...
  • Page 27 From 3.0.0-07 to 3.0.0-08 Summary Description The agent policy The following problem has been corrected: update feature and the The agent policy update feature and the distribution feature won’t work. distribution feature won’t work. This problem occurred when the following condition was met: The root directory of any drive was specified for the management server's Data Folder.
  • Page 28 Summary Description Device information and The following problem has been corrected: asset information of a The device information and the asset information of a node might be node might be overwritten incorrectly, or a node might be registered as a different overwritten incorrectly, device and asset.
  • Page 29 Summary Description A vulnerability issue The following problem has been corrected: exists, which may A vulnerability issue exists, which may cause a Web browser on a cause a Web browser management console to terminate abnormally. on a management console to terminate abnormally.
  • Page 30 Summary Description An internal error occurs The following problem has been corrected: when displaying An internal error occurs when displaying the system details of a device in system details of a which a subnet mask is not set, or when the export of device details fails device, or exporting for a device for which a subnet mask is not set.
  • Page 31 Summary Description Communication to a The following problem has been corrected: device that is set to Communication to a device that specified as the Exclusive permit communication Communication Destination for Access-Denied Devices is blocked. is still being blocked. This problem occurred when all of the following conditions were met: Network Access Control is enabled.
  • Page 32 Summary Description A device on which The following problem has been corrected: network access is not A device on which network access is not allowed might still be able to allowed might still be access the network. able to access the network.
  • Page 33 From 3.0.0-06 to 3.0.0-07 Summary Description The Agent Monitor The following problem has been corrected: Control service might The Agent Monitor Control service might stop unexpectedly on an agent- stop unexpectedly. installed computer. This problem occurred when all of the following conditions were met: Any of the following are enabled in a security policy: Operations Logs, Restrict Reading/Writing for USB device, Printing Restriction, or Blocked Software.
  • Page 34 Summary Description If the connection with The following problem has been corrected: the database is If the connection with the database is temporarily disconnected, the temporarily scheduled execution of the following features won’t work: disconnected, the scheduled execution of Discovery. some features won’t Assessing security status.
  • Page 35 Summary Description Cannot disable the The following problem has been corrected: Network Access If Network Access Control is enabled on an agent computer and if the Control. specified management server's host name or IP address is changed for that same agent computer, you will no longer be able to disable Network Access Control on that agent computer.
  • Page 36 Summary Description The output data in The following problem has been corrected: Export Device Details is The output data in Export Device Details is different from the data that is different from the data displayed on the management console. that is displayed on the management console.
  • Page 37 Summary Description Before reaching the The following problem has been corrected: maximum disk storage Before reaching the maximum disk storage capacity (described in the capacity, old Setup > Operations Log Settings panel > Required capacity), old Operations Logs might Operations Logs might be deleted. be deleted.
  • Page 38 Summary Description An application error The following problem has been corrected: might occur during a An application error might occur during a Remote Control connection. Remote Control connection. This problem occurred when all of the following conditions were met: The Controller is connected with the Remote Control Agent, which is using the Windows Vista/2008/7/2008 R2 environment.
  • Page 39 Summary Description Data is displayed The following problem has been corrected: incorrectly in the Data is displayed incorrectly in the Managed Nodes Trend panel. Managed Nodes Trend panel. This problem occurred when all of the following conditions were met: The management server’s time zone and the management client’s time zone are different.
  • Page 40 Summary Description The date and time The following problem has been corrected: displays incorrectly in The date and time displays incorrectly in the Description text box in the the Description text Event Detail dialog. box in the Event Detail dialog box. This problem occurred when all of the following conditions were met: A difference exists between the management server’s time zone and the management client’s time zone.
  • Page 41 Summary Description The description of Cause and Workaround was fixed in the message The Cause and (KDEX5010-W), which is triggered when a Discovery from IP Address Workaround in the Range execution fails. message (KDEX5010- This problem occurred when all of the following conditions were met: Either of the following operation is performed to IP devices: Discovery from IP Address Range.
  • Page 42 Summary Description The system might The following problem has been corrected: become unstable upon The system might become unstable on a computer upon which Network a computer on which Access Control is enabled. Network Access Control is enabled. This problem occurred when any of the following conditions were met: ...
  • Page 43 Summary Description The agent process The following problem has been corrected: might crash on an The agent process might crash on an agent-installed computer. agent-installed computer. This problem occurred when all of the following conditions were met: Operations Logs are enabled in a security policy. Any one of the following acquisition conditions is specified: ...
  • Page 44 From 3.0.0-04 to 3.0.0-06 Summary Description Agent information The following problem has been corrected: might not be updated. Information about an agent might not be updated. This problem occurred when the management server receives connection requests from many agents at the same time. Cross-site scripting The following problem has been corrected: security issues.
  • Page 45 Summary Description Changed Network The following problem has been corrected: Access Control Settings Even if Network Access Control Settings are changed, the change might might not be reflected. not be reflected in Network Access Control. This problem occurred when Network Access Control Settings are changed.
  • Page 46 From 3.0.0-03 to 3.0.0-04 Summary Description Windows Explorer The following problem has been corrected: might crash on an Windows Explorer might crash on an agent-installed computer. agent-installed computer. This problem occurred when Operations Logs are enabled in a security policy. The information The following problem has been corrected: acquired from the...
  • Page 47 Summary Description A blocked file name is The following problem has been corrected: incorrectly displayed. A blocked file name is incorrectly displayed in the Edit Unauthorized Software dialog box. The operation itself is successful; it is only the display that is incorrect. This problem occurred when all of the following conditions were met: In a Security Policy >...
  • Page 48 Summary Description Remote Control The following problem has been corrected: connection might fail. The Remote Control connection to an agent-installed computer might fail. This problem occurred depending on the memory that allocated during agent installation on the computer. File distribution and The following problem has been corrected: software installation When a distribution task is executed to a PC on which an agent was...
  • Page 49 Summary Description Network The following problem has been corrected: communication (of the Network communication (of the operating system or applications) fails on operating system or an agent-installed computer if that agent-installed computer has not been applications) fails. restarted since Operations Logs have been disabled in a security policy. This problem occurred when all of the following conditions were met: If the Director software is version 2.5.0: Operations Logs are enabled in a security policy that is assigned to...
  • Page 50 Summary Description The features of The following problem has been corrected: another software The features of another software product that uses shell extension won’t product that uses shell work properly on an agent-installed computer. extension don't work properly. This problem occurred when all of the following conditions were met: A software product that uses shell extension is installed on an agent- installed computer.
  • Page 51 Summary Description Memory usage of the The following problem has been corrected: Print Spooler service Memory usage of the Print Spooler service on an agent-installed on an agent-installed computer keeps increasing. computer keeps increasing. This problem occurred when all of the following conditions were met: Printing Restriction is enabled in the Other Access Restriction security policy.
  • Page 52 Summary Description An agentless The following problem has been corrected: management device For a device whose management type is Agentless Management only displays the IP (Authentication Successful), only the IP address is displayed as the address as the device device details. details.
  • Page 53 From 3.0.0-01 to 3.0.0-03 Summary Description The IT Operations The following problem has been corrected: Director Agent Control The IT Operations Director Agent Control service might not start. service might not start. This problem occurred when starting the IT Operations Director Agent Control service.
  • Page 54 Summary Description Reading files from The following problem has been corrected: Internet Explorer add- Reading files from Internet Explorer add-ons might fail on an agent- ons might fail. installed computer. This problem occurred when all of the following conditions were met: A security policy in which Operations Logs are enabled is assigned to an agent-installed computer.
  • Page 55 Summary Description Discovery from IP The following problem has been corrected: Address, Agent Discovery from IP Address, Agent Deployment, Update Device Deployment, Update Details, or a periodic update of device information might fail after you Device Details, or a install Network Access Control on the management server. periodic update of device information This problem occurred when all of the following conditions were met:...
  • Page 56 Summary Description Task result might be The following problem has been corrected: listed as "Failed." An agent might be listed a Package Distribution Task or an Uninstallation Task as "Failed" even if it was successful. This problem occurred when all of the following conditions were met: Security items are being monitored.
  • Page 57 Summary Description An agent cannot The following problem has been corrected: communicate with the An agent cannot communicate with the management server if the agent- management server installed computer has not been restarted since a security policy has after the security policy been changed.
  • Page 58 Summary Description agent fails The following problem has been corrected: deploy. The “Internal Error” message is displayed when you deploy an agent to a target computer in which Administrative Share is disabled and from a management console in which the Web browser language is English. Also, no information is displayed in the Agent Deployment list.
  • Page 59 Summary Description A device might The following problem has been corrected: incorrectly belong to Although the device's operating system name is correctly displayed, the the "Device Type: device might incorrectly belong to the group of "Device Type: Unknown." Unknown" group. This problem occurred when all of the following conditions were met: From the management console, for a device whose operating system information is not registered, the operating system...
  • Page 60 Summary Description From Firefox, updating The following problem has been corrected: version information of When you upgrade the IT Operations Director Agent, the Firefox version the add-on for IT information in the add-on for IT Operations Director Agent fails to reflect Operations Director the update and the Operations logs in Firefox cannot be collected.
  • Page 61 Summary Description An item named The following problem has been corrected: "Unknown" is Department and Location are fields in hardware assets. Although the registered incorrectly. item is named Unknown and therefore not allowed to be registered in the lower hierarchy of Department and Location, you can still register the item named Unknown in the highest hierarchy.
  • Page 62 Summary Description A computer on which The following problem has been corrected: Network Access Control A computer which has been blocked by Director’s Network Access Control is enabled might be temporarily unable communicate with Exclusive temporarily unable to Communication Destination. An Exclusive Communication Destination is communicate.
  • Page 63 Summary Description It might take a long The following problem has been corrected: time for a certain It might take a long time for a certain operation to be completed. operation to be completed. This problem occurred when any of the following operations is executed: ...
  • Page 64 Summary Description The Event [The agent's The following problem has been corrected: operation has been When you install an agent, the following event might be displayed on the stopped.] might be Event List in the management console. displayed on Event List.
  • Page 65 Summary Description The device status of a The following problem has been corrected: device with Network For a device whose Management Type is Agent Management (Network Access Control might Access Control), the Device Status might not be updated from "Stop." not be updated from "Stop".
  • Page 66 Summary Description An "Internal Error" The following problem has been corrected: message might be An "Internal Error" message might be triggered when you change a triggered when you device to Ignored Node, if another administrator has just enabled change a device to Network Access Control for the same device.
  • Page 67 Summary Description Character strings are The following problem has been corrected: incorrectly added to Notes added to the Add Notes text box in the following dialog boxes are the Notes. incorrectly added to the Notes: The Hardware Assets The Change Asset Status dialog box The Update Tracked Date (Directly) dialog box The Update Tracked Date (from CSV) dialog box The Change Asset Status (Planned) dialog box...
  • Page 68 Summary Description The Deterrence Log of The following problem has been corrected: Operations Logs is When Printing Restriction, Blocked Software, and USB Device collected incorrectly. Restriction are performed on an agent-installed computer, the Deterrence Log of the Operations Logs is collected incorrectly even though Operations Logs are disabled.
  • Page 69 From 3.0.0 to 3.0.0-01 Summary Description Upgrading the The following problem has been corrected: database might fail. Upgrading the database might fail when you upgrade IT Operations Director from version 2.5.0 to 3.0.0. This problem occurred when all of the following conditions were met: ...
  • Page 70 Summary Description The IT Operations Even if you change your license from a trial version to a product version, Director Agent features the license information of the product version might fail to notify the might stop when the agents. Therefore the IT Operations Director Agent features stop when trial license period your trial license period expires.
  • Page 71 Summary Description Exporting the File List The following problem has been corrected: from a USB device You might not be able to export the File List of a USB device. might fail. This problem occurs when you attempt to export a USB device's File List that contains a large amount of data.
  • Page 72 From 2.5.0-07 to 3.0.0 Summary Description Downloading files might The following problem has been corrected: fail with Internet Explorer 9. When you download a file in Internet Explorer 9 on an agent-installed computer, the file might not be correctly saved in the designated save destination folder and file size might become 0 bytes.
  • Page 73 Summary Description A memory leak might The following problem has been corrected: occur after editing a A memory leak might occur after you edit a security policy or change security policy. the target computers to which you assign a policy. This problem occurred when all of the following conditions were met: ...
  • Page 74 Summary Description Affected programs might The following problem has been corrected: not work correctly. A process might not work correctly on an agent-installed computer when a wrong return code is returned by the process. This problem occurred when all of the following conditions were met: ...
  • Page 75 Summary Description Connection target server The following problem has been corrected: changes might not be In Agent Configuration in the Settings module, when you change the reflected in an agent. Server Name (where IT Operations Director is installed) to a wrong one and save the settings, then modify the Server Name to the correct one immediately, then save your changes, the updated server name might not be reflected to the agent side.
  • Page 76: Known Problems

    Known Problems Summary Description When the Restrict Reading/Writing for USB device is enabled in a File limit for security policy, the file information that can be collected from a registered information collection. USB device is limited to a maximum of 10,000 files per each device. When discovery is executed, saving the discovery results will consume Operations may memory on the management client's computer.
  • Page 77: Precautions

    Precautions Usage Restriction on the German Operating System When running the English version of IT Operations Director's Manager or Agent on the German operating system, the following restrictions exist: German anti-virus software and German operating system patches (Windows updates) are not supported. ii) The following Number representations that are unique to the German locale are not supported: - A comma used as a decimal symbol.
  • Page 78 Antivirus Software Ensure that the antivirus software that is used by your organization is listed in the table below: Supported Antivirus Software Symantec Corporation  Symantec Antivirus Corporate Edition 10.0 (32-bit/64-bit), 10.1 (32-bit/64-bit), 10.2 (32-bit/64-bit)  Symantec Client Security 3.0 (32-bit/64-bit), 3.1 (32-bit/64-bit) ...
  • Page 79 Port Numbers Check the port numbers of the computers for installing IT Operations Director. If another application uses the port numbers that IT Operations Director will use, then both applications will fail to work properly. The available port numbers for IT Operations Director are from 31000 to 31012, and 31080.
  • Page 80 Using Power ON by using To use AMT, build the environment by using the following steps: Intel AMT Check the PC in which the IT Operations Director Agent is installed. Then make sure that DHCP is enabled for IP address assignment for both operating system and AMT.
  • Page 81 In the Internet Options dialog box, in the General tab, click Delete Files under Temporary Internet Files. The Delete Files dialog box displays. In the Delete Files dialog box, select Delete all offline content and click OK. In the Internet Options dialog box, click OK. ...
  • Page 82 click Settings under Browsing history. The Temporary Internet Files and History Settings dialog box displays. In the Temporary Internet Files and History Settings dialog box, click View Files in the Temporary Internet Files. In a folder displayed in Explorer, check whether the following files exist.
  • Page 83 Changing the host name of When you change the management server's host name in the the management server. following environment, complete the steps below. If you perform a Database Upgrade without completing the steps below, the Database Upgrade will fail. Environment conditions: ...
  • Page 84 2. Do not log in twice into IT Operations Director at the same time from the same client PC (desktop). Otherwise, this attempt to log in twice might disable one of the sessions with IT Operations Director. 3. IT Operations Director does not support Back and Refresh button of a browser.
  • Page 85 This problem occurs when all of the following conditions are met: 1. Operations Logs or Printing Restrictions in Other Access Restrictions are enabled in a security policy. 2. The operations were logged on a computer on which an IT Operations Director Agent is installed. 3.
  • Page 86 13. When you uninstall and then re-install Hitachi IT Operations Director before your trial license’s expiration date, the IT Operations Director Service and the IT Operations Director Agent Control service won’t start. To start the services, execute the startservice command after installation.
  • Page 87 21. When you duplicate (using VMWare or hard disk copy) an agent- installed virtual environment or an agent-installed master computer's environment, be sure to execute the following command with administrator permission on the master computer before duplicating: <Hitachi IT Operations Director Agent Installation Folder>\bin\resetnid.vbs /nodeid 22.
  • Page 88 Workaround Use either of the following methods as a workaround: Workaround 1: This method prevents this symptom from occurring. Perform the following steps before and after upgrading Hitachi IT Operations Director to 3.0.0: i. Before upgrading Hitachi IT Operations Director to 3.0.0, cancel the selection of the Excluded or Mandatory for all of the security policies.
  • Page 89 23. When you operate the following steps in Internet Explorer 9, an internal error may occur or you cannot continue working within the management console: 1. Click Browse in the following wizard screen and open the file selection dialog box: ...
  • Page 90 25. There might be a discrepancy between the number of suspicious operations (each day) displayed in the Security > Suspicious Operations panel and the number of suspicious operations displayed in the Operations Log List (which is accessed from the anchor). In this case, cross-check the suspicious operations of that day by viewing the Events module, and check the Operations Logs of each corresponding computer (the operation source) in the Operations...
  • Page 91 29. Special network devices that are Linux-based, such as BIG-IP, might be discovered as servers (Linux). After checking the Device Details of the discovered device, you can change the device type if needed. 30. When Restrict Reading/Writing for USB Device is enabled in a security policy, the device might be detected more than once by the operating system if USB device restriction occurred after the device has already been detected, causing the restriction message to appear...
  • Page 92 Method In the following configuration file for customizing, add a row with the key name “Agent_LessPrHostnameSwitch”. Specify “IpResolve” for the value. Save the file. File name: jdn_manager_config.conf Storage location: <Hitachi IT Operations Director installation folder>\mgr\conf (By the default, it is C:\Program Files\Hitachi\Director\mgr\conf) ----- # property # Example:...
  • Page 93 address as the existing printer. At that time, its host name is changed to MACxxxxxxxxxxxx or IPnnnnnnnnnnnn. Option Two: If name resolution of IP address is resolved. After Discovery from IP Address Range is done, check the following: 1. In the Discovered Nodes tab, each printer (name is <name resolution result>) has been added to the list.
  • Page 94 Therefore, in an environment where Daylight Savings Time is used, check whether the date is reflected as you intended it to be on the management console, after you register the date information. * Applies to all items that display dates on the management console. Main items are: [Security]: [Update List] >[Release Date].
  • Page 95 39. When you specify SNMP for credentials and perform Discovery from IP Address Range, the following inventory information may be unable to be obtained from a device even if SNMP authentication succeeded in the device:  System Details - Network Details (Information about only a single network address can be obtained) ...
  • Page 96 44. The print monitoring is executed on an agent computer if any of the following are enabled in a security policy: • In Operations Logs > Target Operations to be Logged > File Operation/Print Operation, Print is enabled. • In Operations Logs > Suspicious Operations to be Notified, Large Number of Printing Jobs is enabled.
  • Page 97  [Upload File]  [Download File]  [Send File]  [Receive File]  [Send Mail (Attachment File)]  [Receive Mail (Attachment File)] 3. In the Suspicious Operations to be Notified, any of the following are selected:  [Send/Receive E-mail with Attachments] ...
  • Page 98  Use Web/FTP Server  Copy/Move the File to External Device 2. Internet Explorer version is 9. 3. Internet Explorer Protected Mode is enabled. 4. A user with a standard user right starts Internet Explorer. 5. User Account Control (UAC) is enabled. 6.
  • Page 99 2. Open the Add-on List settings in the following location: Local Group Policy Editor > Computer Configuration > Administrative Templates > Windows Components > Internet Explorer > Security Features > Add-on Management > Add- on List. 3. In the Add-on List dialog, select Enable. In the activated Options, click Display in the Add-on List.
  • Page 100 54. In Inventory > Device Inventory > Device List > Installed Software Details tab, when you clear the Show Windows Updates check box, all of the contents of the list may sometimes not be displayed. In this case, refresh the displayed information by clicking the update icon on the tab.
  • Page 101 later on the computer and then execute the command. In addition, after you execute the above command, re-install a third-party "Winsock layered service providers" (which had been installed on the computer before the Operation Logs function was enabled). 56. The horizontal scroll bar may appear in the legend for the chart in the management window, and the contents of the legend may be blocked.
  • Page 102  Calculate Inventory Detail Report  Calculate Asset Detail Report  Restore archived logs Therefore, operation performed in the management window may be delayed immediately after data is restored, or operation may not start at the time specified in the schedule and it may be delayed. 62.
  • Page 103: Documentation

    so that the number of credentials to be used for the authentication is less than the value specified for the account lockout threshold. 65. In the management window, the number of characters in the text area where multiple lines are allowed includes a newline by treating it as two characters, in addition to the actual number of characters that a user enters.
  • Page 104: Copyright And License Information

    Copyright and License Information Notice: No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording, or stored in a database or retrieval system for any purpose without the express written permission of Hitachi, Ltd.
  • Page 105 Java is a registered trademark of Oracle and/or its affiliates. Kaspersky is a registered trademark of Kaspersky Lab in the United States. Linux is the registered trademark of Linus Torvalds in the U.S. and other countries. Mac and Mac OS are trademarks of Apple Computer, Inc., registered in the U.S. and other countries.
  • Page 106 Windows is either a registered trademark or a trademark of Microsoft Corporation in the United States and/or other countries. Windows NT is either a registered trademark or a trademark of Microsoft Corporation in the United States and/or other countries. Windows Server is either a registered trademark or a trademark of Microsoft Corporation in the United States and/or other countries.

Table of Contents