Top
Systemwalker Desktop Keeper V14g Reference Manual
Systemwalker

2.2 CT Information

This section describes the CSV file of the CT list output in the Management Console. Please refer to the contents of “Output CT Information” in “Systemwalker Desktop Keeper User’s Guide for Administrator” for details on how to output the CT list as a CSV file.

The item name and description output in the CSV file are described as follows:

No.

Item Name (Note 1)

Description

1

[Server Name]

This is the name of the Management Server or Master Management Server that CT logs.

2

[Group Name]

This is the name of the CT group on which the CT logs.

3

[Name]

This is CT name and its initial value is a computer name.

4

[Notes]

This is the information input when reflecting CT policy.

5

[Identification ID]

The Master Management Server or Management Server gives itself an ID to identify CT.

6

[Computer Name]

Computer name of CT

7

[MAC Address]

MAC address of CT

8

[IP Address]

IP address of CT

9

[Subnet Mask]

Subnet mask set in network properties of CT

10

[Organization Name]

Organization name set in OS of CT

11

[Owner]

Owner name set in OS of CT

12

[OS Type]

OS installed in CT

13

[OS Version]

Display according to the format of " OS Platform, OS Large Version, OS Small Version".

OS platform, namely code to identify OS of client (CT), is identified as follows:

  • 1:Windows® ME or Windows® 98

  • 2:Windows Server® 2003,Windows® 2000,Windows® XP or Windows NT®,Windows Vista®,Windows Server® 2008 or Windows® 7

OS large version, namely code to identify OS of client (CT), is identified as follows:

  • 4:Windows® ME,Windows® 98 or Windows NT®

  • 5:Windows Server® 2003,Windows® 2000,Windows® XP

  • 6: Windows Vista®,Windows Server® 2008 or Windows® 7

OS small version, namely code to identify OS of client (CT), is identified as follows:

  • 0:Windows® 2000 or Windows NT®,Windows Vista®,Windows Server® 2008 or Windows® 7

  • 1:Windows® XP

  • 2:Windows Server® 2003

  • 10:Windows® 98

  • 90:Windows® ME

14

[Product Category]

Display as [SE].

15

[CT Version]

This is the CT version of installed Systemwalker Desktop Keeper. In addition, please refer to the contents of “Chapter 6 CT Version” chapter for correspondence with product version/Edition.

16

[Last Logon Date and Time]

The client (CT) will communicate with the Master Management Server or Management Server when it is started. In this communication, this is the last time for the server to perform the following processing for the client (CT).

  • Sending CT policy

  • Sending user policy

17

[Client policy Update]

This is the last time for the Management Server or Master Management Server to send CT policies to the client (CT).
Display or update under the following conditions.

  • When the CT added to CT list after restarting begins to communicate with Master Management Server or Management Server.

  • When clicking the [Immediate Updating] button of Management Console to reflect CT policy to CT.

18

[Applied Policy] (Note 2)

This is the policy applied in CT.

  • CT: indicates that the applied policy is CT policy.

  • Group: indicates that the applied policy is CT group policy.

19

[Active Directory Linkage Excluding Flag] (Note 2)

This is the flag information of Active Directory Linkage target.

  • 0:Active Directory Linkage target

  • 1: Non-Active Directory Linkage target

20

[Network Participation Status] (Note 2)

This is opt-in status of the network of the CT.

  • 0: no information (CT of version earlier than V13.0.0)

  • 2: joined group

  • 3: joined domain

21

[Affiliated Domain Name] (Note 2)

Affiliated domain name (address) of the CT. When there is not a joined domain, the name will be output as single-byte space of one character.

22

Policy

[File Export Prohibition] (Note 2)

This is the configuration value of the file export prohibition policy.

  • General export: indicates that the policy is set to export the files not encrypted by using File Export Utility.

  • Encrypted export: indicates that the policy is set to export encrypted files by using File Export Utility.

  • Prohibited export: indicates the policy is set to prohibit exporting files.

23

[Printing Prohibition] (Note 2)

This is the configuration value of the printing prohibition policy.

  • No: indicates that the policy is not set to prohibit printing.

  • Yes: indicates that the policy is set to prohibit printing.

24

[PrintScreen Key Prohibition] (Note 2)

This is the configuration value of the PrintScreen key prohibition policy.

  • No: indicates that the policy is not set to prohibit PrintScreen key.

  • Yes: indicates that the policy is set to prohibit PrintScreen key.

When the policy is set to prohibit, the settings information of screen capture will not be output.

25

[Logon Prohibition] (Note 2)

This is the configuration value of the logon prohibition policy.

  • No: indicates that the policy is not set to prohibit logon.

  • Yes: indicates that the policy is set to prohibit logon.

The operation information of prohibited group and during prohibition will not be output.

26

[Application Startup Prohibition] (Note 2)

This is the configuration value of the application startup prohibition policy.

  • No: indicates that the policy is not set to prohibit startup application.

  • Yes: indicates that the policy is set to prohibit startup application.

The name and notes information of application that is prohibited starting will not be output.

27

[E-mail Attachment Prohibition] (Note 2)

This is the configuration value of the E-mail attachment prohibition policy.

  • No: indicates that the policy is not set to prohibit adding E-mail attachment.

  • Encrypt: indicates that the policy is set as that the files not encrypted are prohibited adding to E-mail as attachment.

  • Only extension prohibited: indicates that the policy is set as that the file with specified extension is prohibited adding to E-mail as attachment.

  • Only extension allowed: indicates that the policy is set as that the file with specified extension can be added to E-mail as attachment.

The type information of extension will not be output.

28

[Application Startup Log] (Note 2)

This is the log switch information of the application startup log.

  • No: indicates that the policy is not set to collect application startup log.

  • Yes: indicates that the policy is set to collect application startup log.

29

[Application Termination Log] (Note 2)

This is the log switch information of the application termination log.

  • No: indicates that the policy is not set to collect application termination log.

  • Yes: indicates that the policy is set to collect application termination log.

30

[Window Title Obtaining Log] (Note 2)

This is the log switch information of the window title obtaining log.

  • No: indicates that the policy is not set to collect window title obtaining log.

  • Yes: indicates that the policy is set to collect window title obtaining log.

The filter settings and conditions of repeated logs will not be output.

31

[E-mail Sending Log] (Note 2)

This is the log switch information of the E-mail sending log.

  • No: indicates that the policy is not set to collect E-mail sending log.

  • Yes: indicates that the policy is set to collect E-mail sending log.

32

[Command Log] (Note 2)

This is the log switch information of the command log.

  • No: indicates that the policy is not set to collect command log.

  • Yes: indicates that the policy is set to collect command log.

33

[Device Configuration Change Log] (Note 2)

This is the log switch information of the device configuration change log.

  • No: indicates that the policy is not set to collect device configuration change log.

  • Yes: indicates that the policy is set to collect device configuration change log.

34

[Printing Operation Log] (Note 2)

This is the log switch information of the printing operation log.

  • No: indicates that the policy is not set to collect printing operation log.

  • Yes: indicates that the policy is set to collect printing operation log.

The information for applications that are allowed to print will not be output.

35

[File Export Log] (Note 2)

This is the log switch information of the file export log.

  • No: indicates that the policy is not set to collect file export log.

  • Yes: indicates that the policy is set to collect file export log.

36

[File Operation Log] (Note 2)

This is the log switch information of the file operation log.

  • No: indicates that the policy is not set to collect file operation log.

  • Yes: indicates that the policy is set to collect file operation log.

The filter operation settings, getting process and extension information will not be output.

37

[Linkage Application Log] (Note 2)

This is the log switch information of the linkage application log.

  • No: indicates that the policy is not set to collect linkage application log.

  • Yes: indicates that the policy is set to collect linkage application log.

38

[Logon,Logoff Log

] (Note 2)

This is the log switch information of the logon/logoff log.

  • No: indicates that the policy is not set to logon/logoff log.

  • Yes: indicates that the policy is set to logon/logoff log.

39

[PrintScreen Key Operation Log] (Note 2)

This is the log switch information of the PrintScreen key operation log.

  • No: indicates that the policy is not set to collect PrintScreen key operation log.

  • Yes: indicates that the policy is set to collect PrintScreen key operation log.

40

[Trace Status]

This is the contents of the settings that are tracked and collected in the client (CT).

  • [Summary]: the trace of client (CT) shall be collected according to summary level.

  • [Details]: the trace of client (CT) shall be collected according to details level.

  • Blank: when not collecting the trace status of client (CT), or the version of CT is earlier than “1.2.0.1”.

41

[DTP Version]

This is the version of Systemwalker Desktop Patrol installed in the client (CT).

42

Policy

[File access control] (Note 2)

This is the configuration value of the file access limit policy.

  • No: indicates that the policy is set as no file access limit.

  • Yes: indicates that the policy is set to have file access limit.

43

[Read removable drive] (Note 2)

This is the configuration value of the reading removable disk policy.

  • Not prohibited: indicates that the policy is not set to prohibit reading removable disk.

  • Prohibited: indicates that the policy is set to prohibit reading removable disk.

44

[USB Device Individual Identification Function] (Note 2)

This is the configuration value of the USB device individual identification function policy.

  • Not used: indicates that the policy is not set to use USB device individual identification function.

  • Used: indicates that the policy is set to use USB device individual identification function.

45

[Web Operation Log] (Note 2)

This is the log switch information of the Web operation log.

  • No: indicates that the policy is not set to collect Web operation log.

  • Yes: indicates that the policy is set to collect Web operation log.

46

[FTP Operation Log] (Note 2)

This is the log switch information of the FTP operation log.

  • No: indicates that the policy is not set to collect FTP operation log.

  • Yes: indicates that the policy is set to collect FTP operation log.

47

[Confirm recipient address when sending E-mail] (Note 2)

This is the configuration value of the policy to confirm recipient address when sending an E-mail.

  • No: indicates that the policy is not set to confirm the recipient address during E-mail sending.

  • Yes: indicates that the policy is set to confirm the recipient address during E-mail sending.

48

[URL Access Prohibition] (Note 2)

This is the configuration value of the URL access prohibition policy.

  • No: indicates that the policy is not set to prohibit accessing to URL.

  • Yes: indicates that the policy is set to prohibit accessing to URL.

49

[FTP Server Connection Prohibition] (Note 2)

This is the configuration value of the FTP server connection prohibition policy.

  • No: indicates that the policy is not set to prohibit connecting FTP server.

  • Yes: indicates that the policy is set to prohibit connecting FTP server.

50

[Web Operation Prohibition] (Note 2)

This is the configuration value of the Web download prohibition policy.

  • No: indicates that the policy is not set to prohibit Web download.

  • Yes: indicates that the policy is set to prohibit Web download.

51

[Clipboard Operation Log (Virtual Environment)] (Note 3)

This is the log switch information of the clipboard operation log.

  • No: indicates that the policy is not set to collect clipboard operation log.

  • Yes: indicates that the policy is set to collect clipboard operation log.

52

[Clipboard Operation Prohibition (Virtual Environment)] (Note 3)

This is the configuration value of the clipboard operation prohibition policy.

  • No: indicates that the policy is not set to collect prohibited clipboard operation.

  • Yes: indicates that the policy is set to collect prohibited clipboard operation.

53

[Read CD/DVD drive] (Note 3)

  • This is the configuration value of the reading CD/DVD drive policy.

  • Not prohibited: indicates that the policy is not set to prohibit reading CD/DVD drive.

  • Prohibited: indicates that the policy is set to prohibit reading CD/DVD drive.

    .

54

[Read network drive] (Note 3)

  • This is the configuration value of the reading network drive policy.

  • No: indicates that the policy is not set to prohibit reading network drive.

  • Yes: indicates that the policy is set to prohibit reading network drive.

55

[Use all USB devices registered in Management Server] (Note 3)

  • This is the configuration value of whether all USB devices logging on to the Management Server are allowed.

  • Not allowed: prohibit using USB devices logging on to Management Server.

  • Allowed: allow the use of USB devices logging on to Management Server.

56

Virtual Terminal Type (Note 3)

Display the information of whether the terminal environment with client (CT) installed is physical environment or virtual environment.

  • (Blank): indicates physical terminal.

  • Virtual terminal (Normal): indicates virtual terminal.

  • Virtual terminal (Master PC): indicates the Master of virtual terminal.

Note 1: In the [CSV File Settings of Output CT Information] window, when selecting [V13.2.0~V14.1.0 Compatible Mode] or [V14.2.0 Format], the first line of CSV file will be displayed as the item name.
Note 2: In the [CSV File Settings of Output CT Information] window, this is the output information when selecting [V13.2.0~V14.1.0 Compatible Mode] or [V14.2.0 Format].
Note 3: In the [CSV File Settings of Output CT Information] window, this is the output information when selecting [V14.2.0 Format] only.

For the output CSV file, please specify a full path name no larger than 218 bytes.