Top
Systemwalker Desktop Patrol User's Guide
FUJITSU Software

1.3.3 System Structure

The following figure shows how to use the Systemwalker Desktop Patrol client (security auditing and inventory collection) and the troubleshooting.

Process of applying security patches
  1. Receive the software dictionary

    Receive and apply the software dictionary (used for detecting definition files of software and security patches) from manually download and apply.

  2. Select management target software/security patches

    Select the software that is used as the management target.

    Besides, the software dictionary records security patch information that is automatically downloaded from Microsoft's public site. Select security patches that can be applied automatically.

  3. Distribute/apply security patches

    Automatic download the selected security patches from the public site of Microsoft.

    Distribute and apply the downloaded security patches based on the operational configuration.

  4. Collect inventory information

    Software installation status and hardware information selected in the software dictionary can be collected automatically.

    Besides, the application status of security patches can also be collected automatically.

  5. Confirm

    The administrator confirms the software installation status and hardware information.

    The administrator can also determine whether the necessary security patches are applied.

Process of remote operation
  1. Start the Live Help Client on the faulty PC.

  2. The administrator uses the Live Help Expert function to connect to the client PC.

  3. The administrator performs operations on the GUI of the client PC and rectifies faults.


The following figure shows the ICT assets management through Systemwalker Desktop Patrol.

  1. Register/ modify asset information

    Perform either of the following methods to register/modify the asset information:

    1. Register/ modify the inventory information

      Register/ modify the inventory information collected by Systemwalker Desktop Patrol manually or automatically as the asset information managed by management ledger.

    2. Register/ modify account

      Register/ modify the asset information managed by management ledger (the asset information used to be considered as the account).

    3. Register/ modify through device information auto-detected

      The device information auto-detected by the ADT is notified to the CS automatically. The unregistered device information can be registered on the unregistered device management page, or you can enter all the registered device names and register them uniformly.

    4. Register/ modify on the page

      Register and modify the asset information respectively through the main menu.

  2. Confirm the asset information

    Perform either of the following methods to confirm the asset information:

    1. Through the page

      Confirm the device information, contract information, and checking status through the main menu.

  3. Stocktaking Operation

    Perform either of the following methods to check the asset information:

    1. Collect the inventory information

      Check the asset information through the inventory information collected from the PC.

    2. Auto-Detect device information

      Check the asset information through the device information detected automatically by ADT.

    3. Set on the page

      Set the stocktaking status (Checked/Not Checked) manually on the main menu.

  4. Export reports

    Export results of asset running status, contract status, and checking status in a report according to the asset information managed by management ledger, so that you can know and audit the usage.


Use the Virtual Private Network (VPN) to access the internal network of the company from outside. The following figure shows the system structure for mobile operation.

Set the DS for connecting to the PC for mobile operation, and set the running policy that the PC uses on the DS. Then the PC connects to the DS and runs according to the preset policy.

Assets management based on Systemwalker Desktop Patrol can also be performed in the mobile operating PCs which are not always connecting to the Internet.


System configuration for smart device assets management

To manage smart device assets, Systemwalker Desktop Patrol SS must be installed between the Systemwalker Desktop Patrol CS and smart device CT.

If collecting the smart device inventory information via the internet, install a reverse proxy server in the DMZ. The server must be operated in the recommended configuration shown below.

System configuration supporting IPv6

IPv6 network configuration supported in Systemwalker Desktop Patrol is shown below.

Note

  • If the Systemwalker Desktop Patrol CS is in an IPv6-only environment, you will not be able to connect to the Systemwalker support center. For the CS, a dual stack environment must be built.