Top
Systemwalker Desktop Keeper Reference Manual
FUJITSU Software

2.1 User Information

Imported CSV files

The [User Policy Settings] window of the Management Console describes how to import the CSV file of this user information when logging on the user information in batch. Refer to the contents of "Register a User" in User's Guide for Administrator for user information and how to use the CSV file and register in batch.

One of the two character encoding formats, Shift JIS or UTF-8, is specified in the server configuration tool.
The item name and description of the input CSV file are described as follows:
When generating the CSV files, the items required to be input are recorded as "(Required)."

Item Name

Input Contents

[Separator]
(Required)

Enter one of the following mentioned separators. In a CSV file, use a unified separator.

  • " ,"(halfwidth comma)

  • " "(Tab)

  • " ;"( halfwidth semicolon)

  • " |"(halfwidth broken bar)

[Quotation Marks of String]
(Required)

This is required to enter one of the following mentioned quotation marks of string.

  • " " " (halfwidth double quote)

  • " ' " (halfwidth single quote)

However, when the marks that are the same as quotation marks of a string are used in the following mentioned data items ([User Name],[User's Name],[Employee ID],[Post],[Section Name],[Section Code],[Notes]), enter them twice. If they are entered only once, an error will occur.

[User ID]
(Required)

Enter the user ID that can logon Windows (It shall differ from "Full Name" that can set in the user name).
Enter a user ID within 40 halfwidth characters (20 fullwidth characters). However, under the following situation, an error will occur.

  • User ID completely composed of period "."

  • User ID completely composed of space

  • User ID composed of """, "/", "\", "[", "]", ":", ";", "|", "=", ",", "+", "*", "?", "<" ">"

[User Name]

Enter the name of user who uses this user ID.
Enter within 128 halfwidth characters (64 fullwidth characters).

[Employee ID]

Enter the employee ID of user who uses this user ID.
Enter within 40 halfwidth characters (20 fullwidth characters).

[Post]

Enter the post of user who uses this user ID.
Enter within 128 halfwidth characters (64 fullwidth characters).

[Section Name]

Enter the affiliated section of user who uses this user ID.
Enter within 128 halfwidth characters (64 fullwidth characters).

[Section Code]

Enter the affiliated section code of user who uses this user ID.
Enter no greater than 40 halfwidth characters (20 fullwidth characters).

[Notes]

Enter the notes information of user who uses this user ID.
Enter within 128 halfwidth characters (64 fullwidth characters).

The following mentioned is an example when the user information of one person is logged on. When the user information of several people is logged on, record this information using the same method in a new line.
When Active Directory Linkage is not performed, the maximum case(s) of register in one operation is 10,000.
When Active Directory Linkage is performed, the maximum case(s) that can be logged on the local group of the configuration information tree in one operation is 100,000.

{Quotation Marks of String}{User ID}{Quotation Marks of String}{Separator}{Quotation Marks of String}{User Name}{Quotation Marks of String}{Separator}{Quotation Marks of String}{Employee ID}{Quotation Marks of String}{Separator}{Quotation Marks of String}{Post}{Quotation Marks of String}{Separator}{Quotation Marks of String}{Section Name}{Quotation Marks of String}{Separator}{Quotation Marks of String}{Section Code}{Quotation Marks of String}{Separator}{Quotation Marks of String}{Notes}{Quotation Marks of String}

The following mentioned is an example when the separator, ",", and quotation marks of string, " ' " , are used for record.

'taro','Fujitsu Taro','100000','Director of A Department','General Affairs Department','5555','Assets Management
'hanako',' Fujitsu Hanako','100001','Manager of A Department','General Affairs Department','5555',''

When the required items are entered only, it is shown as follows. It is an example when the separator, " ,", and quotation marks of string, " ' " , are used.

'taro','','','','','',''
'hanako','','','','','',''

Output CSV files

The [User Policy Settings] window of the Management Console describes the CSV file of this user information that can be output. Refer to the contents of "Export User Information" in User's Guide for Administrator for details on how to output the user information as CSV file.

The character encoding used is either Shift JIS or UTF-8, one of which is specified in the server configuration tool. The item name and description output in CSV file are described as follows:

No.

Item Name (*1)

Description

1

[User Name]

This is the user name that can logon Windows (It shall differ from " Full Name" that can set in the user name).

2

[User's Name]

Enter the name of user who uses this user name.

3

[Employee No.]

Enter the employee ID of user who uses this user name.

4

[POST]

Enter the post of user who uses this user name.

5

[Organization]

Use the affiliated section name of user who uses this user name.

6

[Organization Code]

Use the affiliated section code of user who uses this user name.

7

[Notes]

Enter the notes information of user who uses this user name.

8

[Affiliated Group Name] (*2)

This is the user group name for user registered.

9

[Last Policy Acquisition Date and Time] (*2)

This is the last time for the CT to get the user policy from the Management Server/Master Management Server.

10

[Server (DB) Update Date and Time] (*2)

When the Management Server/Master Management Server is updating the client (CT) policy (user policy of user name), the operation will be reflected to the database and the reflection time will be recorded as the update time (including the immediate update).

11

[Registration Date and Time] (*2)

Use the time when user name logs on.

12

[Apply Policy] (*2)

This is the policy applied to the CT.

  • User: indicates that the applied policy is user policy.

  • Group: indicates that the applied policy is user group policy to which the user belongs.

13

[Do not Apply Policy](*2)

Whether user policies are applied.

  • Not applied: No user policy is applied.

  • (Blank): A user policy is applied.

14

[Affiliated Domain Name] ( *2)

This is the domain name (address) to which the user name belongs. When the name does not belong to the domain, one character, halfwidth space, will be output.

15

Policy

[File Export Prohibition] (*2)

This is the configuration value of file export prohibition policy.

  • General export: indicates that the policy is set to export the files not encrypted by using File Export Utility.

  • Encrypted export: indicates that the policy is set to export encrypted files by using File Export Utility.

  • Prohibited export: indicates the policy is not set to export files.

16

[Printing Prohibition](*2)

This is the configuration value of printing prohibition policy.

  • No: indicates that the policy is not set to prohibit printing.

  • Yes: indicates that the policy is set to prohibit printing.

17

[PrintScreen Key Prohibition] (*2)

This is the configuration value of PrintScreen key prohibition policy.

  • No: indicates that the policy is not set to prohibit PrintScreen key.

  • Yes: indicates that the policy is set to prohibit PrintScreen key.

When the policy is set to prohibit, the settings information of screen capture will not be output.

18

[Application Startup Prohibition] (*2)

This is the configuration value of application startup prohibition policy.

  • No: indicates that the policy is not set to prohibit startup application.

  • Yes: indicates that the policy is set to prohibit startup application.

The name and notes information of application that is prohibited starting will not be output.

19

[E-mail Attachment Prohibition] (*2)

This is the configuration value of E-mail attachment prohibition policy.

  • No: indicates that the policy is not set to prohibit adding E-mail attachment.

  • Encrypt: indicates that the policy is set so that the files not encrypted are prohibited adding to E-mail as attachment.

  • Only extension prohibited: indicates that the policy is set so that the files with specified extension is prohibited adding to E-mail as attachment.

  • Only extension allowed: indicates that the policy is set so that the files with specified extension can be added to E-mail as attachment.

The type information of extension will not be output.

20

[Application Startup Log] (*2)

This is the log switch information of application startup log.

  • No: indicates that the policy is not set to collect application startup log.

  • Yes: indicates that the policy is set to collect application startup log.

21

[Application Termination Log] (*2)

This is the log switch information of application termination log.

  • No: indicates that the policy is not set to collect application termination log.

  • Yes: indicates that the policy is set to collect application termination log.

22

[Window Title Obtaining Log] (*2)

This is the log switch information of window title obtaining log.

  • No: indicates that the policy is not set to collect window title obtaining log.

  • Yes: indicates that the policy is set to collect window title obtaining log.

The filter settings and conditions of repeated logs will not be output.

23

[E-mail Sending Log] (*2)

This is the log switch information of E-mail sending log.

  • No: indicates that the policy is not set to collect E-mail sending log.

  • Yes: indicates that the policy is set to collect E-mail sending log.

24

[Command Log] (*2)

This is the log switch information of the command log.

  • No: indicates that the policy is not set to collect command log.

  • Yes: indicates that the policy is set to collect command log.

25

[Device Configuration Change Log] (*2)

This is the log switch information of the device configuration change log.

  • No: indicates that the policy is not set to collect device configuration change log.

  • Yes: indicates that the policy is set to collect device configuration change log.

26

[Printing Operation Log] (*2)

This is the log switch information of the printing operation log.

  • No: indicates that the policy is not set to collect printing operation log.

  • Yes: indicates that the policy is set to collect printing operation log.

The information from applications that are allowed to print will not be output.

27

[File Export Log] (*2)

This is the log switch information of the file export log.

  • No: indicates that the policy is not set to collect file export log.

  • Yes: indicates that the policy is set to collect file export log.

28

[PrintScreen Key Operation Log] (*2)

This is the log switch information of the PrintScreen key operation log.

  • No: indicates that the policy is not set to collect PrintScreen key operation log.

  • Yes: indicates that the policy is set to collect PrintScreen key operation log.

29

[File access control] (*2)

This is the configuration value of the file access limit policy.

  • No: indicates that the policy is set as no file access limit.

  • Yes: indicates that the policy is set to have file access limit.

30

[Read removable drive] (*2)

This is the configuration value of the reading removable disk policy.

  • Not prohibited: indicates that the policy is not set to prohibit reading removable disk.

  • Prohibited: indicates that the policy is set to prohibit reading removable disk.

31

[Individual identification] (*2)

This is the configuration value of the individual identification policy.

  • Not used: indicates that the policy is not set to use individual identification.

  • Used: indicates that the policy is set to use individual identification.

32

[Web Operation Log] (*2)

This is the log switch information of the Web operation log.

  • No: indicates that the policy is not set to collect Web operation log.

  • Yes: indicates that the policy is set to collect Web operation log.

33

[FTP Operation Log] (*2)

This is the log switch information of the FTP operation log.

  • No: indicates that the policy is not set to collect FTP operation log.

  • Yes: indicates that the policy is set to collect FTP operation log.

34

[Confirm recipient address when sending E-mail] (*2)

This is the configuration value of policy to confirm the recipient address when sending an E-mail.

  • No: indicates that the policy is not set to confirm the recipient address during E-mail sending.

  • Yes: indicates that the policy is set to confirm the recipient address during E-mail sending.

35

[URL Access Prohibition] (*2)

This is the configuration value of the URL access prohibition policy.

  • No: indicates that the policy is not set to prohibit accessing to URL.

  • Yes: indicates that the policy is set to prohibit accessing to URL.

36

[FTP Server Connection Prohibition] (*2)

This is the configuration value of the FTP server connection prohibition policy.

  • No: indicates that the policy is not set to prohibit connecting FTP server.

  • Yes: indicates that the policy is set to prohibit connecting FTP server.

37

[Web Operation Prohibition] (*2)

This is the configuration value of the Web upload and download prohibition policy.

  • No: indicates that the policy is not set to prohibit Web upload and download.

  • Yes: indicates that the policy is set to prohibit Web upload and download.

38

[Clipboard Operation Log (Virtual Environment)] (*3)

This is the log switch information of the clipboard operation log.

  • No: indicates that the policy is not set to collect clipboard operation log.

  • Yes: indicates that the policy is set to collect clipboard operation log.

39

[Clipboard Operation Prohibition (Virtual Environment)] (*3)

This is the configuration value of the clipboard operation prohibition policy.

  • No: indicates that the policy is not set to collect prohibited clipboard operation.

  • Yes: indicates that the policy is set to collect prohibited clipboard operation.

40

[Read CD/DVD drive] (*3)

This is the configuration value of the policy for reading CD/DVD drive.

  • Not prohibited: indicates that the policy is not set to prohibit reading CD/DVD drive.

  • Prohibited: indicates that the policy is set to prohibit reading CD/DVD drive.

41

[Read network drive] (*3)

This is the configuration value of policy for reading network drive

  • No: indicates that the policy is not set to prohibit reading network drive.

  • Yes: indicates that the policy is set to prohibit reading network drive.

42

[Use all USB devices registered in Management Server] (*3)

  • This is the configuration value of whether all USB devices logging on the Management Server are allowed.

  • Not allowed: prohibit using USB devices logging on Management Server.

  • Allowed: allow to use USB devices logging on Management Server.

43

[User Identification ID]

This is the identification ID of the user.

44

Policy

[Device - Wi-Fi connection] (*3)

Configuration value of the Wi-Fi connection prohibition policy.

  • Do not prohibit: Indicates that the policy is set to not prohibit Wi-Fi connections.

  • Prohibit: Indicates that the policy is set to prohibit Wi-Fi connections.

45

[Device - Bluetooth] (*3)

Configuration value of the Bluetooth connection prohibition policy.

  • Do not prohibit: Indicates that the policy is set to not prohibit Bluetooth connections.

  • Prohibit: Indicates that the policy is set to prohibit Bluetooth connections.

46

[Device - IEEE1394] (*3)

Configuration value of the IEEE1394 prohibition policy.

  • Do not prohibit: Indicates that the policy is set to not prohibit IEEE1394.

  • Prohibit: Indicates that the policy is set to prohibit IEEE1394.

47

[Device - Infrared communication] (*3)

Configuration value of the infrared communication prohibition policy.

  • Do not prohibit: Indicates that the policy is set to not prohibit infrared communication.

  • Prohibit: Indicates that the policy is set to prohibit infrared communication.

48

[Device - Serial port / Parallel port] (*3)

Configuration value of the serial port/parallel port prohibition policy.

  • Do not prohibit: Indicates that the policy is set to not prohibit serial ports/parallel ports.

  • Prohibit: Indicates that the policy is set to prohibit serial ports/parallel ports.

49

[Device - PC Card] (*3)

Configuration value of the PC card prohibition policy.

  • Do not prohibit: Indicates that the policy is set to not prohibit PC cards.

  • Prohibit: Indicates that the policy is set to prohibit PC cards.

50

[Device - PCI Express Card] (*3)

Configuration value of the PCI ExpressCard permission policy.

  • Disallow: Indicates that the policy is set to not permit PCI ExpressCard.

  • Allow: Indicates that the policy is set to permit PCI ExpressCard.

51

[Web operation prohibition settings] (*3)

This is the configuration value of the web upload and download prohibition policy.

  • Upload/Download: Indicates that the policy is set to prohibit Web uploading and downloading.

  • Upload: Indicates that the policy is set to prohibit only Web uploading.

  • Download: Indicates that the policy is set to prohibit only Web downloading.

52

[Portable device] (*3)

This is the configuration value of the portable device connection prohibition policy.

  • Do not Prohibit: indicates that the policy is set not to prohibit connecting portable device.

  • Prohibit: indicates that the policy is set to prohibit connecting portable device.

53

[Imaging device] (*3)

This is the configuration value of the imaging device connection prohibition policy.

  • Do not Prohibit: indicates that the policy is set not to prohibit connecting imaging device.

  • Prohibit: indicates that the policy is set to prohibit connecting imaging device.

54

[E-mail receiving log] (*3)

Whether the policy is set to collect e-mail receiving logs.

  • No: The policy is set not to collect e-mail receiving logs.

  • Yes: The policy is set to collect e-mail receiving logs.

55

[Display message when connecting device]

Whether to display a message when connecting a device.

  • 0: No

  • 1: Yes

56

[PC usage time notification] (*3)

It is the item of the features not available in the Global Version.

*1: In the [Specify a File for Exporting User Information in CSV Format] window, when selecting [V13.2.0~V14.1.0 Compatible Mode] or [V14.2.0 Format], the first line of CSV file will be displayed as the item name.
*2: In the [Specify a File for Exporting User Information in CSV Format] window, this is the output information when selecting [V13.2.0~V14.1.0 Compatible Mode] or [V14.2.0 Format].
*3: In the [Specify a File for Exporting User Information in CSV Format] window, this is the output information when selecting [V14.2.0 Format] only.

Specify the name of output CSV file and specify a full path name within 218 characters.