Top
Systemwalker Desktop Keeper Reference Manual
FUJITSU Software

2.2 CT Information

This section describes the CSV file of the CT list output in the Management Console. Refer to the contents of "Output CT Information" in User's Guide for Administrator for details on how to output the CT list as a CSV file.

The item name and description output in the CSV file are described as follows:

No.

Item Name (*1)

Description

1

[Server Name]

This is the name of the Management Server/ Master Management Server that CT logs.

2

[Group Name]

This is the name of the CT group on which the CT logs.

3

[Name]

This is CT name and its initial value is a computer name.

4

[Notes]

This is the information input when reflecting CT policy.

5

[Identification ID]

The Management Server/ Master Management Server gives itself an ID to identify CT.

6

[Computer Name]

Computer name of CT

7

[MAC Address]

MAC address of CT

8

[IP Address]

IP address of CT

9

[Subnet Mask]

Subnet mask set in network properties of CT

10

[Organization Name]

Organization name set in OS of CT

11

[Owner]

Owner name set in OS of CT

12

[OS Type]

OS installed in CT

13

[OS Version]

Display according to the format of "OS Platform, OS Large Version, OS Small Version".

[For Windows]

OS platform, namely code to identify OS of client (CT), is identified as follows:

  • 1:Windows ME or Windows 98

  • 2:Windows Server 2003, Windows 2000, Windows XP, Windows NT, Windows Vista, Windows Server 2008, Windows 7, Windows 8, Windows 10, Windows Server 2012, or Windows Server 2016

OS large version, namely code to identify OS of client (CT), is identified as follows:

  • 4:Windows ME, Windows 98 or Windows NT

  • 5:Windows Server 2003, Windows 2000, or Windows XP

  • 6:Windows Vista, Windows Server 2008, Windows 7, Windows 8, or Windows Server 2012

  • 10: Windows 10, or Windows Server 2016

OS small version, namely code to identify OS of client (CT), is identified as follows:

  • 0:Windows 2000, Windows NT, Windows Vista, Windows 10, Windows Server 2008, or Windows Server 2016

  • 1:Windows XP, Windows 7, or Windows Server2008 R2

  • 2:Windows Server 2003, Windows 8, or Windows Server 2012

  • 3:Windows 8.1, or Windows Server 2012 R2

  • 10:Windows 98,

  • 90:Windows ME

  • [For smart device]

  • OS platform is always "0".

  • OS large version is the "X" part of "Android X and Y" or "iOS X and Y".

  • OS small version is the "Y" part of "Android X and Y" or "iOS X and Y".

14

[Product Category]

Display as [SE].

15

[CT Version]

This is the CT version of installed Systemwalker Desktop Keeper. In addition, refer to the contents of "Chapter 6 CT Version" chapter for correspondence with product version/Edition.

16

[Last Logon Date and Time]

The client (CT) will communicate with the Management Server/ Master Management Server when it is started. In this communication, this is the last time for the server to perform the following processing for the client (CT).

  • Sending CT policy

  • Sending user policy

17

[Client policy Update Date and Time]

This is the last time for the Management Server/ Master Management Server to send CT policies to the client (CT).
Display or update under the following conditions.

  • When the CT added to CT list after restarting begins to communicate with Management Server/ Master Management Server.

  • When clicking the [Immediate Updating] button of Management Console to reflect CT policy to CT.

18

[Applied Policy] (*2)

This is the policy applied in CT.

  • CT: indicates that the applied policy is CT policy.

  • Group: indicates that the applied policy is CT group policy.

  • Emergency procedure: indicates that the applied policy is an emergency procedure settings policy.

19

[Active Directory Linkage Excluding Flag] (*2)

This is the flag information of Active Directory Linkage target.

  • 0:Active Directory Linkage target

  • 1: Non-Active Directory Linkage target

20

[Network Participation Status] (*2)

This is opt-in status of the network of the CT.

  • 0: no information (CT of version earlier than V13.0.0)

  • 2: joined group

  • 3: joined domain

21

[Affiliated Domain Name] (*2)

CT affiliated domain name (address). When there is not a joined domain, the name will be output as halfwidth space of one character.

22

Policy

[File Export Prohibition] (*2)

This is the configuration value of the file export prohibition policy.

  • General export: indicates that the policy is set to export the files not encrypted by using File Export Utility.

  • Encrypted export: indicates that the policy is set to export encrypted files by using File Export Utility.

  • Prohibited export: indicates the policy is set to prohibit exporting files.

23

[Printing Prohibition] (*2)

This is the configuration value of the printing prohibition policy.

  • No: indicates that the policy is not set to prohibit printing.

  • Yes: indicates that the policy is set to prohibit printing.

24

[PrintScreen Key Prohibition] (*2)

This is the configuration value of the PrintScreen key prohibition policy.

  • No: indicates that the policy is not set to prohibit PrintScreen key.

  • Yes: indicates that the policy is set to prohibit PrintScreen key.

When the policy is set to prohibit, the settings information of screen capture will not be output.

25

[Logon Prohibition] (*2)

This is the configuration value of the logon prohibition policy.

  • No: indicates that the policy is not set to prohibit logon.

  • Yes: indicates that the policy is set to prohibit logon.

The operation information of prohibited group and during prohibition will not be output.

26

[Application Startup Prohibition] (*2)

This is the configuration value of the application startup prohibition policy.

  • No: indicates that the policy is not set to prohibit startup application.

  • Yes: indicates that the policy is set to prohibit startup application.

The name and notes information of application that is prohibited starting will not be output.

27

[E-mail Attachment Prohibition] (*2)

This is the configuration value of the E-mail attachment prohibition policy.

  • No: indicates that the policy is set not to prohibit adding E-mail attachment.

  • Encrypt: indicates that the policy is set to prohibit attaching to emails the files that are not encrypted.

  • Only extension prohibited: indicates that the policy is set as that the file with specified extension is prohibited adding to E-mail as attachment.

  • Only extension allowed: indicates that the policy is set as that the file with specified extension can be added to E-mail as attachment.

The type information of extension will not be output.

28

[Application Startup Log] (*2)

This is the log switch information of the application startup log.

  • No: indicates that the policy is not set to collect application startup log.

  • Yes: indicates that the policy is set to collect application startup log.

29

[Application Termination Log] (*2)

This is the log switch information of the application termination log.

  • No: indicates that the policy is not set to collect application termination log.

  • Yes: indicates that the policy is set to collect application termination log.

30

[Window Title Obtaining Log] (*2)

This is the log switch information of the window title obtaining log.

  • No: indicates that the policy is not set to collect window title obtaining log.

  • Yes: indicates that the policy is set to collect window title obtaining log.

The filter settings and conditions of repeated logs will not be output.

31

[E-mail Sending Log] (*2)

This is the log switch information of the E-mail sending log.

  • No: indicates that the policy is not set to collect E-mail sending log.

  • Yes: indicates that the policy is set to collect E-mail sending log.

32

[Command Log] (*2)

This is the log switch information of the command log.

  • No: indicates that the policy is not set to collect command log.

  • Yes: indicates that the policy is set to collect command log.

33

[Device Configuration Change Log] (*2)

This is the log switch information of the device configuration change log.

  • No: indicates that the policy is not set to collect device configuration change log.

  • Yes: indicates that the policy is set to collect device configuration change log.

34

[Printing Operation Log] (*2)

This is the log switch information of the printing operation log.

  • No: indicates that the policy is not set to collect printing operation log.

  • Yes: indicates that the policy is set to collect printing operation log.

The information for applications that are allowed to print will not be output.

35

[File Export Log] (*2)

This is the log switch information of the file export log.

  • No: indicates that the policy is not set to collect file export log.

  • Yes: indicates that the policy is set to collect file export log.

36

[File Operation Log] (*2)

This is the log switch information of the file operation log.

  • No: indicates that the policy is not set to collect file operation log.

  • Yes: indicates that the policy is set to collect file operation log.

The filter operation settings, getting process and extension information will not be output.

37

[Linkage Application Log] (*2)

This is the log switch information of the linkage application log.

  • No: indicates that the policy is not set to collect linkage application log.

  • Yes: indicates that the policy is set to collect linkage application log.

38

[Logon,Logoff Log

] (*2)

This is the log switch information of the logon/logoff log.

  • No: indicates that the policy is not set to logon/logoff log.

  • Yes: indicates that the policy is set to logon/logoff log.

39

[PrintScreen Key Operation Log] (*2)

This is the log switch information of the PrintScreen key operation log.

  • No: indicates that the policy is not set to collect PrintScreen key operation log.

  • Yes: indicates that the policy is set to collect PrintScreen key operation log.

40

[Trace Status]

This is the contents of the settings that are tracked and collected in the client (CT).

  • [Summary]: the trace of client (CT) shall be collected according to summary level.

  • [Details]: the trace of client (CT) shall be collected according to details level.

  • Blank: when not collecting the trace status of client (CT), or the version of CT is earlier than "1.2.0.1".

41

[DTP Version]

This is the version of Systemwalker Desktop Patrol installed in the client (CT).

42

Policy

[File access control] (*2)

This is the configuration value of the file access limit policy.

  • No: indicates that the policy is set as no file access limit.

  • Yes: indicates that the policy is set to have file access limit.

43

[Read removable drive] (*2)

This is the configuration value of the reading removable disk policy.

  • Not prohibited: indicates that the policy is not set to prohibit reading removable disk.

  • Prohibited: indicates that the policy is set to prohibit reading removable disk.

44

[Individual identification] (*2)

This is the configuration value of the individual identification policy.

  • Not used: indicates that the policy is not set to use individual identification.

  • Used: indicates that the policy is set to use individual identification.

45

[Web Operation Log] (*2)

This is the log switch information of the Web operation log.

  • No: indicates that the policy is not set to collect Web operation log.

  • Yes: indicates that the policy is set to collect Web operation log.

46

[FTP Operation Log] (*2)

This is the log switch information of the FTP operation log.

  • No: indicates that the policy is not set to collect FTP operation log.

  • Yes: indicates that the policy is set to collect FTP operation log.

47

[Confirm recipient address when sending E-mail] (*2)

This is the configuration value of the policy to confirm recipient address when sending an E-mail.

  • No: indicates that the policy is not set to confirm the recipient address during E-mail sending.

  • Yes: indicates that the policy is set to confirm the recipient address during E-mail sending.

48

[URL Access Prohibition] (*2)

This is the configuration value of the URL access prohibition policy.

  • No: indicates that the policy not to prohibit accessing to URL is set.

  • Yes: indicates that the policy is set to prohibit accessing to URL.

49

[FTP Server Connection Prohibition] (*2)

This is the configuration value of the FTP server connection prohibition policy.

  • No: indicates that the policy is set not to prohibit connecting FTP server.

  • Yes: indicates that the policy is set to prohibit connecting FTP server.

50

[Web Operation Prohibition] (*2)

This is the configuration value of the Web upload and download prohibition policy.

  • No: indicates that the policy is set not to prohibit Web upload and download.

  • Yes: indicates that the policy is set to prohibit Web upload and download.

51

[Clipboard Operation Log (Virtual Environment)] (*3)

This is the log switch information of the clipboard operation log.

  • No: indicates that the policy is not set to collect clipboard operation log.

  • Yes: indicates that the policy is set to collect clipboard operation log.

52

[Clipboard Operation Prohibition (Virtual Environment)] (*3)

This is the configuration value of the clipboard operation prohibition policy.

  • No: indicates that the policy is not set to collect prohibited clipboard operation.

  • Yes: indicates that the policy is set to collect prohibited clipboard operation.

53

[Read CD/DVD drive] (*3)

  • This is the configuration value of the reading CD/DVD drive policy.

  • Not prohibited: indicates that the policy is not set to prohibit reading CD/DVD drive.

  • Prohibited: indicates that the policy is set to prohibit reading CD/DVD drive.

.

54

[Read network drive] (*3)

  • This is the configuration value of the reading network drive policy.

  • No: indicates that the policy is not set to prohibit reading network drive.

  • Yes: indicates that the policy is set to prohibit reading network drive.

55

[Use all USB devices registered in Management Server] (*3)

  • This is the configuration value of whether all USB devices logging on to the Management Server are allowed.

  • Not allowed: prohibit using USB devices logging on to Management Server.

  • Allowed: allow the use of USB devices logging on to Management Server.

56

[Virtual Terminal Type] (*3)

Display the information of whether the terminal environment with client (CT) installed is physical environment or virtual environment.

  • (Blank): indicates physical terminal.

  • Virtual terminal (Normal): indicates virtual terminal.

  • Virtual terminal (Master PC): indicates the Master of virtual terminal.

57

Policy

[Device - Wi-Fi connection] (*3)

Configuration value of the Wi-Fi connection prohibition policy.

  • Do not prohibit: Indicates that the policy is set to not prohibit Wi-Fi connection.

  • Prohibit: Indicates that the policy is set to prohibit Wi-Fi connection.

58

[Device - Bluetooth] (*3)

Configuration value of the Bluetooth prohibition policy.

  • Do not prohibit: Indicates that the policy is set to not prohibit Bluetooth.

  • Prohibit: Indicates that the policy is set to prohibit Bluetooth.

59

[Device - IEEE1394] (*3)

Configuration value of the IEEE1394 prohibition policy.

  • Do not prohibit: Indicates that the policy is set to not prohibit IEEE1394.

  • Prohibit: Indicates that the policy is set to prohibit IEEE1394.

60

[Device - Infrared communication] (*3)

Configuration value of the infrared communication prohibition policy.

  • Do not prohibit: Indicates that the policy is set to not prohibit infrared communication.

  • Prohibit: Indicates that the policy is set to prohibit infrared communication.

61

[Device - Serial port / Parallel port] (*3)

Configuration value of the serial port/parallel port prohibition policy.

  • Do not prohibit: Indicates that the policy is set to not prohibit serial port/parallel port.

  • Prohibit: Indicates that the policy is set to prohibit serial port/parallel port.

62

[Device - PC Card] (*3)

Configuration value of the PC card prohibition policy.

  • Do not prohibit: Indicates that the policy is set to not prohibit PC card.

  • Prohibit: Indicates that the policy is set to prohibit PC card.

63

[Device - PCI Express Card] (*3)

Configuration value of the PCI ExpressCard permission policy.

  • Disallow: Indicates that the policy is set to not permit PCI ExpressCard.

  • Allow: Indicates that the policy is set to permit PCI ExpressCard.

64

Reserved item

65

[Web operation prohibition setting] (*3)

This is the configuration value of the web upload and download prohibition policy.

  • Upload/ Download: Indicates that the policy is set to prohibit Web uploading and downloading.

  • Upload: Indicates that the policy is set to prohibit only Web uploading.

  • Download: Indicates that the policy is set to prohibit only Web downloading.

66

Device (*3)

This is the type of a monitoring device.

  • PC: Indicates a client (CT).

  • Smart device: Indicates a smart device (Agent).

67

Smart Device Policy

[Web access log] (*3)

This is log switch information of the web access log.

  • No: Indicates that the policy of not collecting the web access log is set.

  • Yes: Indicates that the policy of collecting the web access log is set.

68

[SD card mount/unmount log] (*3)

This is a log switch information of the SD card mount/unmount log.

  • No: Indicates that the policy of not collecting the SD card mount/unmount log is set.

  • Yes: Indicates that the policy of collecting the SD card mount/unmount log is set.

69

[SIM card mount/unmount log] (*3)

This is a log switch information of the SIM card mount/unmount log.

  • No: Indicates that the policy of not collecting the SIM card mount/unmount log is set.

  • Yes: Indicates that the policy of collecting the SIM card mount/unmount log is set.

70

[Wi-Fi connection log] (*3)

This is log switch information of the Wi-Fi connection log.

  • No: Indicates that the policy of not collecting the Wi-Fi connection log is set.

  • Yes: Indicates that the policy of collecting the Wi-Fi connection log is set.

71

[Bluetooth connection log] (*3)

This is log switch information of the Bluetooth connection log.

  • No: Indicates that the policy of not collecting the Bluetooth connection log is set.

  • Yes: Indicates that the policy of collecting the Bluetooth connection log is set.

72

[Incoming and outgoing log] (*3)

This is log switch information of the Telephone incoming and outgoing log.

  • No: Indicates that the policy of not collecting the Telephone incoming and outgoing log is set.

  • Yes: Indicates that the policy of collecting the Telephone incoming and outgoing log is set.

73

[Application usage log] (*3)

This is log switch information of the application usage log.

  • No: Indicates that the policy of not collecting the application usage log is set.

  • Yes: Indicates that the policy of collecting the application usage log is set.

74

[Application configuration change log] (*3)

This is log switch information of the application configuration change log.

  • No: Indicates that the policy of not collecting the application configuration change log is set.

  • Yes: Indicates that the policy of collecting the application configuration change log is set.

75

[Wi-Fi connection prohibition] (*3)

This is a configuration value of the Wi-Fi connection prohibition policy.

  • Not prohibited: Indicates that the policy not prohibiting the Wi-Fi connection is set.

  • Registered access point is prohibited: Indicates that the policy that prohibits connecting the registered access point is set.

  • Registered access point is permitted: Indicates that the policy permitting the connection to a registered access point is set.

76

[Bluetooth connection prohibition] (*3)

This is a configuration value of the Bluetooth connection prohibition policy.

  • Not prohibited: Indicates that the policy not prohibiting the Bluetooth connection is set.

  • Registered Bluetooth device is prohibited: Indicates that the policy prohibiting the Bluetooth connection is set.

  • Registered Bluetooth device is permitted: Indicates that the policy permitting the Bluetooth connection is set.

77

[Application usage prohibition] (*3)

This is a configuration value of the application usage prohibition policy.

  • Not prohibited: Indicates that the policy that does not prohibit the usage of application is set.

  • Registered package is prohibited: Indicates that the policy prohibiting the usage of registered package is set.

  • Registered package is permitted: Indicates that the policy permitting the usage of registered package is set.

78

[Remote control] (*3)

This indicates the latest execution status of the remote control.

  • Blank: Indicates that the remote control is not executed.

  • Requesting the lock: Indicates the attempt of requesting a smart device for enforcement lock.

  • Executing the lock: Indicates that the smart device has accepted the enforcement lock.

  • Locked: Indicates that the smart device has executed the enforcement lock.

  • Requesting the lock cancellation: Indicates the attempt of requesting a smart device to cancel the enforcement lock.

  • Executing the lock cancellation: Indicates that the smart device has accepted the enforcement lock cancellation.

  • Lock cancelled: Indicates that the smart device has cancelled the enforcement lock.

  • Requesting wipe: Indicates the attempt of requesting the smart device for wipe.

  • Executing wipe: Indicates that the smart device has accepted the wipe.

  • Wiped: Indicates that the smart device has executed the wipe.

  • Requesting for data deletion: Indicates the attempt of requesting the smart device to delete data.

  • Deleting the data: Indicates that the smart device has accepted to delete the data.

  • Data deleted: Indicates that the smart device has deleted the data.

  • Requesting to clear the passcode: Indicates the attempt to request the smart device to clear the passcode.

  • Clearing the passcode: Indicates that the smart device has accepted to clear the passcode.

  • Passcode cleared: Indicates that the smart device has cleared the passcode.

79

Policy

[Portable device] (*3)

This is the configuration value of the portable device connection prohibition policy.

  • Do not Prohibit: indicates that the policy is set not to prohibit connecting portable device.

  • Prohibit: indicates that the policy is set to prohibit connecting portable device.

80

[Imaging device] (*3)

This is the configuration value of the imaging device connection prohibition policy.

  • Do not Prohibit: indicates that the policy is set not to prohibit connecting imaging device.

  • Prohibit: indicates that the policy is set to prohibit connecting imaging device.

81

[Secure communication](*3)

This is the method of communication used with the Management Server or Master Management Server.

  • Used: Secure communication is used.

  • Not used: Secure communication is not used.

82

Policy

[E-mail receiving log] (*3)

Whether the policy is set to collect e-mail receiving logs.

  • No: The policy is set not to collect e-mail receiving logs.

  • Yes: The policy is set to collect e-mail receiving logs.

83

[Environment change log] (*3)

Whether the policy is set to collect environment change logs.

  • No: The policy is set not to collect environment change logs.

  • Yes: The policy is set to collect environment change logs.

84

[Display message when connecting device]

Whether to display a message when connecting a device.

  • 0: No

  • 1: Yes

85

[PC usage time notification] (*3)

It is the item of the features not available in the Global Version.

*1: In the [CSV File Settings of Output CT Information] window, when selecting [V13.2.0~V14.1.0 Compatible Mode] or [V14.2.0 Format], the first line of CSV file will be displayed as the item name.
*2: In the [CSV File Settings of Output CT Information] window, this is the output information when selecting [V13.2.0~V14.1.0 Compatible Mode] or [V14.2.0 Format].
*3: In the [CSV File Settings of Output CT Information] window, this is the output information when selecting [V14.2.0 Format] only.

For the output CSV file, specify a full path name no larger than 218 characters.