Modifying a monitoring alarm policy – H3C Technologies H3C Intelligent Management Center User Manual

Page 211

Advertising
background image

195

{

CPU—CPU number and CPU name.

{

Memory—Total memory of the asset.

{

Mainboard—Vendor and product model of the main board.

{

DVD/CD-ROM—Device instance path of the DVD/CD-ROM drive.

{

NIC—Device instance path.

{

Hard Disk—Hard-disk interface type and device instance path.

{

BIOS—BIOS caption, vendor, release date, and version.

8.

Select the software items to monitor in the Software Changes Monitoring area.
Click the boxes next to target items to monitor them. When the content of a selected item changes,
the DAM server encapsulates the changes within syslogs and sends them to the specified syslog

server.

{

Logical Disk—Logical disk name, description, file system, serial number, and total size. The
logical disks are only scanned and checked when the asset starts up.

{

Network Connections—NIC serial number, IP address, DHCP status, gateway IP address, asset
MAC address, and subnet mask.

{

Operating System—Operating system name, version, service pack, installation date, and
language.

{

Screen Saver—Screen saver status (enabled or disabled), display of logon screen on resume

(enabled or disabled), and idle time.

{

System Information—Login name of the asset.

{

Computer Name—Computer name of the asset.

{

Partition—Hard disk number, partition number, partition type, boot partition (yes or no), and

partition capacity.

{

Software—Software name and version.

{

Reinstall OS or Other Update—Operating system reinstallation and recovery.

9.

Click OK.
The new monitoring alarm policy appears in the monitoring alarm policy list and the Policy List on
the Add Control Scheme page.

Modifying a monitoring alarm policy

1.

Click the User tab.

2.

From the navigation tree, select Desktop Asset Manager > Desktop Control Policy > Monitoring
Alarm.
The monitoring alarm policy list displays all monitoring alarm policies.

3.

Click the Modify icon

for the monitoring alarm policy you want to modify.

The Modify Monitoring Alarm Policy page appears.

4.

Modify the description for the monitoring alarm policy. You cannot modify other basic
information.

5.

Modify keywords in the Keywords to Trigger Alarms field of the USB Monitoring area.
You can enter up to 100 keywords per line with each keyword containing up to 32 characters.
When the DAM server receives information about files written from the asset to a USB storage

Advertising