Modifying a desktop control scheme, Deleting a desktop control scheme, Configuring peripheral policies – H3C Technologies H3C Intelligent Management Center User Manual
Page 202: Configuring, Peripheral policies

186
1.
Click the User tab.
2.
From the navigation tree, select Desktop Asset Manager > Control Scheme.
The control scheme list displays all desktop control schemes.
3.
Click Add.
The Add Control Scheme page appears.
4.
Configure basic information for the desktop control scheme.
5.
Assign policies to the desktop control scheme in the Policy List area.
Select the policy you want to assign to the desktop control scheme. You can select one peripheral
policy, one energy-saving policy, and one monitoring alarm policy.
6.
Click OK.
After adding the desktop control scheme, you can assign it to a single asset or a group of assets. The
group basis configuration applies to all assets in the same group, but can be overridden by the asset
basis configuration. For more information, see "
Modifying a desktop control scheme
1.
Click the User tab.
2.
From the navigation tree, select Desktop Asset Manager > Control Scheme.
The control scheme list displays all desktop control schemes.
3.
Click the Modify icon
for the desktop control scheme you want to modify.
4.
Modify the description for the desktop control scheme. You cannot modify other basic information.
5.
Reassign policies to the desktop control scheme in the Policy List area.
Select the policy you want to assign to the desktop control scheme. To cancel a policy, clear its
box.
6.
Click OK.
Deleting a desktop control scheme
When you delete a desktop control scheme, the scheme is removed from all associated assets and asset
groups. To assign new schemes, you must modify the assets and asset groups.
To delete a desktop control scheme:
1.
Click the User tab.
2.
From the navigation tree, select Desktop Asset Manager > Control Scheme.
The control scheme list displays all desktop control schemes.
3.
Click the Delete icon
for the desktop control scheme you want to delete.
A confirmation dialog box appears.
4.
Click OK.
Configuring peripheral policies
A peripheral policy is used to disable peripheral devices and monitor the use of USB storage devices and
printers. The iNode client immediately reports an event to the DAM server for auditing when a peripheral