AEG SCN91800C1 User manual

© 2014 Hitachi, Ltd. All rights reserved. © 1998-2004 Trend Micro Incorporated. All rights reserved.
RN-91IOS020-15
1
Hitachi IT Operations Director
Software Version 3.0.0-14 Release Notes
Contents
About This Document ..................................................................................2
Intended Audience ......................................................................................2
Getting Help ...............................................................................................2
About This Release ......................................................................................3
Features and Enhancements .........................................................................3
System Specification Changes.......................................................................6
System and Hardware Requirements .............................................................8
Fixed Problems ...........................................................................................9
Known Problems ....................................................................................... 76
Installation Notes ...................................................................................... 76
Precautions .............................................................................................. 77
Documentation ....................................................................................... 103
Copyright and License Information ............................................................ 104

© 2014 Hitachi, Ltd. All rights reserved. © 1998-2004 Trend Micro Incorporated. All rights reserved.
RN-91IOS020-15
2
About This Document
This document describes the revisions made to Hitachi IT Operations Director,
software version 3.0.0-14. The document includes information that was not
available at the time the technical documentation for this product was published,
and a list of known problems and solutions.
Intended Audience
This document is intended for Hitachi Data Systems customers and authorized
service partners who license and use Hitachi IT Operations Director.
Getting Help
For product tutorials and additional information, please refer to the self-service
materials that are located on the IT Operations Software Portal:
http://www.itoperations.com
If you cannot locate the answer to your concern by referencing those materials,
and if you purchased this product and have a current product support agreement,
please visit the support Web site for current telephone numbers and other
contact information: http://www.hds.com/services/support/
The Hitachi Data Systems Support Center staff is available 24 hours a day, seven
days a week.

© 2014 Hitachi, Ltd. All rights reserved. © 1998-2004 Trend Micro Incorporated. All rights reserved.
RN-91IOS020-15
3
About This Release
These release notes apply to version 3.0.0-14 of Hitachi IT Operations Director.
Features and Enhancements
These functionalities are described in the IT Operations Director Help System.
In 3.0.0-08
Operating Systems for Network Access Control
IT Operations Director 3.0.0-08 supports the English version (only) of the
following operating systems for Network Access Control:
Microsoft® Windows Server® 2008 Standard
Microsoft® Windows Server® 2008 Enterprise
Microsoft® Windows Server® 2008 Standard without Hyper-V
Microsoft® Windows Server® 2008 Enterprise without Hyper-V
Microsoft® Windows Server® 2008 R2 Standard
Microsoft® Windows Server® 2008 R2 Enterprise
Microsoft® Windows ® 7 Professional
Microsoft® Windows ® 7 Enterprise
Microsoft® Windows ® 7 Ultimate
German Operating System Internationalization support
On the German operating system, the English version of the IT Operations
Director Manager and Agent components are supported. For precautionary
information about running IT Operations Director on the German
operating system, please see the Precautions section.
In 3.0.0-07
Antivirus Software
IT Operations Director 3.0.0-07 supports the following antivirus software:
-Symantec Endpoint Protection 12.1.

© 2014 Hitachi, Ltd. All rights reserved. © 1998-2004 Trend Micro Incorporated. All rights reserved.
RN-91IOS020-15
4
In 3.0.0-04
License Activation
The description of problem cause and associated workaround that is
displayed in the license activation message has been improved.
Task Status
The message displayed in Task Status in the Distribution module has
been improved to include the return code of the program execution in the
Task Status Details dialog box in the Task List.
Collecting Host Names of Printers
IT Operations Director 3.0.0-04 supports the feature of collecting host
names of printer that are discovered by SNMP authentication, by name
resolution of MAC address, IP address, NETBIOS, DNS or hosts, instead of
collecting the sysName, with the specification in the publishing options.
For details, refer to the IT Operations Director Usage Precautions section
of this document.
VMware ESX Server
You can now install IT Operations Director 3.0.0-04 on the following
Windows virtual machines:
VMware ESX Server 3.0 or later.
ESX and ESXi in VMware vSphere 4.
ESXi in VMware vSphere 5.
Antivirus Software
IT Operations Director 3.0.0-04 supports the following antivirus software:
McAfee SaaS Endpoint Protection 5.2
VirusScan Enterprise 8.8
Improved Kaspersky Software
IT Operations Director is now able to collect Scan Engine Version, Virus
Definition File Version, and Last Scanned Date information from the
following software:
Kaspersky Anti-Virus 6.0.4 for Windows Servers
Kaspersky Anti-Virus 6.0.4 for Windows Servers 64bit
Kaspersky Anti-Virus 6.0.4 for Windows Workstations
Kaspersky Anti-Virus 6.0.4 for Windows Workstations 64bit

© 2014 Hitachi, Ltd. All rights reserved. © 1998-2004 Trend Micro Incorporated. All rights reserved.
RN-91IOS020-15
5
In 3.0.0-03
Operations Logs Collection
IT Operations Director 3.0.0-03 supports Internet Explorer 9, Firefox 4 or
5, and Windows Live Mail 2011 to be able to collect the Operations Logs
relating to Web access, sending/receiving e-mail with attachments, and
using FTP.
In 3.0.0-00
Network Access Control
IT Operations Director provides you with the option to control which
computers can connect to the network with the Network Access Control
feature; access can be based on criteria you specify, to protect your
network from viruses and unauthorized users.
Windows Update Management
IT Operations Director provides you with the option to monitor the
Windows Updates for the installed Microsoft Windows updates. If your site
has a Product Support contract for Hitachi IT Operations Director, you can
automatically obtain the latest Windows Update information in regular
intervals.
Remote Control
IT Operations Director provides you with the remote access to manage
and troubleshoot the end user’s computers on the IT Operations
management environment. Remote Control is a feature designed to assist
the help desk personnel and system administrators. With this feature in
your IT Operations Management environment, you can remotely access
any computer, either with the IT Operations Director agent or through RFB
protocol, distributed anywhere in your same office building or across
geographical boundaries.

© 2014 Hitachi, Ltd. All rights reserved. © 1998-2004 Trend Micro Incorporated. All rights reserved.
RN-91IOS020-15
6
System Specification Changes
In 3.0.0-13
Firefox has been excluded from the supported Web browsers for
operation logs
Firefox cannot be used to collect the following operation logs:
Upload File
Download File
Send File
Receive File
Web Access
You can collect the above mentioned operation logs from the following
Internet Explorer versions, only: Internet Explorer 6, 7, 8, and 9.
In 3.0.0-10
Update Tracked Date (from CSV)
When you perform Update Tracked Date (from CSV) on the
management console, the update process can now complete successfully
even when the CSV file has an empty row.
Import Software Search Conditions
In Settings > Software Search Conditions, the behavior of the Import
Software Search Conditions menu has been changed as follows:
When there are no records in a CSV file, an error message is
displayed.
When an empty row is included in a CSV file, the row is ignored.
The User Activity (USB Device Heavy User Top N) Report
When two conditions are met in a security policy (see the conditions
below), the following operations are now not included in the report data:
The excluded operations:
[Upload File]
[Download File]
[Send File]
[Receive File]
[Send Mail (Attachment File)]
[Receive Mail (Attachment File)]
[Save Attached File]

© 2014 Hitachi, Ltd. All rights reserved. © 1998-2004 Trend Micro Incorporated. All rights reserved.
RN-91IOS020-15
7
The security policy conditions:
1. In Security policy > Operations Logs > Target Operations to be
Logged, the [Select target operations] is selected. In the
subcategory of [File Operation/Print Operation] and [Folder
Operation], an item other than [Copy file], [Move file], [Rename file],
[Create file], [Delete file], [Copy folder], [Move folder], [Rename
folder], [Create folder], and [Delete folder] is not selected.
2. In a Security policy, all of the [Suspicious Operations to be
Notified] settings are disabled.
In 3.0.0-08
Report Creation Condition Changes
The User Activity (Printer Heavy User Top N) report: The report creation
condition has been changed so that the data for the User Activity (Printer
Heavy User Top N) report is populated when a security policy meets either of
the following conditions:
1. In Operations Logs > Target Operations to be Logged > File
Operation/Print Operation, [Print] is enabled.
2. In Operations Logs > Suspicious Operations to be Notified, [Large
Number of Printing Jobs] is enabled.
Note: Previously, the report was created when any of the following
conditions were met:
1. In Operations Logs > Target Operations to be Logged, one or
more sub-items are enabled in either the “File Operation/Print
Operation” or “Folder Operation” categories.
2. In Operations Logs > Suspicious Operations to be Notified,
[Large Number of Printing Jobs] is enabled.
3. In Operations Logs, [Only operations that divulge
information (recommended)] is enabled.
The User Activity (USB Device Heavy User Top N) report: The report
creation condition has been changed so that the data for the User Activity
(USB Device Heavy User Top N) report is populated when a security policy
meets either of the following conditions:
1. In Operations Logs > Target Operations to be Logged, one or more sub-
items (except for Print) are enabled in either the “File Operation/Print
Operation” or “Folder Operation” categories.
2. In Operations Logs > Suspicious Operations to be Notified, one or more
item is selected in Send/Receive E-mail with Attachments, Use
Web/FTP Server, or Copy/Move the File to External Device.
3. In Operations Logs, [Only operations that divulge information
(recommended)] is enabled.

© 2014 Hitachi, Ltd. All rights reserved. © 1998-2004 Trend Micro Incorporated. All rights reserved.
RN-91IOS020-15
8
Note: Previously, the report was created when any of the following conditions
were met:
1. In Operations Logs > Target Operations to be Logged, one or more
sub-items are enabled in either the “File Operation/Print Operation” or
“Folder Operation” categories.
2. In Operations Logs > Suspicious Operations to be Notified, one or
more item is selected in Send/Receive E-mail with Attachments, Use
Web/FTP Server, or Copy/Move the File to External Device.
3. In Operations Logs, [Only operations that divulge information
(recommended)] is enabled.
System and Hardware Requirements
For a complete list of system and hardware requirements for this product, see the
Hitachi IT Operations Director Getting Started Guide.

© 2014 Hitachi, Ltd. All rights reserved. © 1998-2004 Trend Micro Incorporated. All rights reserved.
RN-91IOS020-15
9
Fixed Problems
From 3.0.0-13 to 3.0.0-14
Summary
Description
Denial of Service
(DoS) might occur.
The following problem has been corrected:
Denial of Service (DoS) might occur.
(CVE-ID: CVE-2014-0050)
This problem occurred when IT Operations Director processed data in
multipart format that contains an incorrect Content-Type.
From 3.0.0-10 to 3.0.0-13
Summary
Description
The IT Operations
Director Agent
Control service fails
to start.
The following problem has been corrected:
The IT Operations Director Agent Control service fails to start in the
secondary system of a cluster configuration.
This problem occurred when the IT Operations Director Agent Control
service started in the secondary system of a cluster configuration.

© 2014 Hitachi, Ltd. All rights reserved. © 1998-2004 Trend Micro Incorporated. All rights reserved.
RN-91IOS020-15
10
Summary
Description
Windows Explorer
might stop
responding on an
agent-installed
machine during a file
copy or move
operation.
The following problem has been corrected:
Windows Explorer might stop responding on an agent-installed machine
when a copy or move operation is performed on a file that has a specific
file name.
This problem occurred when all of the following conditions were met:
1. The operating system is Windows Vista or later.
2. A file exists and the file name contains a single-byte left parenthesis
"(" but the character is not closed with a single-byte right parenthesis
")", for example, "A(A)(A.doc".
3. A copy or move operation is performed on the file (or folder including
the file) which meets Condition 2, and an existing file with the same
file name is overwritten by the copied or moved file.
4. Any of the following security policies are assigned to the agent-
installed machine:
(a) Operation Logs are enabled. In the Target Operations to be
Logged, the option [Only operations that divulge
information (recommended)] is selected.
(b) Operation Logs are enabled. In the Suspicious Operations to
be Notified, any of the following are selected:
Send/Receive E-mail with Attachments
Use Web/FTP Server
Copy/Move the File to External Device
(c) In Other Access Restrictions > External Device Restriction
> USB Device, the option [Restrict reading/writing] is
enabled.
[For version 3.0.0 to 3.0.0-07]
(d) Operation Logs are enabled. In the Target Operations to be
Logged, the option [Select target operations] is selected,
and in the Operation Classification, any child item under File
Operation/Print Operation or Folder Operation are selected.
[For version 3.0.0-08 or later]
(d) Operation Logs are enabled. In the Target Operations to be
Logged, the option [Select target operations] is selected,
and in the Operation Classification, any child item (except for
Print) under File Operation/Print Operation or Folder
Operation are selected.

© 2014 Hitachi, Ltd. All rights reserved. © 1998-2004 Trend Micro Incorporated. All rights reserved.
RN-91IOS020-15
11
Summary
Description
Windows Explorer
might stop
responding on an
agent-installed
machine.
The following problem has been corrected:
Windows Explorer might stop responding on an agent-installed machine.
This problem occurred when all of the following conditions were met:
1. The operating system is Windows 2000.
2. A file is opened in an application such as Microsoft Excel, or a file
operation is performed in Windows Explorer.
3. Any of the following security policies are assigned to the agent-
installed machine:
(a) Operation Logs are enabled. In the Target Operations to be
Logged, the option [Only operations that divulge
information (recommended)] is selected.
(b) Operation Logs are enabled. In the Suspicious Operations to
be Notified, any of the following are selected:
Send/Receive E-mail with Attachments
Use Web/FTP Server
Copy/Move the File to External Device
(c) In Other Access Restrictions > External Device Restriction
> USB Device, the option [Restrict reading/writing] is
enabled.
[For version 3.0.0-07 or before]
(d) Operation Logs are enabled. In the Target Operations to be
Logged, the option [Select target operations] is selected,
and in the Operation Classification, any child item under File
Operation/Print Operation or Folder Operation are selected.
[For version 3.0.0-08 or later]
(d) Operation Logs are enabled. In the Target Operations to be
Logged, the option [Select target operations] is selected,
and in the Operation Classification, any child item (except for
Print) under File Operation/Print Operation or Folder
Operation are selected.
Permission of a user
account is elevated
incorrectly.
The following problem has been corrected:
Permission of a user account is elevated incorrectly.
Hitachi IT Operations
Director does not
work correctly after
you change the
directory of the
database folder.
The following problem has been corrected:
IT Operations Director does not work correctly after you change the
directory of the database folder.
This problem occurred when all of the following conditions were met:
You change the directory of the database folder.
The Use Operation log check box is selected.
The Backup Operation logs automatically check box is deselected
(cleared).

© 2014 Hitachi, Ltd. All rights reserved. © 1998-2004 Trend Micro Incorporated. All rights reserved.
RN-91IOS020-15
12
Summary
Description
Internet Explorer
might stop
responding on an
agent-installed
machine.
The following problem has been corrected:
Internet Explorer might stop responding on an agent-installed machine.
This problem occurred when all of the following conditions were met:
1. Internet Explorer is started and a Web site is accessed.
2. Any of the following security policies are assigned to the agent-
installed machine:
(a) Operation Logs are enabled. In the Target Operations to be
Logged, the option [Only operations that divulge
information (recommended)] is selected.
(b) Operation Logs are enabled. In the Suspicious Operations to
be Notified, any of the following are selected:
Send/Receive E-mail with Attachments
Use Web/FTP Server
Copy/Move the File to External Device
[For version 3.0.0 to 3.0.0-07]
(c) Operation Logs are enabled. In the Target Operations to be
Logged, the option [Select target operations] is selected,
and in the Operation Classification, any child item under File
Operation/Print Operation or Folder Operation or Web
Access are selected.
[For version 3.0.0-08 or 3.0.0-09]
(c) Operation Logs are enabled. In the Target Operations to be
Logged, the option [Select target operations] is selected,
and in the Operation Classification, any child item (except for
Print)under File Operation/Print Operation or Folder
Operation or Web Access are selected.
[For version 3.0.0-10 or later]
(c) Operation Logs are enabled. In the Target Operations to be
Logged, the option [Select target operations] is selected,
and in the Operation Classification, any of the following are
selected:
Web Access (Upload)
Web Access (Download)
FTP (Send File)
FTP (Receive File)
Send Mail (Attachment File)
Receive Mail (Attachment File)

© 2014 Hitachi, Ltd. All rights reserved. © 1998-2004 Trend Micro Incorporated. All rights reserved.
RN-91IOS020-15
13
Summary
Description
Either agent
registration or
package creation
fails.
The following problem has been corrected:
When agent registration performed in the management server and
package creation performed in the management window are done
simultaneously, either operation fails.
This problem occurred when the following operations were done
simultaneously:
1. From Windows Start menu > Hitachi IT Operations > Director
Tools > Agent Registration, an agent is registered.
2. Any of the following operations are performed in the management
window:
A package is added in the Package List window.
An Agent Installer is created in the Agent Configurations
window.
An update package is automatically created by the Auto Enforce
function that has been set in the Install Updates settings of a
security policy.
Incorrect inventory
information might be
reported.
The following problem has been corrected:
Incorrect inventory information might be reported by an agent-installed
machine or a machine for which Windows authentication is successful. The
incorrect inventory information causes the following behaviors:
1. An update is not displayed in the Installed Updates list and the
update is determined to be "Not Installed" for the machine.
2. The Windows Firewall status is determined to be "Disabled" for the
machine and "Disabled" is displayed.
3. The Automatic Windows Update status is determined to be "Disabled"
for the machine and "Disabled" is displayed.
4. An account is not displayed in the Account Details.
This problem occurred when any of the following conditions were met:
The WMI service (service name: "Winmgmt") stops while the
inventory information is being collected.
The Windows Firewall service (service name: "SharedAccess",
"MpsSvc" in Vista or later) stops due to shutdown while the Windows
Firewall status is being collected.
The Windows Automatic Updates service (service name: "wuauserv")
stops due to shutdown while the Automatic Windows Update status is
being collected.
The Workstation service (service name: "LanmanWorkstation") stops
due to shutdown while the account information is being collected.

© 2014 Hitachi, Ltd. All rights reserved. © 1998-2004 Trend Micro Incorporated. All rights reserved.
RN-91IOS020-15
14
Summary
Description
The IT Operations
Director Agent
Control service might
terminate abnormally.
The following problem has been corrected:
The IT Operations Director Agent Control service might terminate
abnormally.
This problem occurred if you defined more than a certain amount of data
for an asset custom field.
The estimation of the amount of data that would exceed the limit of a
custom field is described below. The estimated number decreases if you
define a custom field in other languages or if you restrict Input
Characters.
More than 70 items (each item consists of approximately 10
double-byte characters) are registered as the hierarchy or
enumeration item for a custom field whose type is Hierarchy or
Enumeration.
More than 30 fields (each field has a total of about 30 double-
byte characters in Item Name and Description) are registered
as a custom field.
The IT Operations
Director Agent
Control service might
terminate abnormally
when it starts.
The following problem has been corrected:
The IT Operations Director Agent Control service might terminate
abnormally when it starts.
This problem occurred if you defined more than a certain amount of data
for the Remote Control Security Settings of the default agent
configuration.
The estimation of the amount of data that would exceed the limit of the
settings is described below.
More than 250 controllers (specified by IP address) are registered
as Allowed Controller.
More than 30 users (each user consists of about 10 single-byte
characters) are registered as Allowed User.
"pdsds.exe" may
generate an
application error.
The following problem has been corrected:
"pdsds.exe" may generate an application error.
This problem occurred, depending on the memory status, when launching
the following windows:
Security > Device List
Assets > Department or Location List
Inventory > Device List

© 2014 Hitachi, Ltd. All rights reserved. © 1998-2004 Trend Micro Incorporated. All rights reserved.
RN-91IOS020-15
15
Summary
Description
Windows Explorer
might terminate
abnormally on an
agent-installed
machine during the
folder operation.
The following problem has been corrected:
Windows Explorer might terminate abnormally when the folder operation
is performed on an agent-installed machine.
This problem occurred when all of the following conditions were met:
1. Any of the following security policies are assigned to the agent-
installed machine:
(a) Operation Logs are enabled. In the Target Operations to be
Logged, the option [Only operations that divulge
information (recommended)] is selected.
(b) Operation Logs are enabled. In the Target Operations to be
Logged, the option [Select target operations] is selected,
and in the Operation Classification, any child item under File
Operation/Print Operation or Folder Operation are selected.
(c) Operation Logs are enabled. In the Suspicious Operations to
be Notified, any of the following are selected:
Send/Receive E-mail with Attachments
Use Web/FTP Server
Copy/Move the File to External Device
(d) In Other Access Restrictions > External Device Restriction
> USB Device, the option [Restrict reading/writing] is
enabled.
2. The rename or move operation is performed to a very deeply rooted
folder in Explorer.
The
jdngsmcdevsr.exe
process terminates
abnormally on an
agent-installed
machine.
The following problem has been corrected:
The jdngsmcdevsr.exe process terminates abnormally on an agent-
installed machine.
This problem occurred when all of the following conditions were met:
1. In Security Policy > Other Access Restrictions > USB Device,
the Restrict reading/writing option and the Allow registered
USB device usage option are enabled.
2. A USB device which is allowed to use is connected to an agent-
installed machine.
3. A very deeply rooted folder is stored in the USB device.
The Warning dialog
box might continue to
be displayed in the
management console.
The following problem has been corrected:
The Warning dialog box might continue to be displayed in the
management console.
This problem occurred when a connection to the database failed during
the completion of a task, such as a setting change, within the
management console.
The software name
might be incorrectly
displayed.
The following problem has been corrected:
Regarding some installed software, the software name might be
incorrectly displayed in the Software List and the software might be
repeatedly added to the list.
This problem occurred when 1-byte NULL was added in the end of the
registry value that stores the software information.

© 2014 Hitachi, Ltd. All rights reserved. © 1998-2004 Trend Micro Incorporated. All rights reserved.
RN-91IOS020-15
16
Summary
Description
The export might fail
when you use an old
version of a template.
The following problem has been corrected:
When you export the Device List (Details) by using a template that you
saved before you upgraded the management server, the export might fail.
This problem occurred when all of the following conditions were met:
In version 2.5.0, when you export the Device List (Details), you save
the items to be exported as a template.
In version 3.0.0 or later, you export the Device List (Details) by using
the saved template.
The package
distribution task
might fail.
The following problem has been corrected:
When distributing a package, the package might not be decompressed in
an agent-installed machine and the task might fail. Also, an agent cannot
be installed on a machine by executing the Agent Installer.
This problem occurred when the following operations were performed
simultaneously in different management consoles:
1. A distribution package is registered in the Package List window of
the Distribution module.
2. The Agent Installer is created in the Agent Configurations window
of the Settings module.
A user is not allowed
to start the software.
The following problem has been corrected:
A user is not allowed to start the software even though a group name is
specified in Approval User/Group Name as the exception in the Block
Software settings.
This problem occurred when all of the following conditions were met:
1. In Security Policy > Other Access Restrictions > Blocked
Software, software is registered.
2. A group name is entered in Approval User/Group Name as the
exception to the software use.
3. There are about 60 or more groups to which the account of the user
who started the software, belongs.

© 2014 Hitachi, Ltd. All rights reserved. © 1998-2004 Trend Micro Incorporated. All rights reserved.
RN-91IOS020-15
17
Summary
Description
Software is not
blocked.
The following problem has been corrected:
Software is not blocked when a user starts it if the software has no
version information.
This problem occurred when all of the following conditions were met:
1. In Security Policy > Other Access Restrictions > Blocked
Software, software is registered.
2. There is no version information in the software.
You can find that there is no version information in the software if the
Properties window in Windows Explorer is as follows:
[For Windows 2000/XP/2003]
The Version tab does not exist in the Properties window.
[For Windows Vista/2008/7]
The value of File version is blank in the Details tab of the Properties
window.
The MAC address of a
device is removed.
The following problem has been corrected:
When a Discovery from Active Directory is performed, the MAC address of
a device is removed from the existing device information in the
management window.
This problem occurred when all of the following conditions were met:
1. The device information is collected only by the following methods:
ARP
ICMP
Active Directory
2. A Discovery from Active Directory is performed.
3. While the Discovery from Active Directory is being performed, the
MAC address of the device cannot be collected, based on a number of
possible causes; for example, the device is powered-off, it is
temporarily disconnected from the network, or a network failure
occurs.

© 2014 Hitachi, Ltd. All rights reserved. © 1998-2004 Trend Micro Incorporated. All rights reserved.
RN-91IOS020-15
18
Summary
Description
When a device is
discovered, another
asset that is identical
to the device, is
registered.
The following problem has been corrected:
After you add a hardware asset by any of the following operations, and if
you perform a discovery using SNMP to discover a device which is identical
to the asset, then another hardware asset identical to the device is
registered.
A hardware asset is added in the Assets window.
A hardware asset is imported.
A hardware asset is added by using the Analyzer Integration
function.
This problem occurred when all of the following conditions were met:
1. You add a hardware asset that meets all of the following conditions:
Host name is 16 or more characters long.
A lowercase letter is included in the first 15 characters of the host
name.
2. After adding the asset, you perform a discovery using SNMP to a
device which is identical with the asset.
The agent might not
start.
The following problem has been corrected:
After an agent is installed using the Agent Installer, and after you restart
the OS, the agent might not start.
This problem occurred when all of the following conditions were met:
1. You install an agent by using the Agent Installer.
2. You restart the OS immediately after you install an agent.
The operation logs
related to a file or
folder might not be
output correctly.
The following problem has been corrected:
After you copy a file or folder on an agent-installed machine, the operation
logs for the file or folder might not be output correctly.
This problem occurred when all of the following conditions were met:
1. The operating system is Windows Vista or later.
2. You copy a file or folder in the same folder.
The user name might
be blank in the logs
and events related to
Print.
The following problem has been corrected:
The user name for the following operation logs and events might be blank.
Also, the corresponding data is not displayed in the User Activity
(Printer Heavy User Top N) report:
Operation logs related to "printing" and "print-restriction"
Events related to suspicious operations that are "print-restriction"
and "a large number of printing jobs"
This problem occurred depending on the printer driver installed on an
agent.

© 2014 Hitachi, Ltd. All rights reserved. © 1998-2004 Trend Micro Incorporated. All rights reserved.
RN-91IOS020-15
19
Summary
Description
Operation logs for
printing might not be
obtained and printing
might not be
restricted.
The following problem has been corrected:
Operation logs for printing might not be obtained and printing might not
be restricted.
This problem occurred when all of the following conditions were met:
1. An agent-installed machine has a computer name that exceeds 15
characters.
2. A printer is installed on the agent-installed machine, and a printing
operation for the printer is completed.
Operation logs for
which the date is year
3001 or later are
registered.
The following problem has been corrected:
When an agent notifies the management server of the operation logs for
which the date is year 3001 or later, these operation logs are registered in
the management server.
This problem occurred when an agent notified the management server of
the operation logs dated year 3001 or later.
There is a problem in
registering hardware
asset information.
The following problem has been corrected:
Either of the following symptoms occurs.
Symptom (1): An invalid value can be registered for a custom field by
importing hardware assets.
Symptom (2): You may be unable to change the hardware asset
information.
A. Symptom (1) occurred when all of the following conditions were met:
1. A custom field for hardware assets is defined with the Enumeration
type.
2. By importing hardware assets, you overwrite or update the value of
the selection item for the custom field, but the imported value has
not been defined as the selection items yet.
B. Symptom (2) occurred when all of the following conditions were met:
1. A value that has not been defined as the selection items for the
custom field is set for a hardware asset.
2. Any of the following operations are performed for the hardware
asset:
(a) Edit the hardware asset information
(b) Change the hardware asset status
(c) Edit the associated contracts
(d) Edit the associated hardware assets
(e) Edit the associated inventory information
(f) Import the hardware asset

© 2014 Hitachi, Ltd. All rights reserved. © 1998-2004 Trend Micro Incorporated. All rights reserved.
RN-91IOS020-15
20
From 3.0.0-09 to 3.0.0-10
Summary
Description
Explorer might stop
responding on an
agent computer.
The following problem has been corrected:
Explorer might stop responding on an agent computer.
This problem occurred when any of the following security policies were
applied to an agent computer:
1. Operations Logs are enabled. In the Target Operations to be
Logged, the option [Only operations that divulge information
(recommended)] is selected.
2. Operations Logs are enabled. In the Target Operations to be
Logged, the option [Select target operations] is selected and in
the Operation Classification, any of the following are selected:
File Operation/Print Operation
Folder Operation
In the subcategory displayed by expanding the [File
Operation/Print Operation] and [Folder Operation], one or
more items (except for Print) is selected.
3. Operations Logs are enabled. In the Suspicious Operations to
be Notified, any of the following are selected:
Send/Receive E-mail with Attachments
Use Web/FTP Server
Copy/Move the File to External Device
4. In Other Access Restrictions > External Device Restriction >
USB Device > the option [Restrict reading/writing] is enabled.
When Discovery from
IP Address Range is
performed, the MAC
address is removed
from the device
information of any
device that has already
been discovered by
Network Access
Control.
The following problem has been corrected:
When Discovery from IP Address Range is performed, the MAC address is
removed from the device information of any device that has already
been discovered by Network Access Control.
This problem occurred when all of the following conditions were met:
1. When Network Access Control discovers a device and discovery is
performed for the device, the inventory information is obtained only
by ICMP.
2. When Discovery from IP Address Range is performed to the above-
mentioned device, the inventory information is obtained only by
ICMP.
Other manuals for SCN91800C1
1
Table of contents
Other AEG Refrigerator manuals

AEG
AEG RCB636E4MW User manual

AEG
AEG ABB682F1AF User manual

AEG
AEG Santo 2492-4 KG User manual

AEG
AEG Santo 1734-1 TK User manual

AEG
AEG RKE63826MW User manual

AEG
AEG RKS439F1DW User manual

AEG
AEG Santo 1734TK User manual

AEG
AEG SD880FS User manual

AEG
AEG SANTO K 7 10 43-7i User manual

AEG
AEG RKB439F1DX User manual