Configuring monitoring alarm policies, Monitoring alarm policy list contents, Monitoring alarm policy details – H3C Technologies H3C Intelligent Management Center User Manual
Page 208: Basic information area, Usb monitoring area

192
3.
Click the Delete icon
for the energy-saving policy you want to delete.
A confirmation dialog box appears.
4.
Click OK.
Configuring monitoring alarm policies
Monitoring alarm policies enable the DAM server to encapsulate monitoring information in syslogs and
send them to the specified syslog server. The monitoring information is reported by the iNode client, and
includes software and hardware changes of assets, unauthorized copying, and printing of sensitive files.
Operators can view, add, modify, and delete monitoring alarm policies.
Before you configure monitoring alarm policies, select Enable for Send Syslogs on the Service
Parameters page. Otherwise, the DAM server cannot send syslogs to the specified syslog server. For
more information about the configuration procedure, see "
The IMC platform can serve as the syslog server to receive syslogs from the DAM server. For more
information about syslog management, see H3C IMC Base Platform Administrator Guide.
Monitoring alarm policy list contents
•
Policy Name—Name of the monitoring alarm policy. Click the name to view detailed information.
•
Description—Description of the monitoring alarm policy.
•
Service Group—Service group to which the monitoring alarm policy belongs.
•
Modify—Click the Modify icon
to modify the policy settings.
•
Delete—Click the Delete icon
to delete the monitoring alarm policy.
Monitoring alarm policy details
The Monitoring alarm policy details page has the following areas:
•
Basic Information
•
USB Monitoring
•
Printer Monitoring
•
Hardware Changes Monitoring
•
Software Changes Monitoring
Basic Information area
•
Policy Name—Name of the monitoring alarm policy.
•
Service Group—Service group to which the monitoring alarm policy belongs.
•
Description—Description of the monitoring alarm policy.
USB Monitoring area
Keywords to Trigger Alarms—List of keywords for triggering alarms. When the DAM server receives
information about files written from the asset to a USB storage device, it checks the file names for
keywords. When a keyword is found, the DAM server encapsulates the information in syslogs and sends
them to the specified syslog server. Operators can view the following information on the syslog server: