beautypg.com

Advanced query – H3C Technologies H3C Intelligent Management Center User Manual

Page 231

background image

215

4.

Specify one or both of the following query criteria:

{

Asset Number—Enter a partial or complete asset number of the asset.

{

Owner—Enter a partial or complete name of the asset owner.

5.

Click Query.
The unauthorized peripheral use list displays all unauthorized peripheral use records matching the
query criteria.

6.

Click Reset to clear the query criteria.
The unauthorized peripheral use list displays the unauthorized peripheral use records of all assets.

Advanced query

1.

Click the User tab.

2.

From the navigation tree, select Desktop Asset Manager > Desktop Control Audit > Peripheral Use.
The unauthorized peripheral use list displays the unauthorized peripheral use records of all assets.

3.

Click Advanced Query at the upper right of the page.
When Basic Query is displayed at the upper right of the page, you are already in advanced query
mode. Skip this step.

4.

Specify one or more of the following query criteria:

{

Asset Number—Enter a partial or complete asset number of the asset.

{

Asset Name—Enter a partial or complete name of the asset.

{

Owner—Enter a partial or complete name of the asset owner.

{

Group Name—Click the Select Asset Group icon

to select the asset group where the asset

is located.

{

Operation Time (Server) from/to—Specify the time range when the unauthorized peripheral

use record was reported. You can enter the time range, or click the Calendar icon

to

bring up the time control page and select the time range. The time range must be in the format
YYYY-MM-DD hh:mm:ss.

{

Peripheral Policy—Select the peripheral policy that was violated.

{

Device Type—Select the type of the peripheral device. Options are:

DVD/CD-ROM

FloppyDisk

Modem

COM/LPT

1394

USB

Infrared

Bluetooth

PCMCIA

{

Device Instance Path—Enter a partial or complete device instance path of the peripheral device.

5.

Click Query.
The unauthorized peripheral use list displays all unauthorized peripheral use records matching the
query criteria.