Groups of Computers

JCM provides a convenient way for managing groups of computers. The first (default) group is created automatically by the setup program and is assigned the name New computers. This default group cannot be deleted. Newly added computers will always appear in this group.

There is no limit to the number of groups that can be created. Client computers can be distributed among these groups in any way deemed appropriate by the JCM administrator: by physical location, by required security policy, or by any other attribute. Both computer groups and the computers within a group are displayed in alphabetic order.

Encryption policy can be assigned to the whole group or with individual policies. A group policy is assigned on a Group page, while an individual policy is assigned on aComputer page. If an individual policy is assigned to a computer, the computer is marked with 'gear' icon in the list.

The left picture shows two companies - MyTeam and MyTeam1. MyTeam includes only one group and all the computers have the common group policy assigned. MyTeam1 company has three groups with different policies for each group. The right picture shows a fragment of MyTeam1 company page, where all the policies assigned for groups and computers are displayed.

Moving computers from one group to another

The Move function is available in Computers and Groups table on a company's page:

If a computer is moved from Group1 to Group2, the computer gets the encryption policy of Group2. If the computer has been already encrypted and 'move' operation would cause change of encryption algorithm, the program will ask to decrypt the computer first and then attempt to move the computer again.

One of the possible ways of using the program is: create an 'empty' policy (i.e. the policy that does not force any encryption), assign this policy to the default group 'New computers'. New computers will appear in this group, but encryption won't start at this step. This group is considered as a temporary 'buffer'. Create several groups with different encryption policies and then distribute the 'New Computers' among these groups, according to the required policy.

See also: