Configuring the Preferences

This section describes the method for configuring the preferences of this software.
1.
Log in to this software as the system manager.
2.
Select the [System] menu > [Preferences].
3.
Configure the required settings on the [Preferences] page.
You can switch the display using the drop-down list on the top of the list on the [Preferences] page.
[E-Mail Settings]
Enter the source address in [Sender E-Mail Address].
Enter the SMTP server address in [SMTP Server Address].
Enter the port number used for communicating with the SMTP server in [Port Number].
To use SSL/TLS when communicating with the SMTP server, select [Use TLS].
To use user authentication when communicating with the SMTP server, select [Use user authentication], and enter the authentication information in [User Name] and [Password].
Click [Save].
To send a test e-mail, click [Send Test E-Mail].
A test e-mail is sent to the e-mail address of the user operating the screen.
[LDAP Server Settings]
Configure the following settings here.
Settings for logging in to this software with Integrated Windows Authentication
Settings for logging in to this software with LDAP authentication
For information on the setting method, see the following.
[Account Policy]
In [Minimum number of characters for password], enter the minimum number of characters for the password.
Select the password policy to apply.
In [Account Lockout Policy Settings], configure the account lockout settings.
[Lockout Threshold]
Enter the number of times that a user must fail logging in before they are locked out.
[Lockout Period (in Minutes)]
Enter the time until the lockout expires.
Click [Save].
IMPORTANT
In order to apply the policy set here to passwords that are already registered, it is necessary to manually set the passwords again.
NOTE
To manually unlock a user that is locked out, click [Unlock] on the following page as a user with administrator privileges.
[System] menu > [Users] > [User Details] page of the account that is locked out
[Automatic Logout]
Select [Automatically log the user out after a period of inactivity].
In [Inactivity Period (in Minutes)], enter the time until the user is automatically logged out.
Click [Save].
NOTE
Users logged in with Integrated Windows Authentication are not automatically logged out.
[Webhook Settings]
External systems can be notified of event details when events occur in this software. Configure the following settings to use this function.
NOTE
Webhook via a proxy is not supported.
Click [Add].
The [Webhook Settings] page is displayed.
Enter a name indicating the content to send notification for in [Name].
Enter the destination URL for the external system in [URL].
Enter the value for the secret token that indicates that this software was the source of transmission in [Token], as required.
The value entered here is stored in the "X-Mc-Token" HTTP header for this software and sent.
Select the events to send notification for.
Click [Add].
[Customize Common Device Information]
Configure the note columns on the [Device Details] page.
To change the name of "Note 1" or "Note 2", enter the name of the note column in [Custom Name] in [Customize Note Columns].
To add a note column other than "Note 1" or "Note 2", select the check box for the note column to display on the [Device Details] page in [Add Note Columns (single line, max. 250 characters)] or [Add Note Columns (multiple lines, max. 1500 characters)].
You can add up to four note columns with each.
In [Custom Name], enter the name of the note column you selected the check box for.
NOTE
For information on the [Device Details] page, see the following.
Even if you change the name of a note column, the content of the note columns that are already configured will not change.
The content entered for a note column is retained even if the check box for that note column is deselected.
[Device Group Settings]
If you selected [Use tree view] in [Display Settings], select the character to use for separating levels in [Delimiter Character].
If you selected [Use list view] in [Display Settings], you can create multiple levels at the same time in the [Devices] menu > [Device Groups]. However, when a hierarchy is created with this method, devices can only be assigned to the last level. Devices cannot be assigned to higher levels.
Example:
When ":" is set in [Delimiter Character] for levels, you can use the following format to create three levels even without creating the 1st level and 2nd level in advance.
<1st level name>:<2nd level name>:<3rd level name>
When [Display Settings] is switched to [Use tree view] after creating levels via this method, the levels are separated at the separator character and displayed in the tree view.
Click [Save].
[Data Retention Period]
Specify the number of days in [Retain Task History (in Days)].
Specify the number of days in [Retain User Operation Log (in Days)].
Click [Apply].
[Certificate Verification Settings]
[Verify certificates during HTTPS communication between manager and agents]
Select this check box to verify the certificate when performing encrypted communication from the Manager to the Agent if the Agent of this software is running on a computer other than the computer where the Manager of this software is running.
You can select [Verify certificates during HTTPS communication between manager and agents] if all the following conditions are met:
A valid certificate is registered on the computer where the Manager of this software is running, and the Manager is configured to use the certificate
A valid certificate is registered on all computers where the Agent of this software is running, and all Agents are configured to use the certificate. (If an Agent is running on both the computer where the Manager of this software is running and on a different computer, the Agent running on the computer where the Manager is running must also be configured to use the certificate.)
For details on registering certificates and configuring the Manager and Agent, see the following.
NOTE
If a valid certificate is registered on the computer where the Agent of this software is running and the Agent is configured to use the certificate, this software always verifies the certificate when performing encrypted communication from the Agent to the Manager, regardless of whether the [Verify certificates during HTTPS communication between manager and agents] check box is selected.
[Certificates for HTTPS Communication]
In this list, you can check the certificates used by the Manager and the Agent.
Immediately after installing the Manager and Agent of this software, only the self-signed certificate included with this software is displayed in the list. If this certificate is used, communication is still encrypted, but because it is a self-signed certificate, [Invalid] is displayed in the [Verify Certificate] field. If you want to verify the certificate when performing communication between the Manager and Agent, it is necessary to use an authorized certificate.
If a certificate other than a self-signed certificate is registered on the computer where the Manager or the Agent of this software is running, and the Manager or the Agent is configured to use that certificate, then the certificate will be displayed in the list.
[Online Manual Settings]
Select the target region for the manual displayed when [Online Manual] is selected in the [Help] menu.