Netop Remote Control User's Guide

Total Page:16

File Type:pdf, Size:1020Kb

Netop Remote Control User's Guide USER'S GUIDE 27 September 2017 Netop Remote Control User's Guide Copyright© 1981-2017 Netop Business Solutions A/S. All Rights Reserved. Portions used under license from third parties. Please send any comments to: Netop Business Solutions A/S Bregnerodvej 127 DK-3460 Birkerod Denmark E-mail: [email protected] Internet: www.netop.com Netop™ is a trademark of Netop Business Solutions A/S. All other products mentioned in this document are trademarks of their respective manufacturers. Netop Business Solutions A/S denies any and all responsibility for damages caused directly or indirectly as a result of using this document. The content of this document is subject to change without notice. Netop Business Solutions A/S retains the copyright to this document. The document is optimized for double-sided printing. 27 September 2017 Netop Remote Control User's Guide Contents 1 Overview ....................................................................................................................................................4 1.1 Remote Control modules ...............................................................................................................................................4 1.2 Security ...........................................................................................................................................4 1.3 Communication profiles ...............................................................................................................................................5 2 Managing Hosts ........................................................................................................................................6 2.1 Start and end a remote control se.s..s..io..n.. ......................................................................................................................................6 2.2 Use Netop phonebook to manage .c..o..n..n..e..c..t.i.o..n..s.. ..........................................................................................................................7 2.2.1 Edit phonebook records ......................................................................................................................................8 2.2.2 Protect your phonebook reco..r..d.. .f.il.e..s.. .w...i.t.h.. .a.. .p..a..s..s..w..o..r..d.. ..........................................................9 2.2.3 Organize your phonebook ......................................................................................................................................9 2.2.4 Export and import phonebo.o..k.. .d..a..t.a.. .........................................................................................................................10 2.2.5 Add a phonebook reference.. ....................................................................................................................................11 2.2.6 Use Remote Desktop from. .t.h..e.. .N...e..t.o..p.. .p..h..o..n..e..b..o..o..k. ..................................................................................................11 2.3 Keyboard, mouse and display du.r..in..g.. .r..e..m...o..t.e.. .c..o..n..t.r.o..l. ...............................................................................................................11 2.4 Generate a Host inventory ...............................................................................................................................................12 2.4.1 Process Host computer inv..e..n..t.o..r.y.. .i.n..f.o..r.m...a..t.i.o..n.. .......................................................................................................12 2.5 Monitor Hosts ................................................................................................................................13 2.6 Execute system control comman..d..s.. .o..n.. .a.. .H...o..s..t. .c..o..m...p..u..t.e..r. ........................................................................................................14 2.7 Perform Remote Management ta..s..k.s.. ........................................................................................................................................15 2.7.1 Management pane ...............................................................................................................15 2.7.2 Disk Drives ......................................................................................................................................16 2.7.3 Event Viewer ......................................................................................................................................16 2.7.4 Task Manager ......................................................................................................................17 2.7.5 Registry ......................................................................................................................................17 2.7.6 Services ......................................................................................................................................17 2.7.7 Shared Folders ....................................................................................................................19 2.7.8 Inventory ......................................................................................................................................20 2.7.9 Command Console ......................................................................................................................................20 2.7.10 System Control ......................................................................................................................................20 2.7.11 Local Users and Groups ......................................................................................................................................20 2.7.12 Integrate third party applic.a..t.i.o..n..s.. ...........................................................................................................................22 2.7.13 Netop Sessions ......................................................................................................................................23 2.8 Create and run a script .................................................................................................................24 2.9 Use Intel vPro from Netop Remo.t.e.. .C...o..n..t.r.o..l. ..................................................................................26 2.9.1 Log on to the vPro Console.. .................................................................................................27 2.9.2 vPro Console .......................................................................................................................29 2.10 Tunnel ...............................................................................................................................................31 2.10.1 Predefine local ports for th..e.. .t.u..n..n..e..l. .......................................................................................................................31 2.10.2 Open tunnel session ......................................................................................................................................32 2.11 Run a remote program ...............................................................................................................................................33 2.12 Transfer files ...............................................................................................................................34 2.13 Log events ...............................................................................................................................................36 2.14 Record sessions ...............................................................................................................................................37 2.14.1 Play back session record.in..g..s.. ...............................................................................................................................37 2.15 Use a skin to see the Host butto..n.. .l.a..y.o..u..t. .................................................................................................................................38 27 September 2017 1 Netop Remote Control User's Guide 2.16 Multisession Support ...............................................................................................................................................38 3 Getting remote support ....................................................................................................................................................39 3.1 Request help ...............................................................................................................................................39 3.2 Notification ...............................................................................................................................................39 3.3 Communicate with Guest users ...............................................................................................................................................40 3.4 End a remote control session fro.m.... .a.. .H..o..s..t. .c..o..m...p..u..t.e..r.. ..................................................................41 4 Providing remote support ....................................................................................................................................................42 4.1 Set up Help Request on Guest a.n..d.. .H..o..s..t. ..................................................................................................................................42
Recommended publications
  • 1 Table of Contents List of Figures
    Table of Contents List of Figures ..................................................................................................................... 4 List of Tables ...................................................................................................................... 5 Chapter 1: Introduction....................................................................................................... 6 1.1 Introduction....................................................................................................................6 1.2 Problem Statement .......................................................................................................12 1.3 Thesis Objective...........................................................................................................12 1.4 Thesis Organization.....................................................................................................14 Chapter 2: Intrusion Detection.......................................................................................... 15 2.1 Introduction..................................................................................................................15 2.2 What is an IDS .............................................................................................................15 2.2.1 The Basic Concepts of Intrusion Detection......................................................16 2.2.2 A Generic Intrusion-Detection System.............................................................17 2.2.3 Characteristics of
    [Show full text]
  • Using Remote Desktop Services with Ifix 1
    Proficy iFIX 6.5 Using Remote Desktop Services GE Digital Proficy Historian and Operations Hub: Data Analysis in Context 1 Proprietary Notice The information contained in this publication is believed to be accurate and reliable. However, General Electric Company assumes no responsibilities for any errors, omissions or inaccuracies. Information contained in the publication is subject to change without notice. No part of this publication may be reproduced in any form, or stored in a database or retrieval system, or transmitted or distributed in any form by any means, electronic, mechanical photocopying, recording or otherwise, without the prior written permission of General Electric Company. Information contained herein is subject to change without notice. © 2021, General Electric Company. All rights reserved. Trademark Notices GE, the GE Monogram, and Predix are either registered trademarks or trademarks of General Electric Company. Microsoft® is a registered trademark of Microsoft Corporation, in the United States and/or other countries. All other trademarks are the property of their respective owners. We want to hear from you. If you have any comments, questions, or suggestions about our documentation, send them to the following email address: [email protected] Table of Contents Using Remote Desktop Services with iFIX 1 Reference Documents 1 Introduction to Remote Desktop Services 2 Using iClientTS 2 Understanding the iFIX and Remote Desktop Services 3 File System Support 5 Where to Find More Information on Remote Desktop Services 5 Getting
    [Show full text]
  • Excerpts of Chapters From
    Excerpts of Chapters from A Practical Guide to Ubuntu Linux® FOURTH EDITION Mark G. Sobell ISBN-13: 978-0-13-392731-3 CopyrightExcerpt © 2015 Mark G. Sobell Upper Saddle River, NJ • Boston • Indianapolis • San Francisco New York • Toronto • Montreal • London • Munich • Paris • Madrid Capetown • Sydney • Tokyo • Singapore • Mexico City Blank Excerpt 3 Step-by-Step Installation 3Chapter3 In This Chapter Objectives Booting Ubuntu and Running a After reading this chapter you should be able to: Live Session. 56 Run a live session and use gnome-disks to view and Automatic Boot Sequence . 56 change disk partitioning Running a Live Session. 59 Install Ubuntu from a live session Installing from a Live Session . 60 Install Ubuntu using the Server Image Installing from the Desktop Modify system behavior using boot parameters Boot Menu . 61Excerpt Modify partitions during installation The ubiquity Graphical Installer. 61 The ubiquity Advanced Partitioning List the requirement and considerations for a dual- Screen. 67 boot configuration Advanced Installation. 71 Modifying Boot Parameters (Options) . 75 debian-installer: The Ubuntu Textual Installer . 78 gnome-disks: The GNOME Disk Utility . 88 Setting Up a Dual-Boot System . 91 5555 56 Chapter 3 Step-by-Step Installation Chapter 2 covered planning the installation of Ubuntu: determining the requirements; planning the layout of the hard disk; obtaining the files you need for the installation, including how to download and burn or write Desktop and Server Images to installa- tion media; and collecting information about the system. This chapter focuses on installing Ubuntu. Frequently the installation is quite simple, especially if you have done a good job of planning.
    [Show full text]
  • Powerview Command Reference
    PowerView Command Reference TRACE32 Online Help TRACE32 Directory TRACE32 Index TRACE32 Documents ...................................................................................................................... PowerView User Interface ............................................................................................................ PowerView Command Reference .............................................................................................1 History ...................................................................................................................................... 12 ABORT ...................................................................................................................................... 13 ABORT Abort driver program 13 AREA ........................................................................................................................................ 14 AREA Message windows 14 AREA.CLEAR Clear area 15 AREA.CLOSE Close output file 15 AREA.Create Create or modify message area 16 AREA.Delete Delete message area 17 AREA.List Display a detailed list off all message areas 18 AREA.OPEN Open output file 20 AREA.PIPE Redirect area to stdout 21 AREA.RESet Reset areas 21 AREA.SAVE Save AREA window contents to file 21 AREA.Select Select area 22 AREA.STDERR Redirect area to stderr 23 AREA.STDOUT Redirect area to stdout 23 AREA.view Display message area in AREA window 24 AutoSTOre ..............................................................................................................................
    [Show full text]
  • Microsoft Active Platform: a Development Platform for Internet-Based Distributed Computing
    Microsoft Active Platform: A Development Platform for Internet-Based Distributed Computing Backgrounder March 19977 Intent on increasing online efficiency while reducing development and training costs, businesses are demanding a single solution for storing, publishing and retrieving information, as well as for running line-of-business applications on internal networks and the Internet. The Microsoft® Active Platform meets this demand by providing a foundation for distributed computing. An integrated, comprehensive set of client and server development technologies, the Active Platform makes it easy for developers to integrate the connectivity of the Internet with the power of the personal computer. The Active Platform is based on the leading standards-based implementation of HTML from Microsoft, open scripting and component architecture. It allows developers to use the same tools and components they know and use today to build powerful applications easily for the Internet and intranets. This comprehensive set of tools and technologies provides a new application development approach across clients and servers using a single component model. By making optimal use of today’s tools and tomorrow’s Internet technologies, the Active Platform enables developers to make the transition into the new paradigm for desktop computing and capitalize on the new opportunities it presents. The Active Platform offers users and administrators a graphically rich, intuitive, easy-to-manage and consistent experience across platforms. Developers benefit from rich services built into the system and a uniform programming model across the client and the server that can be accessed from a consistent, integrated set of tools. Figure1. The Microsoft Active Platform brings information to the desktop from the Internet and intranets under the comprehensive interface of the Active Desktop.
    [Show full text]
  • PATACS Posts Newsletterofthe Potomacareatechnology and Computersociety
    PATACS Posts Newsletterofthe PotomacAreaTechnology and ComputerSociety May 2014 www.patacs.org Page 1 Useful Bits & Pieces Entertaining Web Sites On occasion it can be fun to explore off-beat Web CboyluLmonrrisitn, PRo.toGmaarcsAornea Technology and Computer Society sites. Here are a few sites for your entertainment pleasure: Free Antivirus Software for Apple Computers • See http://www.dumblaws.com/. Did you know that in Virginia “No animal may be Whether to use antivirus software on Apple hunted on Sunday with the exception of computers has been a controversial issue for raccoons, which may be hunted until 2:00 years. Major providers such as Symantec, AM?” Well, now you know. Kaspersky, Panda and Trend-Micro offer products for a fee. In the table below is a list of • See http://www.funnytypos.com/. An amusing some free offerings for Macs. See collection of typos like “world famuos”, “no http://goo.gl/VA1iHz for a comprehensive list of smorking” and “free chicken stips with antivirus software for PCs, Macs, Linux, Unix, purchas”. smartphones, etc. Also search the term • See http://whitewhine.com/. Want to learn “antivirus” in Apple’s App Store for numerous what people are complaining about? For antimalware apps (free and for fee). example, “I hate it when I have money to spend and can’t find anything I want.” Poor baby! • See http://www.craigslist.org/about/best/all for offers voted best by Craiglist readers. For example: “I have 2 dozen goats I need to get rid of. I had no idea raising goats would be this hard. These little ***** keep eating all my wife's flowers and climbing on our **** cars.
    [Show full text]
  • Management Console Reference Guide
    Secure Web Gateway Management Console Reference Guide Release 10.0 • Manual Version 1.01 M86 SECURITY SETUP AND CONFIGURATION GUIDE © 2010 M86 Security All rights reserved. 828 W. Taft Ave., Orange, CA 92865, USA Version 1.01, published November 2010 for SWG software release 10.0 This document may not, in whole or in part, be copied, photo- copied, reproduced, translated, or reduced to any electronic medium or machine readable form without prior written con- sent from M86 Security. Every effort has been made to ensure the accuracy of this document. However, M86 Security makes no warranties with respect to this documentation and disclaims any implied war- ranties of merchantability and fitness for a particular purpose. M86 Security shall not be liable for any error or for incidental or consequential damages in connection with the furnishing, performance, or use of this manual or the examples herein. Due to future enhancements and modifications of this product, the information described in this documentation is subject to change without notice. Trademarks Other product names mentioned in this manual may be trade- marks or registered trademarks of their respective companies and are the sole property of their respective manufacturers. II M86 SECURITY, Management Console Reference Guide CONTENT INTRODUCTION TO THE SECURE WEB GATEWAY MANAGEMENT CONSOLE .................................................................... 1 WORKING WITH THE MANAGEMENT CONSOLE................ 3 Management Console . 3 Main Menu . 4 Using the Management Console . 6 Management Wizard . 10 User Groups Wizard . 11 Log Entry Wizard . 28 DASHBOARD............................................................... 33 Dashboard Console . 33 Functionality. 34 Device Gauges . 35 Performance Graphs . 38 Messages (SNMP). 40 Device Utilization Graphs. 41 USERS ......................................................................
    [Show full text]
  • Kubuntu Desktop Guide
    Kubuntu Desktop Guide Ubuntu Documentation Project <[email protected]> Kubuntu Desktop Guide by Ubuntu Documentation Project <[email protected]> Copyright © 2004, 2005, 2006 Canonical Ltd. and members of the Ubuntu Documentation Project Abstract The Kubuntu Desktop Guide aims to explain to the reader how to configure and use the Kubuntu desktop. Credits and License The following Ubuntu Documentation Team authors maintain this document: • Venkat Raghavan The following people have also have contributed to this document: • Brian Burger • Naaman Campbell • Milo Casagrande • Matthew East • Korky Kathman • Francois LeBlanc • Ken Minardo • Robert Stoffers The Kubuntu Desktop Guide is based on the original work of: • Chua Wen Kiat • Tomas Zijdemans • Abdullah Ramazanoglu • Christoph Haas • Alexander Poslavsky • Enrico Zini • Johnathon Hornbeck • Nick Loeve • Kevin Muligan • Niel Tallim • Matt Galvin • Sean Wheller This document is made available under a dual license strategy that includes the GNU Free Documentation License (GFDL) and the Creative Commons ShareAlike 2.0 License (CC-BY-SA). You are free to modify, extend, and improve the Ubuntu documentation source code under the terms of these licenses. All derivative works must be released under either or both of these licenses. This documentation is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE AS DESCRIBED IN THE DISCLAIMER. Copies of these licenses are available in the appendices section of this book. Online versions can be found at the following URLs: • GNU Free Documentation License [http://www.gnu.org/copyleft/fdl.html] • Attribution-ShareAlike 2.0 [http://creativecommons.org/licenses/by-sa/2.0/] Disclaimer Every effort has been made to ensure that the information compiled in this publication is accurate and correct.
    [Show full text]
  • Fedora 14 User Guide
    Fedora 14 User Guide Using Fedora 14 for common desktop computing tasks Fedora Documentation Project User Guide Fedora 14 User Guide Using Fedora 14 for common desktop computing tasks Edition 1.0 Author Fedora Documentation Project [email protected] Copyright © 2010 Red Hat, Inc. and others. The text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at http://creativecommons.org/licenses/by-sa/3.0/. The original authors of this document, and Red Hat, designate the Fedora Project as the "Attribution Party" for purposes of CC-BY-SA. In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the original version. Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, JBoss, MetaMatrix, Fedora, the Infinity Logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries. For guidelines on the permitted uses of the Fedora trademarks, refer to https://fedoraproject.org/wiki/ Legal:Trademark_guidelines. Linux® is the registered trademark of Linus Torvalds in the United States and other countries. Java® is a registered trademark of Oracle and/or its affiliates. XFS® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries.
    [Show full text]
  • MX-19.2 Users Manual
    MX-19.2 Users Manual v. 20200801 manual AT mxlinux DOT org Ctrl-F = Search this Manual Ctrl+Home = Return to top Table of Contents 1 Introduction...................................................................................................................................4 1.1 About MX Linux................................................................................................................4 1.2 About this Manual..............................................................................................................4 1.3 System requirements..........................................................................................................5 1.4 Support and EOL................................................................................................................6 1.5 Bugs, issues and requests...................................................................................................6 1.6 Migration............................................................................................................................7 1.7 Our positions......................................................................................................................8 1.8 Notes for Translators.............................................................................................................8 2 Installation...................................................................................................................................10 2.1 Introduction......................................................................................................................10
    [Show full text]
  • Download File from Terminal Linux 5 Ways to Open a Terminal in Ubuntu
    download file from terminal linux 5 Ways to Open a Terminal in Ubuntu. Why would one want to use a command-line in Linux? Get to know the reasons and also the ways you can launch the Terminal on your Ubuntu PC. You can use keyboard shortcuts as well as a few GUI ways, as described in this guide. E ven though Ubuntu supports many applications with amazing Graphical User Interfaces (GUI), there are always reasons why users prefer using the Terminal to perform different tasks. Here are several reasons why you might need to use the Ubuntu command-line. Reasons to use command-line on Linux. Linux Terminal gives you access to some of the powerful Linux commands to perform actions you can’t do with GUI applications, for instance, you can even kill frozen GUI using command-line. The ‘apt-get’ package manager lets users install applications quicker by running a set of commands. Terminal is also an essential utility for developers working with different programming languages. It is easier to compile and run programs via the Ubuntu command-line. There are some powerful Linux applications meant to run on the Terminal. Some even require you to configure them in the Terminal. One more reason why the Terminal is useful is that even most solutions you find online concerning the challenges you might face working with Ubuntu, require you to use the Terminal. Ways to open a Terminal on Ubuntu. We will show five ways that you can use to launch the Terminal and carry out your tasks easily.
    [Show full text]
  • LESSON 2 ESSENTIAL COMMANDS Lesson 2: Essential Commands
    LESSON 2 ESSENTIAL COMMANDS Lesson 2: Essential Commands WARNING The Hacker Highschool Project is a learning tool and as with any learning tool there are dangers. Some lessons, if abused, may result in physical injury. Some additional dangers may also exist where there is not enough research on possible effects of emanations from particular technologies. Students using these lessons should be supervised yet encouraged to learn, try, and do. However ISECOM cannot accept responsibility for how any information herein is abused. The following lessons and workbooks are open and publicly available under the following terms and conditions of ISECOM: All works in the Hacker Highschool Project are provided for non-commercial use with elementary school students, junior high school students, and high school students whether in a public institution, private institution, or a part of home-schooling. These materials may not be reproduced for sale in any form. The provision of any class, course, training, or camp with these materials for which a fee is charged is expressly forbidden without a license, including college classes, university classes, trade-school classes, summer or computer camps, and similar. To purchase a license, visit the LICENSE section of the HHS web page at http://www.hackerhighschool.org/licensing.html. The Hacker Highschool Project Project is an open community effort and if you find value in this project, we ask that you support us through the purchase of a license, a donation, or sponsorship. 2 Lesson 2: Essential Commands Table
    [Show full text]