Netop Remote Control User's Guide

Total Page:16

File Type:pdf, Size:1020Kb

Netop Remote Control User's Guide USER'S GUIDE 17 May 2017 Netop Remote Control User's Guide Copyright© 1981-2017 Netop Business Solutions A/S. All Rights Reserved. Portions used under license from third parties. Please send any comments to: Netop Business Solutions A/S Bregnerodvej 127 DK-3460 Birkerod Denmark E-mail: [email protected] Internet: www.netop.com Netop™ is a trademark of Netop Business Solutions A/S. All other products mentioned in this document are trademarks of their respective manufacturers. Netop Business Solutions A/S denies any and all responsibility for damages caused directly or indirectly as a result of using this document. The content of this document is subject to change without notice. Netop Business Solutions A/S retains the copyright to this document. The document is optimized for double-sided printing. 17 May 2017 Netop Remote Control User's Guide Contents 1 Overview ....................................................................................................................................................4 1.1 Remote Control modules ...............................................................................................................................................4 1.2 Security ...........................................................................................................................................4 1.3 Communication profiles ...............................................................................................................................................5 2 Managing Hosts ........................................................................................................................................6 2.1 Start and end a remote control se.s..s..io..n.. ......................................................................................................................................6 2.2 Use Netop phonebook to manage .c..o..n..n..e..c..t.i.o..n..s.. ..........................................................................................................................7 2.2.1 Edit phonebook records ......................................................................................................................................8 2.2.2 Protect your phonebook reco..r..d.. .f.il.e..s.. .w...i.t.h.. .a.. .p..a..s..s..w..o..r..d.. ..........................................................9 2.2.3 Organize your phonebook ......................................................................................................................................9 2.2.4 Export and import phonebo.o..k.. .d..a..t.a.. .........................................................................................................................10 2.2.5 Add a phonebook reference.. ....................................................................................................................................11 2.2.6 Use Remote Desktop from. .t.h..e.. .N...e..t.o..p.. .p..h..o..n..e..b..o..o..k. ..................................................................................................11 2.3 Keyboard, mouse and display du.r..in..g.. .r..e..m...o..t.e.. .c..o..n..t.r.o..l. ...............................................................................................................11 2.4 Generate a Host inventory ...............................................................................................................................................12 2.4.1 Process Host computer inv..e..n..t.o..r.y.. .i.n..f.o..r.m...a..t.i.o..n.. .......................................................................................................12 2.5 Monitor Hosts ................................................................................................................................13 2.6 Execute system control comman..d..s.. .o..n.. .a.. .H...o..s..t. .c..o..m...p..u..t.e..r. ........................................................................................................14 2.7 Perform Remote Management ta..s..k.s.. ........................................................................................................................................15 2.7.1 Management pane ...............................................................................................................15 2.7.2 Disk Drives ......................................................................................................................................16 2.7.3 Event Viewer ......................................................................................................................................16 2.7.4 Task Manager ......................................................................................................................17 2.7.5 Registry ......................................................................................................................................17 2.7.6 Services ......................................................................................................................................17 2.7.7 Shared Folders ....................................................................................................................19 2.7.8 Inventory ......................................................................................................................................20 2.7.9 Command Console ......................................................................................................................................20 2.7.10 System Control ......................................................................................................................................20 2.7.11 Local Users and Groups ......................................................................................................................................20 2.7.12 Integrate third party applic.a..t.i.o..n..s.. ...........................................................................................................................22 2.7.13 Netop Sessions ......................................................................................................................................23 2.8 Create and run a script .................................................................................................................24 2.9 Use Intel vPro from Netop Remo.t.e.. .C...o..n..t.r.o..l. ..................................................................................26 2.9.1 Log on to the vPro Console.. .................................................................................................27 2.9.2 vPro Console .......................................................................................................................29 2.10 Tunnel ...............................................................................................................................................31 2.10.1 Predefine local ports for th..e.. .t.u..n..n..e..l. .......................................................................................................................31 2.10.2 Open tunnel session ......................................................................................................................................32 2.11 Run a remote program ...............................................................................................................................................33 2.12 Transfer files ...............................................................................................................................34 2.13 Log events ...............................................................................................................................................36 2.14 Record sessions ...............................................................................................................................................37 2.14.1 Play back session record.in..g..s.. ...............................................................................................................................37 2.15 Use a skin to see the Host butto..n.. .l.a..y.o..u..t. .................................................................................................................................38 17 May 2017 1 Netop Remote Control User's Guide 2.16 Multisession Support ...............................................................................................................................................38 3 Getting remote support ....................................................................................................................................................39 3.1 Request help ...............................................................................................................................................39 3.2 Notification ...............................................................................................................................................39 3.3 Communicate with Guest users ...............................................................................................................................................40 3.4 End a remote control session fro.m.... .a.. .H..o..s..t. .c..o..m...p..u..t.e..r.. ..................................................................41 4 Providing remote support ....................................................................................................................................................42 4.1 Set up Help Request on Guest a.n..d.. .H..o..s..t. ..................................................................................................................................42
Recommended publications
  • The Application Usage and Risk Report an Analysis of End User Application Trends in the Enterprise
    The Application Usage and Risk Report An Analysis of End User Application Trends in the Enterprise 8th Edition, December 2011 Palo Alto Networks 3300 Olcott Street Santa Clara, CA 94089 www.paloaltonetworks.com Table of Contents Executive Summary ........................................................................................................ 3 Demographics ............................................................................................................................................. 4 Social Networking Use Becomes More Active ................................................................ 5 Facebook Applications Bandwidth Consumption Triples .......................................................................... 5 Twitter Bandwidth Consumption Increases 7-Fold ................................................................................... 6 Some Perspective On Bandwidth Consumption .................................................................................... 7 Managing the Risks .................................................................................................................................... 7 Browser-based Filesharing: Work vs. Entertainment .................................................... 8 Infrastructure- or Productivity-Oriented Browser-based Filesharing ..................................................... 9 Entertainment Oriented Browser-based Filesharing .............................................................................. 10 Comparing Frequency and Volume of Use
    [Show full text]
  • Remote Process Control Over the Internet
    Session 1520 Remote Process Control over the Internet Mark Smith Purdue University North Central Abstract This paper presents remote process control over the Internet using remote-control computing software. Remote-control computing software allows you to connect to remote computers from your computer and control those systems. You can monitor and control attached system processes, provide problem solving assistance, upload and download files, and even change system parameters. This paper describes what remote-control computing is, who the major players in the industry are, and how it can be used to monitor and control remote processes. A case study of remote-control computing software in operation is also presented, describing how one off-the-shelf package was setup to monitor and control a plant floor production system. Introduction Networking technologies, and especially the Internet, have become a major component of application systems. As we teach the design and implementation of process control systems in the Engineering curriculum, we must recognize that these systems will require capabilities for control and support from remote locations. For example, the need for remote control may be driven by the high cost of a particular process. The Oak Ridge National Laboratory uses remote process control at its High Temperature Materials Laboratory to allow researches from across the country to use a million-dollar electron microscope1. Even when control of the process is not required across the country, there are times when it is helpful (or even critical) to monitor another node on a LAN. For example, Conquergood describes in his research the ability to monitor and control potentially high voltages from one location by gathering voltage information from PCs doing data acquisition from various plant processes2.
    [Show full text]
  • "IT Tools in the Virtualization of the Software Implementation And
    INFORMATYKA EKONOMICZNA BUSINESS INFORMATICS 1(23) · 2012 ISSN 1507-3858 Iwona Chomiak-Orsa, Wiesława Gryncewicz, Maja Leszczyńska Wrocław University of Economics e-mail: [email protected] IT TOOLS IN THE VIRTUALIZATION OF THE SOFTWARE IMPLEMENTATION AND MAINTENANCE PROCESS Abstract: By implementing modern technological solutions, companies re-organize their activities. The remote software implementation process and then the remote maintenance mean for companies a new approach to gaining competitive advantage. In practice, it gives the opportunity to reduce costs and hence the prices of services. These two processes beco- me also independent of the geographical location of the client and the contractor, which can significantly reduce response time to reported problems and help ensure the higher quality of service. The IT support is needed to efficiently and quickly virtualize software imple- mentation and maintenance process, so the aim of this paper is to present and characterize such IT tools. Key words: virtualization, implementation, maintenance process. 1. Introduction Nowadays we are witnessing that the world has entered the information society era. The basic resources have become information and knowledge obtained from their processing. Digital products and services dominate the market. The availability of the transmission networks and sources of information has become more common and easier, while significantly reducing the costs of this access. Extensive use of IT tools in the economy, government, education and culture as well as in organization and management, has created new opportunities for all market participants and their environment [Steinmueller 2005, pp. 133–152]. By implementing modern technological solutions, companies re-organize their activities not only in the B&C context, but also in relation to other companies through the value-creation chain [Szpringer 2008, pp.
    [Show full text]
  • Netop Remote Control 2 Table of Contents
    User Guide Thursday, January 28, 2021 Netop Remote Control 2 Table of Contents Foreword 0 Part I Overview 5 1 Remote Co..n..t.r..o..l. .M..o..d..u..l.e..s.. ........................................................................................................... 5 2 Security ................................................................................................................................... 6 3 Communic..a..t.i.o..n.. .p..r.o..f.i.l.e..s.. ............................................................................................................ 6 Part II Managing Hosts 8 1 Start and e..n..d.. .a.. .r..e..m...o..t.e.. .c.o..n..t.r..o..l. .s.e..s..s.i.o..n.. ..................................................................................... 8 2 Use Neto.p.. .p..h..o..n..e..b..o..o..k. .t.o.. .m...a..n..a..g..e.. .c..o..n..n..e..c..t.i.o..n..s. ........................................................................ 10 Edit phonebook re..c..o...r.d...s.. ............................................................................................................................................ 11 Protect your phon..e..b..o...o..k.. .r..e..c..o...r.d... .f.i.l.e..s... .w...i.t.h... .a.. .p..a..s..s...w...o..r..d.. ...................................................................................... 11 Organize your pho..n...e..b..o...o..k.. ......................................................................................................................................... 12 Export and import. .p...h..o..n...e..b..o...o..k.
    [Show full text]
  • List of Application Added in ARL #2607
    List of Application added in ARL #2607 Application Name Publisher .NET Framework 19.0 Microsoft .NET Runtime 6 Preview Microsoft .NET SDK 6 Preview Microsoft 3DMark UL 3uTools 2.35 3uTools 4D 17.6 4D 4K Stogram 3.0 OpenMedia ABACUS Studio 8.0 Avolution ABCpdf .NET 11.1 WebSupergoo Software ACQUITY Column Manager 1.7 Waters Acrobat Elements 17.1 Adobe ACT Enterprise Client 2.12 Access Control ACT Enterprise Client 2.3 Access Control ACTEnterprise 2.3 Vanderbilt Actiance Vantage OpenText Actional Agent 9.0 Progress Software Active Directory (AD) Bridge 8.5 Enterprise BeyondTrust Active Directory/LDAP Connector 5.0 Auth0 Active Intelligence Engine 4.4 Attivio ActivePresenter 8.1 Atomi Systems ActivePython 3.8 ActiveState ActivInspire 2.17 Promethean Activity Monitor 4.0 STEALTHbits Technologies Activity Monitor Agent 2.4 STEALTHbits Technologies ActiViz.NET 8.2 Supported Kitware SAS ActiViz.NET 8.2 Trial Kitware SAS ActiViz.NET 9.0 Supported Kitware SAS Acumen Cumulative 8.5 Deltek AD Tidy 2.6 Cjwdev AdAnalytics Adslytic Add-in Express for Microsoft Office and .NET 8.3 Professional Add-in Express Add-in Express for Microsoft Office and .NET 9.4 Premium Add-in Express Adlib PDF 5.1 Enterprise Adlib AdminStudio 2021 Flexera AdminStudio 2021 ZENworks Flexera Advance Design 2020 GRAITEC Advance Design 2021 GRAITEC Advanced SystemCare 14.0 IObit Advertising Editor 11.29 Microsoft Advisor 9.5 Belarc AFP Viewer 7.50 ISIS Papyrus Europe AG Agile Requirements Designer 3.1 Broadcom Alfresco Content Services 6.0 Alfresco Software AltspaceVR 4.1 Microsoft
    [Show full text]
  • Virtualization As an Approach in the Development of IT System Implementation Process
    Proceedings of the Federated Conference on ISBN 978-83-60810-22-4 Computer Science and Information Systems pp. 281–285 Virtualization as an approach in the development of IT system implementation process Iwona Chomiak-Orsa, Wiesława Gryncewicz, Maja Leszczyńska University of Economics ul. Komandorska 118/120, 53-345 Wroclaw, Poland Email: {iwona.chomiak, wieslawa.gryncewicz, maja.leszczynska}@ue.wroc.pl Abstract—Virtual administration of IT system implementa- the recent trend to virtualize the co-operation between the tion processes is now possible in small and micro-companies, provider and the client and employ remote implementation characterized by relative simplicity and marked recurrence of procedures and processes based on large potential of modern business processes. Popularity of such approach to implementa- tion is largely due to the wide availability of IT solutions offer- IT solutions – a trend observed and not yet sufficiently ad- ing remote administration of authorized IT resources. Virtual dressed in professional literature. form of implementation offers significant reduction of both cost and time, compared with traditional approach. Consequently, II.DETERMINANTS OF VIRTUALIZATION OF THE IT SYSTEM it seems reasonable to expect further development of this trend, IMPLEMENTATION PROCESS addressing larger economic entities and servicing more com- plex IT systems. At present, straight majority of companies, especially large and medium-sized, employ consolidated application I. INTRODUCTION suites to service the main areas of their business activities, mainly in the sphere of accounting, personnel and wages, OMPANIES competing on modern markets face in- and sales [4]. Due to good saturation of IT solutions in this creased dynamics of changes, fierce competition and C area, software providers seek to extend their offer to cover the need of making fast decisions.
    [Show full text]
  • Remote Desktop Protocol Free
    Remote Desktop Protocol Free Rene remains additional after Gordan fustigates medially or alien any mermaids. Timmy furnaced frothily? Four-footed Neddie still duffs: rusted and benevolent Hansel glad quite hundredfold but emends her seers flatwise. While the pros of using remote desktop include increased security and eliminating bandwidth issues, it is widely used in the corporates due to the reason that it provides easy accessibility to a computer, or user friendly IMO. Determine how much padding is needed for the nav. There are a plethora of remote software tools in the market and selecting one for your project could be a challenge. Lorem ipsum dolor sit amet consectetur, Firefox or Chrome. What is Bitcoin mining and how can you do it? How does one wipe clean and oil the chain? It focuses on company culture, secure remote access, popularity and what is the impact of it on the organizations using it. Newer versions of RDP are far more secure. Or do the opposite. It provides the same user experience as a local application! It provides functionalities to remotely support customers, we can help set you up with Windows RDP tailored to your needs. Team Viewer is a famous software in Remote Software Innovation industry. URL for your CSS file. Why is Zoho Assist the best alternative to RDP? Remote desktop protocol RDP is any network communications protocol that allows remote management of assets. Which one should be used? PC in order to access it. By using our website, and mobile app. Unfortunately, importing from ADC, you can use a Terminal Server with a web Client.
    [Show full text]
  • List of New Applications Added in ARL #2586
    List of new applications added in ARL #2586 Application Name Publisher NetCmdlets 2016 /n software 1099 Pro 2009 Corporate 1099 Pro 1099 Pro 2020 Enterprise 1099 Pro 1099 Pro 2008 Corporate 1099 Pro 1E Client 5.1 1E SyncBackPro 9.1 2BrightSparks FindOnClick 2.5 2BrightSparks TaxAct 2002 Standard 2nd Story Software Phone System 15.5 3CX Phone System 16.0 3CX 3CXPhone 16.3 3CX Grouper Plus System 2021 3M CoDeSys OPC Server 3.1 3S-Smart Software Solutions 4D 15.0 4D Duplicate Killer 3.4 4Team Disk Drill 4.1 508 Software NotesHolder 2.3 Pro A!K Research Labs LibraryView 1.0 AB Sciex MetabolitePilot 2.0 AB Sciex Advanced Find and Replace 5.2 Abacre Color Picker 2.0 ACA Systems Password Recovery Toolkit 8.2 AccessData Forensic Toolkit 6.0 AccessData Forensic Toolkit 7.0 AccessData Forensic Toolkit 6.3 AccessData Barcode Xpress 7.0 AccuSoft ImageGear 17.2 AccuSoft ImagXpress 13.6 AccuSoft PrizmDoc Server 13.1 AccuSoft PrizmDoc Server 12.3 AccuSoft ACDSee 2.2 ACD Systems ACDSync 1.1 ACD Systems Ace Utilities 6.3 Acelogix Software True Image for Crucial 23. Acronis Acrosync 1.6 Acrosync Zen Client 5.10 Actian Windows Forms Controls 16.1 Actipro Software Opus Composition Server 7.0 ActiveDocs Network Component 4.6 ActiveXperts Multiple Monitors 8.3 Actual Tools Multiple Monitors 8.8 Actual Tools ACUCOBOL-GT 5.2 Acucorp ACUCOBOL-GT 8.0 Acucorp TransMac 12.1 Acute Systems Ultimate Suite for Microsoft Excel 13.2 Add-in Express Ultimate Suite for Microsoft Excel 21.1 Business Add-in Express Ultimate Suite for Microsoft Excel 21.1 Personal Add-in Express
    [Show full text]
  • What Did You Do in School Today Junior? an Analysis of Application Usage on K-12 School Networks
    What Did You Do In School Today Junior? An Analysis of Application Usage on K-12 School Networks March 2012 Palo Alto Networks 3300 Olcott Street Santa Clara, CA 95054 www.paloaltonetworks.com Table of Contents Key Findings ....................................................................................................................................................... 3 Introduction ....................................................................................................................................................... 4 Tools That Enable Circumvention ....................................................................................................................... 5 Encrypted Tunnels: Protection or Evasion? ................................................................................................................ 5 Remote Desktop Applications: What is the Use Case? .............................................................................................. 6 External Proxies: K‐12 Usage is Double Enteprise Usage ........................................................................................... 7 P2P FileSharing: Solution Of Choice For Moving Large Files ................................................................................. 8 Browser‐based Filesharing: Education or Entertainment? ................................................................................... 9 Browser‐based Filesharing use Case: Productivity ..................................................................................................
    [Show full text]
  • Demystifying Africa's Cyber Security Poverty Line
    Demystifying Africa’s Cyber Security Poverty Line Tanzania Chapter The Africa Cyber Immersion Centre is a state-of-the-art research, innovation and training facility that seeks to address Africa’s ongoing and long-term future needs through unique education, training, research, and practical applications. For more information Serianu Limited contact: [email protected] http://www.serianu.com Tanzania Cyber Security 3 Report Content Editor’s Note and Acknowledgement Cost of Cyber Crime We are excited to finally publish the 2nd edition of Tanzania We estimate that cyber-attacks cost Tanzanian 4 Cyber Security Report 2017. 54 businesses around $99.5 million a year. Foreword Sector Ranking in 2017 2017 has seen a jump in cyberattacks or cybercrimes. Cyber security is no longer a concern fof the Ransomware, DDoS attacks, data breaches were all financial & banking sectors only. 7 synonymous with 2017. 56 Executive Summary Home Security It is in our own best interests to make sure everyone – from the young to the old, on The global landscape of cyber threats is quickly changing. snapchat, facebook and twitter - know and 9 60 practice basic security habits. Top Trends Africa Cyber Security Framework We analysed incidents that occurred in 2017 and compiled Attackers are now launching increasingly a list of top trends that had a huge impact on the economic sophisticated attacks on everything from and social well-being of organisations and Tanzanian citizens. business critical infrastructure to everyday 13 69 devices such as mobile phones. Top Priorities for 2018 Appendixes 19 We have highlighted key priorities for 2018. 71 Cyber Intelligence Statistics, Analysis, & Trends References We have monitored organisations’ network for malware and cyber threat attacks such as brute-force attacks 25 against the organisation’s servers.
    [Show full text]
  • The Paper Investigates the Role of Remote Working in Export Management, Determining How Virtual Organizations Can Manage Remote Working Effectively
    Texila International Journal of Management Volume 4, Issue 2, Jul 2018 The Paper Investigates the Role of Remote Working in Export Management, Determining How Virtual Organizations can Manage Remote Working Effectively Article by Seun Onakoya Management, Texila American University, Nigeria E-mail: [email protected] Abstract Remote working is becoming a growing trend within all technological & organizational business. However, in Export Management, its growing trend has voiced concerns over the containment of remote working and the determined impact it has on business. Communication continues to involve in Export Management especially, with the explosion of technology has meant that flexible working legislations have been introduced. However, there are managerial personnel who adhere to remote working without determining the effect it has on export performance. There are number of factors that have not been addressed and this article looks to highlight & investigate the impact remote working has on export management, how it can be managed and the influence it has on effectiveness, productivity and sales in export organizations, not to mention from an employee personnel point of view, identifying the positive role remote working may have on employee personnel and whether it develops a positive working environment and determine the attitude towards personnel within Export Management organizations. Because many of these antecedents can be controlled managerially, these findings suggest important ways in which a remote employee's work performance can be enhanced, through the intermediary effect of improved remote work self‐efficacy. The research will be tested with self-efficacy theory and critical research & historical evidence to investigate the global impact remote-working employees have, a type of psychology model that determines the adoptions of positive psychology.
    [Show full text]
  • Remote Support Technology for Small Business
    Rochester Institute of Technology RIT Scholar Works Theses 5-20-2004 Remote support technology for small business Michael Luciano Follow this and additional works at: https://scholarworks.rit.edu/theses Recommended Citation Luciano, Michael, "Remote support technology for small business" (2004). Thesis. Rochester Institute of Technology. Accessed from This Thesis is brought to you for free and open access by RIT Scholar Works. It has been accepted for inclusion in Theses by an authorized administrator of RIT Scholar Works. For more information, please contact [email protected]. @w R000m3:L753 A Remote Service Solution for Small Business By Michael David Luciano Thesis submitted in partial fulfillment of the requirements for the degree of Master of Science in Information Technology Rochester Institute of Technology B. Thomas Golisano College of Computing and Information Sciences 3/1/2004 Rochester Institute of Technology B. Thomas Golisano College of Computing and Information Sciences Master of Science in Information Technology Thesis Approval Form Student Name: Michael David Luciano Thesis Title: Remote Support Technology For Small Business Thesis Committee Name Signature Date Prof. Daryl Johnson Chair J I Luther Troell, Ph.D Committee Member Charlie Border, Ph .D Committee Member Thesis Reproduction Permission Form Rochester Institute of Technology B. Thomas Golisano College of Computing and Information Sciences Master of Science in Information Technology Remote Support Technology For Small Business I, Michael D. Luciano, hereby grant permission to the Wallace Library of the Rochester Institute of Technology to reproduce my thesis in whole or in part. Any reproduction must not be for commercial use or profit. oate:# Signature of Author: _________ Abstract then- Small business is in need of a more efficient solution for managing business' Information Technology support needs.
    [Show full text]