Symantec PcANYWHERE Host & Remote 10.5 for PC

Add to my manuals
154 Pages

advertisement

Symantec PcANYWHERE Host & Remote 10.5 for PC | Manualzz

Symantec pcAnywhere

User’s Guide

Symantec pcAnywhere User’s Guide

The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.

Documentation version 10.5.1

Copyright Notice

Copyright

1995-2002 Symantec Corporation.

All Rights Reserved.

Any technical documentation that is made available by Symantec Corporation is the copyrighted work of Symantec Corporation and is owned by Symantec

Corporation.

NO WARRANTY. The technical documentation is being delivered to you

AS-IS and Symantec Corporation makes no warranty as to its accuracy or use. Any use of the technical documentation or the information contained therein is at the risk of the user. Documentation may include technical or other inaccuracies or typographical errors. Symantec reserves the right to make changes without prior notice.

No part of this publication may be copied without the express written permission of Symantec Corporation, 20330 Stevens Creek Blvd., Cupertino, CA 95014.

Trademarks

Symantec pcAnywhere, Symantec, the Symantec logo, ColorScale, and SpeedSend, are U.S. registered trademarks of Symantec Corporation.

Microsoft, MS, Windows, Windows NT, Word, and the Office logo are either registered trademarks or trademarks of Microsoft Corporation in the U.S. and/or other countries. Printed in the United States of America.

Other product names mentioned in this guide may be trademarks or registered trademarks of their respective companies and are the sole property of their respective manufacturers.

Printed in the United States of America

10 9 8 7 6 5 4 3 2 1

C O N T E N T S

Section 1 Getting started

Chapter 1 Introducing Symantec pcAnywhere

What you can do with pcAnywhere .................................................. 11

How pcAnywhere works ................................................................... 12

Understanding the terms host and remote ................................. 12

Understanding remote control .................................................... 13

How remote control differs from remote networking ............... 13

What’s changed in this version .......................................................... 14

Security enhancements ................................................................ 14

Increased customization .............................................................. 15

Improved performance ................................................................ 16

Removed features ........................................................................ 17

Where to find more information ........................................................ 18

Information on the Symantec Web site ...................................... 18

Information on the pcAnywhere CD .......................................... 18

Using pcAnywhere software wizards ......................................... 19

Chapter 2 Installing Symantec pcAnywhere

Preparing for installation .................................................................... 21

System requirements .................................................................... 22

Choosing an installation option .................................................. 22

If you have a previous version installed .................................... 23

Installing pcAnywhere ........................................................................ 24

Opening pcAnywhere after installation ............................................. 25

Registering pcAnywhere ..................................................................... 25

Updating pcAnywhere ........................................................................ 26

Uninstalling pcAnywhere ................................................................... 26

Chapter 3 Understanding pcAnywhere basics

Choosing a connection method ......................................................... 27

Connecting over the Internet ...................................................... 29

About cable modems ................................................................... 30

About digital subscriber lines ...................................................... 30

About ISDN lines ......................................................................... 30

Making connections ............................................................................ 31

Introducing pcAnywhere Manager .................................................... 32

3

4

Using the remote desktop .................................................................. 33

Using the remote online toolbar ................................................. 34

Printing remotely ......................................................................... 35

Transferring the contents of the Windows clipboard ................ 36

Chatting with other users ............................................................ 37

Improving performance ...................................................................... 37

Issues that affect performance .................................................... 38

Discovering optimum performance settings .............................. 39

Section 2 Getting connected

Chapter 4 Allowing others to control your computer

Managing host connections ................................................................ 43

Creating a new host connection item ......................................... 44

Modifying a host connection item .............................................. 44

Setting up a host computer ................................................................ 45

Selecting the host connection method ....................................... 46

Controlling the host session ........................................................ 47

Protecting the host computer ...................................................... 49

Starting a host session ........................................................................ 50

Waiting for a connection ............................................................. 50

Calling a remote computer .......................................................... 51

Accepting a voice first call .......................................................... 51

Ending a host session ......................................................................... 52

Letting multiple remote users hold a conference ............................. 52

Setting up the conference host ................................................... 53

Starting a conference ................................................................... 54

Chapter 5 Controlling another computer remotely

Setting up a remote connection ......................................................... 55

Configuring direct connections ................................................... 56

Configuring modem or ISDN connections ................................. 57

Configuring network connections .............................................. 58

Including logon information ....................................................... 60

Automatically redialing if the host is busy ................................. 60

Managing remote connection items ................................................... 61

Creating a new remote connection item .................................... 61

Modifying a remote connection item .......................................... 62

Starting a remote control session ....................................................... 62

Connecting to a host computer .................................................. 64

Waiting for a host connection ..................................................... 64

Initiating a voice conversation with host ................................... 65

Connecting to multiple hosts ............................................................. 65

Changing online preferences ............................................................. 66

Recording and replaying sessions ...................................................... 67

Recording a remote control session ........................................... 68

Replaying recorded sessions ....................................................... 69

Saving information from a recorded session .............................. 70

Saving screens ..................................................................................... 71

Ending a session ................................................................................. 71

Chapter 6 Transferring files and folders

Navigating in pcAnywhere File Manager .......................................... 74

Getting to files quickly ................................................................ 75

Tagging files and folders ............................................................. 75

Tagging files ................................................................................. 75

Tagging folders ............................................................................ 76

Tagging by wild card characters ................................................. 76

Managing files and folders ................................................................. 77

Creating new folders ................................................................... 77

Deleting files and folders ............................................................ 77

Renaming files and folders .......................................................... 77

Copying files and folders ............................................................ 78

Comparing folders ....................................................................... 78

Changing file transfer preferences ..................................................... 79

Specifying a start-up location ...................................................... 79

Selecting an overwrite option ..................................................... 80

Increasing file transfer performance ........................................... 80

Changing preferences during a session ...................................... 81

Transferring files ................................................................................. 82

Transferring files during a remote control session .................... 82

Transferring files without starting a remote control session ..... 84

Performing automatic file transfers .................................................... 84

Setting up an AutoTransfer file ................................................... 85

Running an AutoTransfer procedure .......................................... 86

Modifying an AutoTransfer procedure ....................................... 87

Synchronizing and cloning ................................................................. 88

What is synchronization .............................................................. 89

Synchronizing folders .................................................................. 89

Synchronizing by file type ........................................................... 89

What is cloning ............................................................................ 90

Cloning folders ............................................................................. 90

5

6

Section 3 Safeguarding your system and data

Chapter 7 Securing your computer and sessions

Preventing unauthorized access ......................................................... 93

Choosing an authentication method ........................................... 94

Setting up caller accounts ........................................................... 96

Configuring logon security .......................................................... 97

Calling back remote users ........................................................... 99

Limiting access privileges ................................................................... 99

Specifying caller privileges ........................................................ 100

Restricting access to computer drives ....................................... 101

Securing sessions .............................................................................. 102

Protecting your configuration settings ............................................. 103

Making passwords case sensitive .............................................. 103

Protecting your connection items ............................................. 103

Protecting your caller accounts ................................................. 104

Chapter 8 Using encryption to protect data

What is encryption ............................................................................ 105

What are the most common encryption methods .......................... 106

What is symmetric encryption ................................................... 106

What is public-key encryption .................................................. 106

Understanding the trade-offs ............................................................ 107

How pcAnywhere works with encryption ...................................... 107

Using public-key encryption in pcAnywhere .......................... 107

Using symmetric encryption in pcAnywhere ........................... 109

Using pcAnywhere encryption .................................................. 109

Setting up encryption on your computer ........................................ 109

Setting up pcAnywhere or symmetric encryption ................... 109

Setting up public-key encryption .............................................. 110

Chapter 9 Monitoring and recording sessions

Monitoring events in pcAnywhere ................................................... 113

Generating a pcAnywhere log file ............................................ 114

Logging events on Windows NT and Windows 2000 ............. 115

Sending logging information to a central server ...................... 116

Managing log files ............................................................................. 117

Creating an activity log report ................................................... 117

Archiving or deleting logged information ................................ 118

Recording host sessions ................................................................... 118

Section 4 Customizing settings

Chapter 10 Customizing Symantec pcAnywhere options

Viewing or modifying pcAnywhere settings ................................... 123

Configuring host options .................................................................. 125

Controlling host operations ....................................................... 125

Controlling host communications ............................................. 127

Configuring remote options ............................................................. 127

Configuring remote operations ................................................. 128

Controlling remote communications ........................................ 128

Using directory services ................................................................... 129

Chapter 11 Customizing connection devices

Customizing network connections .................................................. 132

Customizing modem connections .................................................... 132

Configuring dialing properties .................................................. 132

Customizing modem settings .................................................... 133

Customizing ISDN connections ........................................................ 134

Customizing European ISDN connections ...................................... 135

Customizing direct connections ....................................................... 136

Configuring parallel LPT connections ....................................... 136

Customizing serial COM port connections ............................... 136

Configuring infrared connections .................................................... 138

Service and support solutions

CD Replacement Form

Index

7

8

G e t t i n g s t a r t e d

Introducing Symantec pcAnywhere

Installing Symantec pcAnywhere

Understanding pcAnywhere basics

10

C H A P T E R

Introducing Symantec pcAnywhere

Whether you are a telecommuter working from home, a business professional who travels frequently, or an information technology (IT) professional who supports other computer users remotely, chances are you will need to access another computer from a remote location. You might be working on a presentation at home and realize you need information from a file on your office computer hard drive, or perhaps you are trying to help a customer in another city with a software problem and need to see what is happening on that person’s computer screen.

Symantec pcAnywhere lets you remotely connect to another computer, open any file or program that you have permission to access, and work as though you are sitting at that computer.

This chapter contains the following:

What you can do with pcAnywhere

How pcAnywhere works

What’s changed in this version

Where to find more information

What you can do with pcAnywhere

Some common uses for pcAnywhere include:

Troubleshooting computer problems

Helpdesk operators, network administrators, and other IT professionals use pcAnywhere to remotely connect to another computer and solve computer problems. pcAnywhere lets you view another person’s

11

Introducing Symantec pcAnywhere

■ computer screen, check and modify settings, and restart the computer—all from your computer.

Supporting and maintaining servers

Network administrators can use pcAnywhere to connect to servers within their organizations and perform routine maintenance, assess performance, and troubleshoot network issues.

Retrieving files from home or office

With pcAnywhere, you can connect to your home or office computer to quickly get the files you need.

Working from a remote location pcAnywhere lets you connect to another computer and perform your work as though you were sitting in front of that computer. You can view and edit files, access network resources, and run programs that you have permission to access. You can also print files located on another computer to your default printer.

How pcAnywhere works

pcAnywhere uses remote control technology to let you connect to another computer or local area network (LAN) and work as though you are sitting in front of the other computer. To make a connection, both computers must be running pcAnywhere. One computer must be configured as a host, and the other computer must be configured as a remote.

If you are a new user, you should understand the difference between a host and a remote before you begin.

Understanding the terms host and remote

The relationship between a host computer and a remote computer is similar to a television set and a remote control device. Using a remote control device, you can adjust the volume, change channels, or turn the television on or off without leaving your chair. Using pcAnywhere, a host computer waits for and accepts connections from remote computers and performs the functions that are requested, much like a television set accepts signals from a remote control device.

Before two computers can connect with each other, one must be configured as a host and the other as a remote. The host computer waits for connections from a remote computer and allows itself to be controlled.

12

How pcAnywhere works

When you configure a host computer, you control who can connect to your computer and what level of access the remote user should have. For example, you can restrict a remote user from restarting your computer.

For more information, see

“Setting up a host computer” on page 45.

The remote computer connects to the host computer and specifies the actions that should be carried out. Although the actual work is performed on the host computer, anything that happens on the host computer screen is displayed on the remote computer screen as well. This exchange between the remote and host computers is called a remote control session.

For more information, see

“Setting up a remote connection” on page 55.

Understanding remote control

Remote control technology lets you connect to a host computer from your remote location and use the host computer as though you are sitting in front of it. If you are connecting to a host computer that is on a network, you can access any file that the host computer has permission to access.

Remote control is faster and more efficient than other forms of remote networking, especially if you need to use a software program on the host computer. When you run a software program during a remote control session, the actual processing is performed on the host computer. Only the input and output information (for example, keyboard, mouse, and screen information) are exchanged between the remote and host computers. For example, if you are using a spreadsheet program to update your monthly expense report, the mathematical computations are performed on the host computer, and only the results of the computations are sent to the remote computer. Because only minimal data needs to be transferred between the two computers, remote control results in faster performance and minimizes the risk of losing data.

How remote control differs from remote networking

Remote networking lets you connect to a network by dialing into a network server, if you are using a modem and do not have the ability to connect to a network directly. It is often referred to as dial-up networking on Windows 9x and Windows ME systems or remote access service (RAS) on Windows NT and Windows 2000 systems.

13

Introducing Symantec pcAnywhere

During a remote networking session, the remote computer works as though it is directly connected to the network. You can access only the files and programs on the network that the network administrator has given you, the remote user, permission to access.

When you run a software program during a remote networking session, the processing occurs on the remote computer. All of the information and data required by the program must be communicated over the telephone line to the remote computer. Even with high-speed modems, telephone lines are much slower than direct LAN connections—especially if you need to access a large file or program.

What’s changed in this version

pcAnywhere includes a number of new features and administrator tools, designed to increase security, optimize performance, and make the software easier to use and to customize.

Security enhancements

pcAnywhere has strengthened its focus on security, to help users protect their computers from unauthorized access and to help network administrators and security professionals identify and prevent security holes.

New security features include:

New authentication methods for Microsoft-based, Novell-based, and

Web-based platforms

The new authentication methods include: Active Directory Service

(ADS), FTP, HTTP, HTTPS, Lightweight Directory Access Protocol

(LDAP), Novell Bindery Service, and Novell Directory Service (NDS).

Host security now requires passwords for logging on to the host

The host user must choose an authentication method and set up caller accounts for remote users or user groups.

The ability to track files and executables opened during a host session, for additional security

Users on Windows NT and Windows 2000 can also track pcAnywhere log events in the Event Viewer.

14

What’s changed in this version

Remote Access Perimeter Scanner (RAPS)

This new administrator tool scans for unsecured hosts on the corporate network and detects the presence of many popular remote access products to identify potential security risks. This tool is available only in the Corporate version of pcAnywhere.

For more information, see the

Symantec pcAnywhere Administrator’s

Guide.

The ability to lock a configuration set to prevent tampering with pcAnywhere configuration files, executables, and registry settings

For more information, see the

Symantec pcAnywhere Administrator’s

Guide.

The ability to protect the security of pcAnywhere configuration, using policy management

Policy management lets administrators choose which user interface items users can view or modify. This feature is available only for

Windows NT and Windows 2000.

Increased customization

pcAnywhere gives administrators more flexibility in customizing pcAnywhere.

New customization features include:

■ pcAnywhere Packager

Using pcAnywhere Packager, administrators can create and deploy custom installation sets to enhance security or performance or reduce the amount of disk space needed to install or run pcAnywhere. This feature is available only for Windows NT and Windows 2000.

Symantec Web Deployment Tool

The Symantec Web Deployment Tool lets administrators deploy pcAnywhere on the Internet or on a corporate intranet.

Pre-configured installation packages

Administrators can install these packages or use them as templates for building their own custom installation packages.

Object linking and embedding (OLE) automation

OLE automation lets administrators write applications to automate certain functions within pcAnywhere.

15

Introducing Symantec pcAnywhere

Improved performance

pcAnywhere’s main window has been modified to make it easier to navigate and differentiate between host and remote modes.

Performance enhancements include:

Optimization Wizard

The Optimization Wizard walks users through the steps of optimizing a connection, highlighting the options that are available for improving performance and informing users of trade-offs between performance and security.

pcAnywhere File Manager enhancements that make it easier to find and select files and folders for file transfer

The Go menu lets you quickly navigate to recently visited files and folders. Tagging features let you quickly select files or folders for file transfer or synchronization. You can also use wild card patterns to tag files and folders.

The ability for ISDN CAPI users to select channel bonding when using the host callback feature

This version also addresses performance issues involving CAPI channel bonding.

16

What’s changed in this version

Removed features

To keep pace with the latest technologies, some features are no longer supported in pcAnywhere. If you are upgrading from a previous version of pcAnywhere, consult this table for guidance.

Removed feature Reason for removal pcA Config and

AWCustom32 pcAnywhere Packager replaces these administrator tools. Packager provides administrators with more flexibility and stronger security options for building and deploying customized installations.

For more information

See the

Symantec pcAnywhere

Administrator’s Guide.

Scripting

Virus scanning pcAnywhere+ for

Tivoli

Gateways

Extended OLE automation replaces the need for scripting. Existing scripting functions are included in the

OLE classes.

To improve performance, pcAnywhere no longer scans for viruses during file transfers.

See the

Symantec pcAnywhere OLE

Automation Guide

installation CD.

on the

Not supported in this version.

If you need to use this feature, install the previous version of pcAnywhere, located on the installation

CD.

No longer supported.

If you do not have an antivirus program, visit the

Symantec Web site

(www.symantec.com/ downloads) to download a trial version.

Online services No longer supported.

If you need to use gateways, install the previous version of pcAnywhere, located on the installation CD.

If you need to use online services, install the previous version of pcAnywhere, located on the installation CD.

17

Introducing Symantec pcAnywhere

Removed feature Reason for removal

Banyan and IPX protocols

No longer supported.

DOS and

Windows 3.X backwards compatibility

No longer supported.

For more information

If you need to use these protocols, install the previous version of pcAnywhere, located on the installation CD.

If you need to connect to a computer that uses one of these operating systems, install the previous version of pcAnywhere, located on the installation CD.

Yahoo! Pager No longer provided.

Where to find more information

In addition to the technical support options that are described in the back of this manual, pcAnywhere includes features designed to assist you in using the software. You can access some of these features, like the online

Help and software wizards, while running pcAnywhere; however, some features are available only on the Symantec pcAnywhere CD.

Information on the Symantec Web site

Check the Symantec Web site (www.symantec.com/pcanywhere) for answers to frequently asked questions, troubleshooting tips, online tutorials, and the latest product information.

Information on the pcAnywhere CD

If you need more technical information, the Symantec pcAnywhere CD includes the

Symantec pcAnywhere Administrator’s Guide.

This document contains information specific to network administrators, IT, and information security (IS) professionals. Refer to this guide for information on advanced procedures.

18

Where to find more information

Using pcAnywhere software wizards

pcAnywhere software wizards help guide you through some of the more complicated tasks.

Software wizard

Data Encryption

Optimization

Helps you For more information, see

Set up data encryption for the host and remote computers.

Determine which settings help you achieve optimum performance.

“Using encryption to protect data” on page 105.

“Improving performance” on page 37.

19

Introducing Symantec pcAnywhere

20

C H A P T E R

Installing Symantec pcAnywhere

Installation procedures might vary, depending on your work environment and which installation option you choose. This chapter focuses on installing the full version of pcAnywhere from the installation CD. If your network administrator has provided a custom installation package, some of the topics discussed in this chapter might not apply to you. When in doubt, contact your system administrator for guidance.

This chapter contains the following:

Preparing for installation

Installing pcAnywhere

Opening pcAnywhere after installation

Registering pcAnywhere

Updating pcAnywhere

Uninstalling pcAnywhere

If you are a network administrator or other IT professional and need assistance with creating, building, and deploying customized installation packages for network installations, consult the

Symantec pcAnywhere

Administrator’s Guide.

Preparing for installation

Before you install pcAnywhere, make sure that your computer meets the system requirements. You should also review the Readme file on the installation CD for any last-minute changes that you might need to know about.

21

Installing Symantec pcAnywhere

System requirements

pcAnywhere runs on Windows 9x, Windows Millennium Edition (ME),

Windows NT, and Windows 2000 and requires, at a minimum, these resources to function properly.

Windows 95/98/NT 4

Pentium or higher microprocessor

32 MB RAM

30 MB available hard disk space

VGA or higher resolution monitor

CD-ROM drive

Windows Millennium Edition

150 MHz Pentium or higher microprocessor

32 MB RAM

30 MB available hard disk space

VGA or higher resolution monitor

CD-ROM drive

Windows 2000

133 MHz Pentium or higher microprocessor

32 MB RAM

30 MB available hard disk space

VGA or higher resolution monitor

CD-ROM drive

Choosing an installation option

During installation, you can choose to install the full version of pcAnywhere or select an option that contains only the functionality that you need. pcAnywhere provides two full installation options: pcAnywhere for the Professional and pcAnywhere for the Individual. Both options contain full host, remote control, and file transfer functionality. However, the Professional installation option also includes the pcAnywhere Packager and option sets functionality.

22

Preparing for installation

For more information, see the

Symantec pcAnywhere Administrator’s

Guide.

If you want to switch between host and remote modes on your computer, install either pcAnywhere for the Professional or pcAnywhere for the

Individual. If you do not need the full product and want to save disk space, choose one of the other options, using this table for guidance.

Installation option pcAnywhere for the

Professional pcAnywhere for the

Individual

Remote Only

Host Only

LAN Host

Explanation

Installs the full version of pcAnywhere, including pcAnywhere Packager and option sets functionality.

Installs full functionality for host, remote, and file transfer operations, but does not include pcAnywhere

Packager or option sets.

Provides remote control and file transfer functionality.

Select this option if you do not want to host connections.

Provides host server functionality, supporting network and modem connections. Select this option if you do not need remote control or file transfer functionality.

Provides host server functionality, supporting network connections only. Select this option if you do not need remote control or file transfer functionality, and do not want to support modem connections.

If you have a previous version installed

You must uninstall previous versions of pcAnywhere before installing this version. pcAnywhere performs this procedure automatically during the installation process. Before removing the previous version, pcAnywhere confirms whether you want to preserve existing configuration data. This configuration data includes host and remote connection items. However, because of the enhanced security features in pcAnywhere, existing caller properties are no longer valid and must be reconfigured.

For more information, see

“Setting up caller accounts” on page 96.

23

Installing Symantec pcAnywhere

Installing pcAnywhere

Follow this procedure when installing pcAnywhere from the installation

CD. You can install pcAnywhere on two computers: a host and a remote, depending on your license agreement.

When installing pcAnywhere from an installation folder on your network, refer to this section for guidance; however, you should follow the instructions provided by your network administrator.

If the installation screen does not appear automatically after you insert the

Symantec pcAnywhere CD, run the setup program manually.

For more information, see

“To run the pcAnywhere setup program manually” on page 25.

6

7

4

5

8

9

To install Symantec pcAnywhere

1

Insert the Symantec pcAnywhere CD into the CD-ROM drive.

2

On the pcAnywhere installation screen, click

Install pcAnywhere

10.5

.

3 On the installation options screen, select the type of installation that you want to perform.

For more information, see

“Choosing an installation option” on page 22.

In the Welcome panel, click

Next

.

Accept the terms of the license agreement, then click

Next

.

In the Customer Information dialog box, type a user name.

Type an organization name.

10

11

Click

Next

.

Do one of the following:

Click

Typical

to install pcAnywhere using the program default settings.

Click

Custom

to select a different program folder location or choose which components you want to install.

Click

Next

.

Follow the instructions in the wizard for the type of installation selected.

When the installation is complete, restart your computer.

24

Opening pcAnywhere after installation

If the installation screen does not appear automatically after you insert the pcAnywhere installation CD, manually run the setup program, then continue with the installation procedures.

4

5

2

3

To run the pcAnywhere setup program manually

1

Insert the Symantec pcAnywhere CD into the CD-ROM drive.

On the Windows taskbar, click

Start > Run

.

Type

<CD-ROM drive letter>:\setup.exe

.

For example:

D:\setup.exe

Click

OK

.

Install pcAnywhere.

For more information, see

“To install Symantec pcAnywhere” on page 24.

Opening pcAnywhere after installation

Symantec pcAnywhere is installed in the Windows Program Files directory and is listed on the Windows taskbar.

To open Symantec pcAnywhere

On the Windows taskbar, click

Start > Programs > Symantec pcAnywhere

.

pcAnywhere opens, displaying the pcAnywhere Manager window.

For more information, see

“Introducing pcAnywhere Manager” on page 32.

Registering pcAnywhere

Register your copy of pcAnywhere to receive future product announcements and other notices and updates. If you skipped registration during the installation, you can register later.

To register your copy of pcAnywhere

1

On the Windows taskbar, click

Start > Programs > Symantec pcAnywhere

.

25

Installing Symantec pcAnywhere

2

3

In the pcAnywhere Manager window, click

Help > Online

Registration

.

Follow the on-screen instructions.

Updating pcAnywhere

You can receive software updates associated with your version of pcAnywhere by connecting to the Symantec LiveUpdate server and selecting the updates that you want to install.

To get pcAnywhere updates from Symantec

1

On the Windows taskbar, click

Start > Programs > Symantec pcAnywhere

.

2

3

In the pcAnywhere Manager window, click

Help > LiveUpdate

.

Follow the on-screen instructions.

Uninstalling pcAnywhere

You can uninstall pcAnywhere using the Add/Remove Programs option in

Windows. Once the removal process begins, you cannot cancel the action.

7

8

5

6

3

4

1

2

9

10

To uninstall pcAnywhere

On the Windows taskbar, click

Start > Settings > Control Panel

.

Double-click

Add/Remove Programs

.

In the list of installed programs, click

Click

Add/Remove

.

Symantec pcAnywhere

On the Symantec pcAnywhere Setup window, click

Next

.

On the Program Maintenance dialog box, click

Click

Next

.

Click

Finish

to exit the wizard.

Restart your computer.

Remove

On the Remove the Program dialog box, click

Remove

.

.

.

26

C H A P T E R

Understanding pcAnywhere basics

If you are new to pcAnywhere, use this chapter for basic information on getting started. Experienced users can also use this chapter for tips on improving pcAnywhere performance.

This chapter contains the following:

Choosing a connection method

Making connections

Introducing pcAnywhere Manager

Using the remote desktop

Improving performance

Choosing a connection method

pcAnywhere supports three types of connections: direct, modem, and network. The connection method you choose depends on the remote and host environments. If the host and remote computers are in close proximity, you can connect them directly, using a cable that is appropriate for the port. For example, you set up a direct connection between a laptop computer and an office computer.

Connection devices are the interfaces between the host and remote computers and control how data is exchanged. A connection device might be a modem or ISDN, a network protocol, or a port. Both computers must use the same type of interface or connection device to connect. When configuring a remote connection, it is important to know what type of connection device the remote computer uses, as well as what type of connection the host computer can support.

27

Understanding pcAnywhere basics

Use this table for guidance in selecting a connection device.

Scenario Required information

Both the host computer and the remote computer are connected to the same network.

The remote user must know the IP address or computer name of the host.

Neither the remote computer nor the host computer has access to the Internet, but both have a modem or ISDN.

The remote user must know the telephone number of the host modem or ISDN.

Configuration

Both the host computer and the remote computer must configure a TCP/IP,

SPX, or NetBIOS connection.

For more information,

see “Setting up a host computer” on page 45

and “Configuring network connections” on page 58.

Both the host and the remote computers must configure a modem or

ISDN connection.

For more information,

see “Setting up a host computer” on page 45

and “Configuring modem or ISDN connections” on page 57.

28

Choosing a connection method

Scenario Required information Configuration

The remote computer does not have access to the Internet, but has a modem or ISDN. The host computer has access to the Internet, but does not have a modem or

ISDN.

The remote user must have access to a remote access server or virtual provider network (VPN) account.

For more information, see your network administrator.

Both the host and the remote computers must configure a TCP/IP connection.

For more information,

see “Setting up a host computer” on page 45

and “Configuring network connections” on page 58.

Both the host and remote computers are in close proximity.

Both computers must have an available COM or LPT port, and the user must have an appropriate cable.

Both the host and the remote users must configure a direct connection, using the same type of port.

Windows 9x or Windows

ME users can choose an

LPT or COM port.

Windows NT and

Windows 2000 users must choose a COM port.

For more information,

see “Setting up a host computer” on page 45

and “Configuring direct connections” on page 56.

Connecting over the Internet

pcAnywhere lets you connect to a host computer over the Internet, provided that both the host and the remote computers have Internet access. Both the host and the remote computers must have an IP address, which is provided by an Internet service provider.

When connecting to a host computer over the Internet, both the host computer and the remote computer must use TCP/IP. For security reasons, a network administrator might set up a firewall to restrict access to specific

IP addresses. The remote computer cannot connect to any IP address on the other side of the firewall. If you want to connect to a host computer

29

Understanding pcAnywhere basics behind a firewall, contact the network administrator for an access account and configuration instructions.

2

3

To connect to a host computer over the Internet

1

The host user must connect to the Internet, then start a TCP/IP host session.

For more information, see

“Starting a host session” on page 50.

The remote user must obtain an IP address from the host user.

On the remote computer, configure a TCP/IP network connection, specifying the IP address of the host and the logon information.

4

For more information, see

“Configuring network connections” on page 58.

On the remote computer, connect to the host computer.

For more information, see

“Starting a remote control session” on page 62.

About cable modems

Unlike traditional modems, which convert analog and digital signals to exchange data over a telephone line, cable modems use Internet protocol to transmit data over a cable television line. Because cable modems use

TCP/IP to transmit data, you must use TCP/IP as the connection device for your connection items. You can also use the default network connection item in pcAnywhere Manager, which is already configured for TCP/IP.

About digital subscriber lines

Digital subscriber lines, such as ADSL or DSL, are high-speed Internet connections offered by an Internet service provider (ISP). You operate as though you are on a network and are assigned an IP address. You must use a network connection to connect to another computer using pcAnywhere.

About ISDN lines

Integrated Services Digital Networks (ISDN) are digital telephone services that can transmit digital and voice data at much faster speeds than traditional modems. If an ISDN device is installed and configured properly on your computer, pcAnywhere automatically detects it and adds it to connection device list. Use this device for ISDN connections, if you are in

30

Making connections

North America. In Europe, you must select the ISDN via CAPI connection device, regardless of whether the name of the ISDN device appears in the connection device list.

Making connections

Before you use pcAnywhere to connect to another computer, transfer files, or let another computer connect to your computer, you must first provide the information needed to make a connection and start or end a session.

This information includes dialing information for modem connections, a network address for network connections, and logon information. This information is saved in the host and remote connection items, which appear as icons in the pcAnywhere Manager window.

To make a connection using pcAnywhere

1

The host user must launch a host session.

2

For more information, see

“Allowing others to control your computer” on page 43.

The remote user must choose a connection device that is compatible with the connection device that the host is using.

3

For more information, see

“Choosing a connection method” on page 27.

The remote user must configure a remote connection item, specifying the information needed to locate and logon to the host computer, then start a session.

For more information, see “Controlling another computer remotely” on page 55.

31

Understanding pcAnywhere basics

Introducing pcAnywhere Manager

pcAnywhere Manager is the main window for pcAnywhere. From pcAnywhere Manager, you can manage your connection items, initiate connections and file transfers, customize user preferences, and more. pcAnywhere action bar

Toolbar

Add host icon

Connection items

The buttons on the pcAnywhere action bar let you switch between host and remote modes, view and edit properties of global options and packages, and exit pcAnywhere.

The toolbar provides quick access to the menu options that are available for the action button that you have selected. You can hide the toolbar or add to it.

Connection items contain the connection information needed to let others connect to your computer (host mode) or connect to another computer

(remote mode). pcAnywhere provides three default connection types: direct, modem, and network, which appear as icons in the pcAnywhere

Manager window.

For more information, see

“Setting up a host computer” on page 45 and

“Setting up a remote connection” on page 55.

32

Using the remote desktop

Using the remote desktop

Once you have established a connection and logged on to the host computer, the remote desktop appears on your computer screen, which displays the host computer screen and the pcAnywhere online toolbar. The online menu and toolbar are available only during a remote control session.

Remote icon

Remote online toolbar

Windows task bar for remote computer

Upon connecting, you can transfer files, have a chat session with the host user, or record your session.

You can access these options on the pcAnywhere online menu.

To access the pcAnywhere online menu

On the left corner of the online menu bar, click the remote control icon.

33

Understanding pcAnywhere basics

Using the remote online toolbar

You also can access shortcuts to many remote online options by clicking the appropriate icon on the toolbar. This table explains what you can access from the remote online toolbar.

Icon Meaning

Change to full screen

Screen scaling

View/modify online options

File transfer

Explanation

Displays the host’s full-screen on the remote computer. This option is available only if both computers are set to the same resolution.

Scales down the host screen to fit in the remote’s window when the host’s screen resolution is higher than the remote’s.

Lets the remote user change display settings during a remote control session.

Opens the pcAnywhere File

Manager window.

Transfer clipboard to or from host

Chat with host operator

Start/stop session recording

Save the current screen

Switch to voice

Lets the remote user copy clipboard contents from the host clipboard to the remote clipboard or vice versa.

Lets the remote and host users communicate by typing a conversation in a chat window.

Records the session activities to a file for later playback.

Saves a screen shot of the session for later viewing.

Suspends the data session to allow a voice conversation over the same phone line without breaking the connection.

34

Using the remote desktop

Icon Meaning Explanation

Send Ctrl+Alt+Del to host On Windows NT, opens the

Windows Task Manager, so that the remote user can switch tasks or log on or off of NT.

Restart host computer Restarts the host computer.

End remote control session Ends the remote control session, returning the pcAnywhere

Manager window.

Encryption level indicator Displays the level of encryption used during the session. The color of the padlock indicates the encryption used. The number of locks increases with the level of security.

Session status indicator Monitors incoming and outgoing data activity, and displays the length of time you are online.

Printing remotely

If you want to print a file located on the host computer to a printer at your location during a remote control session, you must specify your printer information in pcAnywhere. If you do not configure remote printing on your computer, your files are sent to the host computer’s default printer.

When adding a printer, you must have the correct drivers for the printer that you are using. pcAnywhere prompts you for the location of the printer, what port to use, and other configuration information.

To add a remote printer

1

In the pcAnywhere Manager window, click

Tools > Options

.

2

3

4

In the pcAnywhere Options dialog box, click

Remote Printing

.

Click

Add Printer

.

Follow the on-screen instructions.

35

Understanding pcAnywhere basics

Transferring the contents of the Windows clipboard

The Windows clipboard contains information that is cut or copied from another application. During a remote control session, you can transfer text or graphics contained in the host clipboard to the remote, or from the remote clipboard to the host.

For information on using the clipboard, consult the Microsoft Windows documentation.

To transfer the contents of the clipboard

1

On the remote online menu, click

pcAnywhere > Transfer

Clipboard

.

2

3

4

Under Direction, do one of the following:

Click

Transfer the host’s clipboard to your clipboard

.

Click

Transfer your clipboard to the host’s clipboard

.

Under Items to transfer, do any of the following:

Click

Text

to send text only, ignoring any graphics.

Click

Graphics

if the clipboard contains bitmaps that you want to send.

Sending graphics might slow down the speed of the transfer.

Click

OK

.

36

Improving performance

Chatting with other users

During a remote control session, the host and remote user can have a typed conversation in a chat window. Either the host or remote user can initiate a chat. This feature is helpful for sending brief messages or instructions. When you are finished, you can save the text from your chat session in a text file.

2

3

To chat online with another user

1

On the remote or host online menu, click

Chat

.

In the lower portion of the chat window, type your message.

Press

Enter

.

Your messages and the other user’s responses appear in the upper portion of the chat window.

You can save your chat session.

3

4

To save a chat session

1

In the chat window, click

File > Save

.

2

Specify the location where you want to save the file.

Type a file name.

Click

Save

.

To end a chat session

In the chat window, click

File > Exit

.

Improving performance

Even with the advances in remote control technology, controlling another computer over a communications device poses many performance challenges. During a remote control session, you control the computer you are connected to as though you are sitting in front of that computer.

Everything from the host computer’s desktop wallpaper to the movement of your cursor must be transmitted back and forth.

Although pcAnywhere is designed to optimize performance, there are a number of factors that you can control to boost performance.

37

Understanding pcAnywhere basics

Issues that affect performance

The two biggest factors in performance are the speed of your connection and display issues. The more data that needs to be passed back and forth between the computers—especially graphics data—the slower the performance.

Some security settings, such as data encryption, can also affect performance. When configuring a connection, you must balance the need for high performance with the need to protect your data.

For more information about the trade-offs between performance and security, see

“Understanding the trade-offs” on page 107.

Improving connection speed

Make sure you are using the fastest type of connection possible. If you are using a modem, make sure you are using the fastest connection your modem and telephone line can handle. Because dial-up networking and remote access service does not support remote control technology, use a modem connection instead, if possible.

Minimizing overhead

In the Windows operating system, everything you see on your computer screen, from a status bar to a menu, is a graphical user interface. This information is transmitted to the remote computer over the connection device. The more graphics that are displayed on the host computer, the more information that must be sent to the remote computer, which slows performance.

There are several ways to minimize this overhead:

Turn off status bars in applications and on the Windows system tray, including modem lights.

Minimize dialog boxes that you aren’t using and use smaller windows.

Reduce the desktop resolution and number of colors on the display.

Hide the Windows taskbar on the host.

Disable wallpaper, backgrounds, and screen savers on the host.

38

Improving performance

Working more efficiently

When performing operations during a remote control session, there are several ways to improve performance:

Avoid using animation.

Turn off full window drag capability on the host to avoid transmitting each pixel of movement as you drag a window across the computer screen.

Use the Page Up and Page Down keys to scroll through documents.

Disable the scroll wheel on your mouse.

Avoid performing remote control operations when transferring files.

Use toolbars instead of the menu to perform operations and disable tool tips once you are familiar with pcAnywhere.

Discovering optimum performance settings

If you notice problems with performance or want to know what the optimum settings are, pcAnywhere includes an Optimization Wizard to walk you through the performance settings. You must use this wizard before making a connection for the settings to take effect.

4

5

2

3

To start the Optimization Wizard

1 In the pcAnywhere Manager window, click

Wizard

.

On the Introduction panel, click

Next

.

Tools > Optimization

On the ColorScale panel, set the color level for the remote screen.

Lowering the number of colors that are displayed increases performance. The default setting is 256 colors. If a sharper display is more important to you than color, try 4 color. This setting changes the color to gray scale, but provides sharper resolution.

Click

Next

.

On the Resolution Synching panel, check

Reduce Host desktop area to match Remote

.

This option works best if the host computer’s resolution screen is set to a lower level. When you choose this option, your computer’s resolution is set to the same resolution as the host computer only for the remote control session. After you end the session, your default settings are restored.

39

Understanding pcAnywhere basics

6

7

8

9

10

Click

Next

.

Do one of the following:

Click

Disable Host Desktop

to disable the Microsoft Internet

Explorer Active Desktop.

Click

Host Desktop Optimization

to disable the screen saver, desktop wallpaper, and power management options on the host computer.

Click

Next

.

Read through the rest of the panels in the wizard for more information on performance issues.

When you are finished, a summary of your selections appears.

Click

Finish

.

40

G e t t i n g c o n n e c t e d

Allowing others to control your computer

Controlling another computer remotely

Transferring files and folders

42

C H A P T E R

Allowing others to control your computer

As a host, you let authorized remote users connect to your computer and take control of it. The remote user sees your computer screen and can open files or programs that you have given the user permission to access.

In a corporate setting, your system administrator may be responsible for setting up a host server so that people can connect to the network while away from the office. However, there are a number of reasons why you may need to set up your computer as a host. For example, you can set up your office computer as a host, so that your system administrator can remotely fix a problem, or so that you can connect to your office computer when working from home.

This chapter contains the following:

Managing host connections

Setting up a host computer

Starting a host session

Ending a host session

Letting multiple remote users hold a conference

Managing host connections

Host connection items contain the connection and security information that the host requires to let a remote user connect, perform operations, and end a session. These items appear as icons in the pcAnywhere Manager window. You can manage your host connections by creating new connection items that contain unique settings for each type of connection

43

Allowing others to control your computer that the host supports, or by modifying the settings of an existing connection item.

Creating a new host connection item

For more control over your connections, you can create unique connection items to handle connections from specific types of hardware devices or from specific users. For example, if many remote users need to connect to your computer, you can set up a separate connection item for each user that contains a unique password and file access permissions.

For more information, see

“Setting up a host computer” on page 45.

To create a new host connection item

1

In the pcAnywhere Manager window, click

Hosts

.

2

On the File menu, click

New

.

Modifying a host connection item

The settings on the host connection item’s property page are grouped by tabs. This table explains where to find the settings that you need.

Tab

Connection Info

Settings

Callers

Lets you For more information, see

Select the connection device for sessions that use this connection item.

A host can wait for a connection on two separate devices.

“Selecting the host connection method” on page 46.

Control the options for a remote control session, including when to start and end a session and what to do if a remote user loses the connection.

“Controlling the host session” on page 47.

Select a method for verifying that a user has permission to connect to the host, set up logon accounts for individuals or user groups, and specify what level of access the user should have.

“Setting up caller accounts” on page 96 and

“Specifying caller privileges” on page 100.

44

Setting up a host computer

Tab Lets you

Security Options Set security options for connections and logons and data encryption levels for remote control sessions.

For more information, see

“Securing your computer and sessions” on page 93 and

“Using encryption to protect data” on page 105.

Conference

Protect Item

Set up a conference, so that multiple remote users can log on to the host.

Protect the connection item with a password.

“Letting multiple remote users hold a conference” on page 52.

“Protecting your configuration settings” on page 103.

To modify a host connection item

1

In the pcAnywhere Manager window, click

Hosts

.

2

Right-click the connection item that you want to modify, then click

Properties

.

Setting up a host computer

Before remote users can connect to your computer, you must set up your computer to allow the connections. You must specify the connection device, what method to use to ensure that remote users have permission to access your computer, and what to do after the session has ended. You can also prevent others from viewing or inadvertently cancelling your host session.

This information is stored in a host connection item file, which appears as an icon in the pcAnywhere Manager window. pcAnywhere provides three default connection items: direct, modem, and network, each of which contains unique connection and security settings.

For more information, see

“Managing host connections” on page 43.

45

Allowing others to control your computer

Selecting the host connection method

Whether you set up a host to wait for a connection from a remote computer or to initiate a connection to a remote computer, you must specify what type of device your computer uses to handle connections.

You can set up a host to wait for a connection from two different devices.

For example, you can set up your office computer to wait for either a modem connection from your home computer or a direct connection from your laptop computer. A host can accept only one connection at a time.

After establishing a connection on one device, the other device is not available until the session ends.

You can also control the settings of some types of connection devices such as a modem or communications port.

For more information, see

“Customizing connection devices” on page 131.

To select the host connection method

1

In the pcAnywhere Manager window, click

Hosts

.

2 Right-click the connection item that you want to configure, then click

Properties

.

46

Setting up a host computer

3

4

On the Connection Info tab, select up to two connection devices:

For modem connections, select the name of your modem, which is listed at the top of the device list.

For network connections, select the network protocol (TCP/IP, SPX,

NetBIOS) that the host uses.

If you are using a cable modem or digital subscriber line, such as

ADSL or DSL, you must use TCP/IP.

For direct connections, select an available port.

An LPT port is recommended; however, if you are using Windows

NT or Windows 2000, you must select a COM port.

Click

OK

.

If an ISDN device is installed and configured properly on the computer, pcAnywhere adds it to the list of connection devices. ISDN connections are handled differently, depending on your location.

For more information, see

“Customizing ISDN connections” on page 134 or

“Customizing European ISDN connections” on page 135.

To configure an ISDN connection

1

In the pcAnywhere Manager window, click

Hosts

.

2

3

Right-click the connection item that you want to configure, then click

Properties

.

On the Connection Info tab, do one of the following:

In Europe, check ISDN via CAPI.

4

In any other location, select the name of your ISDN device.

Click

OK

.

Controlling the host session

For each host connection item, you can control when to start the host, what to do after ending a session, and how to protect the security of the host during and after a session.

47

Allowing others to control your computer

To set the host startup options

1

In the pcAnywhere Manager window, click

Hosts.

2 Right-click the connection item that you want to configure, then click

Properties

.

48

3 On the Settings tab, select from among the following host start-up options:

Check

Launch With Windows

to automatically start a host session when the host computer is started.

Check

Use Windows Screen Saver

to launch a Windows screen saver whenever the host is waiting for a connection.

Add a password to prevent unauthorized users from cancelling the waiting host.

Check

Run Minimized

to hide the status dialog box.

A host icon appears in the system tray when waiting for a connection.

(NT only) Check

Lock NT Workstation

to prevent unauthorized users from cancelling the waiting host.

(NT only) Check

Run As A Service

if you are launching a host in

Windows NT.

Setting up a host computer

You can also control what to do after an unexpected loss of connection.

Normally, a session ends when either the host or the remote user cancels the session. However, network or equipment problems might cause either the host or the remote to lose a connection. A connection might also be dropped because of a security issue, such as an unauthorized user trying to break in; therefore, it is important to secure the host after a session ends.

You can choose different options for handling an abnormal end of session and a normal end of session.

To secure the host after a session ends

1

In the pcAnywhere Manager window, click

Hosts

.

2

Right-click the connection item that you want to configure, then click

Properties

.

3

4

5

On the Settings tab, do one of the following:

Click

Wait For Anyone

to wait for another connection.

Click

Cancel Host

to prevent other connections.

When configuring security options for an abnormal end of session, select how many minutes to wait before proceeding with the security option.

Check

and secure by

, then do one of the following:

Click

Logoff user

.

Click

Restart host computer

.

(NT only) Click

Click

OK

.

Lock NT Workstation

.

Protecting the host computer

The first line of defense in protecting your computer and network from unauthorized access is to select the strongest method of user authentication that your computer environment can support. User authentication is the method by which a remote user who attempts to connect to your computer is checked against a list of valid users to ensure that the remote user has permission to access your computer. pcAnywhere requires that you select some method of user authentication for a host session. You can further control the level of access a remote user has to your computer once a connection has been established. For instance, you can restrict a remote user’s access to specific files.

49

Allowing others to control your computer

For more information, see

“Securing your computer and sessions” on page 93.

Starting a host session

You can host a remote control session in one of three ways:

Launching a host to wait for connections from authorized remote users

For more information, see

“To wait for a call from a remote computer” on page 51.

Initiating a connection with a remote computer, then allowing the remote user to take control

For more information, see

“To call a remote computer” on page 51.

Accepting a voice first connection over a telephone line, then switching to data mode, using the same connection

For more information, see

“To wait for a voice first call from the remote” on page 52 and

“To make a voice first modem connection to the host” on page 65.

When you start a session, a host icon appears on the system tray on your

Windows desktop. Unless you select security measures to hide the activity on your screen or lock your keyboard and mouse, you can access the host online menu by right-clicking the host icon.

Host online menu

Host icon

Using the host online menu, you can display status information, end a session, and initiate file transfers.

For more information, see

“Ending a host session” on page 52 and

“Transferring files” on page 82.

Waiting for a connection

When you launch a host session, your computer waits for connections from authorized remote users, using the connection device that is selected in the host’s Connection Info property tab. If two devices are selected, the host waits for a call on both devices. However, the host can accept only

50

Starting a host session one type of connection at a time. When a connection is established on one device, the other device is not available until the session ends.

Use this method if the host computer is running unattended, or if you do not need to interact with the remote user. For example, use this method if you want to connect to your office computer from home.

To wait for a call from a remote computer

1

In the pcAnywhere Manager window, click

Hosts

.

2

Double-click the host connection item that you want to run.

Calling a remote computer

The host computer can initiate a connection with a remote computer. The remote computer resembles host behavior in that it must be waiting for the connection. However, unlike a typical host session, after the connection is established, the remote computer controls the activities on the host. Use this method for added security if you do not want remote users to initiate connections with your computer.

To call a remote computer

1

In the pcAnywhere Manager window, click

Hosts

.

2

Right-click the host connection item that uses the same connection device that the remote computer is waiting on, then click

Call

Remote

.

3

Do one of the following:

For dial-up or modem connections, type the telephone number for the remote computer, then click

OK

.

For network connections, type the host name or IP address, then click

OK

.

Once the connection is made, the remote user can take control of the host computer.

Accepting a voice first call

Voice first connections require a modem. The remote and host users have a voice conversation and then switch to data mode, using the same connection. Use this method to save time if you need to speak with the host user over the telephone before starting the remote control session.

51

Allowing others to control your computer

The remote user initiates the call, and the host computer must be waiting for the call.

To wait for a voice first call from the remote

1

In the pcAnywhere Manager window, click

Hosts

.

2

3

Right-click the modem connection item that you want to use, then click

Voice First

.

When you answer a call from the remote user, a dialog box appears on both the host and remote computers.

Click

OK

when you are finished with your conversation.

The remote control session can begin after you both hang up the receiver.

Ending a host session

Either the host or remote can end a session. The security settings that you select on the Settings property tab determine whether the host waits for another connection or is cancelled.

For more information, see

“To secure the host after a session ends” on page 49.

To end a session from the host

On the host online menu, click

End Session

.

Letting multiple remote users hold a conference

Conferencing lets multiple remote users connect to a single host and simultaneously view the host’s activities. For example, you can host a conference to conduct a software training demonstration that can be viewed by any remote user who connects to the host PC.

A conference is basically a remote control session, except that multiple remote users connect to the host at the same time. The first caller can connect using any connection device; however, subsequent callers must use a TCP/IP network connection. The first remote user to establish a connection controls the host. Other users can view the activity on the host screen, but cannot take control of the host.

52

Letting multiple remote users hold a conference

Setting up the conference host

To let multiple remote users connect to your host computer, you must specify the information needed to make the connection. You can start with an existing host connection item or create a new one.

For more information, see

“To create a new host connection item” on page 44.

For more information, see

“Setting up a host computer” on page 45.

To configure a conference host

1

In the pcAnywhere Manager window, click

Hosts

.

2 Right-click the host connection item that you want to use, then click

Properties

.

3

4

On the Conference tab, check

Enable conferencing

.

Select one of the following options:

Obtain IP Address Automatically

Selecting this option lets your network server automatically assign an available Class D IP address. (Conferencing uses a form of communication called multicast, which requires a valid Class D address.)

53

Allowing others to control your computer

5

6

Specify IP Address

Select this option if you know the IP address and want to type it in.

The address must be a valid Class D IP address within the range of

225.1.1.1 through 239.254.254.254.

If you are using routers to increase the broadcast area of the conference, select the number of routers you want to use in the

Allow

Conference Over “x” Routers

list box.

Click

OK

.

Starting a conference

The steps for starting a conference are almost the same as starting a remote control session.

To start a conference

1

2

Configure the computer that will host the conference.

For more information, see

“Letting multiple remote users hold a conference” on page 52.

On the computer that will host the conference, start a host session.

3

4

For more information, see

“Starting a host session” on page 50.

On the remote computer that will control the host computer, start a remote control session.

This computer can connect to the host using any connection method, provided that method is supported by the host.

For more information, see

“Starting a remote control session” on page 62.

On the remote computers that will participate in the conference, connect to the host computer using a TCP/IP network connection.

54

C H A P T E R

Controlling another computer remotely

When you start a remote control session, you are connecting to a host computer and taking control of it. Your computer screen displays exactly what appears on the host’s screen, and you can open any file or program that the host user has given you permission to access.

This chapter contains the following:

Setting up a remote connection

Managing remote connection items

Starting a remote control session

Connecting to multiple hosts

Changing online preferences

Recording and replaying sessions

Saving screens

Ending a session

Setting up a remote connection

Before you can connect to a host computer and start a remote control session, you must specify the information your computer needs to make the connection and log on. You can also specify whether and how often pcAnywhere should attempt to reconnect to a host if the connection fails.

This information is stored in a remote connection item file, which appears as an icon in the pcAnywhere Manager window. pcAnywhere provides three default connection items: direct, modem, and network, each of which

55

Controlling another computer remotely contains unique connection and security settings. You can use these connection items as a starting point, or you can create your own.

For more information, see

“Managing remote connection items” on page 61.

Configuring direct connections

If the computer you want to connect to is nearby, you can connect the two computers directly, using an appropriate cable for your port. A direct connection is typically faster than a modem connection, especially if you want to transfer large files. Direct connections require either a parallel

(LPT) or a serial (COM) port. The one you choose depends on your operating system.

When possible, you should use a parallel port because parallel connections are faster and more efficient. However, some operating systems, such as

Windows NT, do not support parallel connections for data transfer. Before you set up a direct connection, you should know what type of connection your computer can support and which ports are available.

For information about finding an available port on your computer, ask your system administrator or consult your Windows documentation.

To set up a direct connection

1

In the pcAnywhere Manager window, click

Remotes

.

2

3

Right-click the direct connection item that you want to configure, then click

Properties

.

On the Connection Info tab, select an available port, as follows:

4

5

For Windows 9x and Windows ME, select either an LPT parallel port or a COM serial port.

For Windows NT and Windows 2000, select a COM port.

If you want the connection to default to file transfer mode, check

Launch in File Transfer mode

.

Click

OK

.

56

Setting up a remote connection

Configuring modem or ISDN connections

If your modem is installed on your computer when you install pcAnywhere, the modem device is automatically added to the list of devices on the Connection Info tab. Choose this modem for modem connections.

The same is true for ISDN devices, except the device you choose depends on what type of ISDN you have. In Europe, you must choose the ISDN via

CAPI connection device. For other locations, choose the ISDN device that is listed by name in the device list.

To set up a modem or ISDN connection

1

In the pcAnywhere Manager window, click

Remotes

.

2

Right-click the connection item that you want to configure, then click

Properties

.

3

4

5

On the Connection Info tab, do one of the following:

For modem connections, select the name of your modem.

For ISDN connections in Europe, check

ISDN via CAPI

.

For all other ISDN connections, select the name of your ISDN device.

If you want the connection to default to file transfer mode, check

Launch in File Transfer mode

.

Click

OK

.

To connect to a host computer using a modem or ISDN, you must specify the dialing information needed to connect to the host. Depending on your location, this information may be as simple as specifying the area code and telephone number for the host computer. However, some locations require that you dial a special number to get an outside line or use a calling card for long-distance service.

1

2

To use dialing properties for connections

In the pcAnywhere Manager window, click

Remotes

.

Right-click the modem connection item that you want to configure, then click

Properties

.

57

Controlling another computer remotely

6

7

3

4

5

On the Settings tab, click

Use dialing properties and phone number

.

For information about configuring unique dialing properties for your location, such as disabling call waiting and specifying calling card information, see

“Configuring dialing properties” on page 132.

Type the area code of the host computer to which you want to connect.

Type the telephone number of the host computer to which you want to connect.

From the Country Code list, select the country that you are dialing into.

Click

OK

.

You can connect to a host using the dialing properties for your location, or you can ignore the dialing settings and manually specify the dialing information.

To manually enter dialing information

1

In the pcAnywhere Manager window, click

Remotes

.

2

3

Right-click the modem connection item that you want to configure, then click

Properties

.

In the Properties dialog box, click

Settings

.

4

5

6

Click

Use manually entered prefix, area code, and phone number

.

Type the telephone number of the host computer, including any prefix needed to reach an outside line or dial long distance and the area code.

Click

OK

.

Configuring network connections

pcAnywhere supports network connections using TCP/IP, SPX, or

NetBIOS. Most network connections use TCP/IP. If you are using a cable modem or a digital subscriber line, such as ADSL or DSL, you must use

TCP/IP.

If you are not sure what type of network protocol you should use, contact your system administrator.

58

Setting up a remote connection

As an administrator, you can connect to servers on your network to perform maintenance and support. Depending on your environment, you can establish a remote control session with other computers on the network using SPX or NetBIOS.

For more information, see the

Symantec pcAnywhere Administrator’s

Guide.

To select a network connection method

1

In the pcAnywhere Manager window, click

Remotes

.

2

3

Right-click the remote connection item that you want to configure, then click

Properties

on the pop-up menu.

On the Connection Info tab, select one of the following connection devices:

TCP/IP

SPX

4

5

NetBIOS

If you want the connection item to default to file transfer mode, check

Launch in File Transfer mode

.

Click

OK

.

You must specify the information needed to locate the host computer. By default, pcAnywhere requires the IP address or network computer name of the host computer.

In some corporate environments, a network administrator might set up a directory server to manage information about network users and resources.

If so, you can configure pcAnywhere to use the directory service to locate the host computer.

For more information, see the

Symantec pcAnywhere Administrator’s

Guide.

1

2

To connect to a network host or IP address

3

In the pcAnywhere Manager window, click

Remotes

.

Right-click the remote connection item that you want to configure, then click

Properties

.

On the

Settings

tab, click

Network Host PC To Control Or IP

Address

.

59

Controlling another computer remotely

4

5

Type either the network host name or IP address of the computer to which you want to connect.

Click

OK

.

Including logon information

To save a step and avoid having to enter a logon name and password each time you connect to a host, you can include this information in your connection item file. pcAnywhere automatically provides the logon information once you have established a connection.

4

5

6

To include logon information

1

In the pcAnywhere Manager window, click

Remotes

.

2

Right-click the connection item that you want to configure, then click

Properties

.

3

7

On the Settings tab, check

Automatically login to host upon connection

.

Type your logon name.

Type your password.

If you are connecting to a Windows NT or Windows 2000 host and have been assigned to a domain, type your domain name, using the format domain\user.

Click

OK

.

Automatically redialing if the host is busy

Sometimes you are not able to connect to a host computer on the first attempt. A connection might fail because the host is busy, because of a network problem, or for a variety of other reasons that might be resolved by reconnecting. To save time, you can set up a modem or network connection item to redial the host a certain number of times at specific intervals.

To set the redial options

1

2

In the pcAnywhere Manager window, right-click the direct connection item that you want to configure, then click

Properties

.

On the Settings tab, specify the number of times that you want pcAnywhere to attempt to connect to the host after a failed connection.

60

Managing remote connection items

3

4

Specify the number of seconds pcAnywhere should wait between connection attempts.

Click

OK

.

Managing remote connection items

Remote connection items contain the connection and security information needed to remotely connect to a host computer, perform operations, and end a session. These items appear as icons in the pcAnywhere Manager window. You can modify the default connection items, or create your own.

Creating a new remote connection item

For more control over your connections, you can create your own remote connection items that contain unique settings for connecting to different hosts. For example, suppose you need to remotely connect to several different host computers on the same network. Rather than change the connection settings for the network connection item each time you connect to a different host computer, you can create a separate remote connection item that contains the unique IP address and logon information for each host to which you want to connect.

For more information, see

“Setting up a remote connection” on page 55.

1

2

To create a new remote control connection item

In the pcAnywhere Manager window, click

Remotes

.

On the File menu, click

New

.

61

Controlling another computer remotely

Modifying a remote connection item

The settings in the remote connection item’s property page are grouped by tabs. This table explains where to find the settings you need.

Property page

Connection Info

Settings

Lets you

Select the connection device for sessions that use this connection item.

Specify the dialing settings and logon information.

For more information, see

“Setting up a remote connection” on page 55.

“Setting up a remote connection” on page 55.

Automated Tasks

“Performing automatic file transfers” on page 84.

Security Options Set the level of data encryption to use during a remote control session with a host.

“Using encryption to protect data” on page 105.

Protect Item

Set up automated tasks such as automatic file transfers.

Protect the connection item with a password.

“Protecting your configuration settings” on page 103.

1

2

To modify a remote control connection item’s properties

In the pcAnywhere Manager window, click

Remotes

.

Right-click the connection item that you want to modify, then click

Properties

.

Starting a remote control session

Remote control sessions are usually initiated by the remote computer; however, the host can also initiate the session. No matter who initiates the connection, the remote computer controls the session once the connection is established.

62

Remote icon

Starting a remote control session

You can start a remote control session with a host in one of four ways:

Connecting to a host computer in remote control mode

For more information, see

“Connecting to a host computer” on page 64.

The remote computer connects to the host computer in remote control mode. This method of connection is the most common.

Starting a connection in file transfer mode

For more information, see

“Transferring files without starting a remote control session” on page 84.

Waiting for a connection from the host computer

For more information, see

“Waiting for a host connection” on page 64.

Initiating a voice conversation with the host user, using a modem connection

For more information, see

“To wait for a voice first call from the remote” on page 52 and

“To make a voice first modem connection to the host” on page 65.

Once the connection is established, the remote desktop appears on your computer, which displays the host’s computer screen and the remote online toolbar.

Remote online menu

For more information, see

“Using the remote desktop” on page 33.

63

Controlling another computer remotely

Connecting to a host computer

You can connect to a host directly, using a modem, or over a network; however, you can only connect to a host that is waiting for connections on the same type of connection device. For example, if the host is waiting for a modem connection, you must use a modem to connect.

To save time, you can store the information needed to make the connection and log on to the host computer in the remote connection item’s property page. Configuring this information ahead of time is especially useful if you are connecting to a host on a large network. pcAnywhere checks the status of all hosts that are running on the network before completing the connection. On a large network, this check can take some time.

For more information, see

“Setting up a remote connection” on page 55.

For security reasons, you can only connect to hosts that have set up a caller account for you or your user group.

For more information, see

“Setting up caller accounts” on page 96.

To connect to a host computer

1

In the pcAnywhere Manager window, click

Remotes

.

2 Double-click the connection item that you want to use.

Waiting for a host connection

Generally, the remote computer initiates a connection to the host and then takes control. However, for security reasons, the host computer may be configured to allow a remote connection only if the host initiates the connection. If so, you must set up your computer to wait for a call from the host. In effect, the remote computer resembles host behavior in that it waits for a connection. However, unlike a typical host session, after the connection is established, the remote computer controls the activities on the host.

To wait for a call from the host

1

In the pcAnywhere Manager window, click

Remotes

.

2 Right-click the remote control connection item that you want to use, then click

Wait For Connection

.

64

Connecting to multiple hosts

When your computer accepts the connection from the host computer, the remote desktop appears on your computer screen, which displays the host computer screen and the pcAnywhere online toolbar.

Initiating a voice conversation with host

If you are using a modem, you have the option to begin the remote control session as soon as you connect, or to have a voice conversation first and then start the session, using the same connection. Use this method to save time if you need to speak with the host user over the telephone before starting the remote control session.

To have a voice conversation over the modem connection, the host computer must be waiting for a Voice First call.

To make a voice first modem connection to the host

1

In the pcAnywhere Manager window, click

Remotes

.

2

3

Right-click the modem connection item that you want to use, then click

Voice First

.

When the host user answers the call, a dialog box appears on both the host and remote computer screens.

When you are finished with your conversation, click

OK

.

The remote control session can begin after you both hang up the receiver.

Connecting to multiple hosts

Typically, a remote control session involves one host computer and one remote computer. However, you can connect to more than one host computer at a time.

1

2

To connect to multiple hosts

3

4

In the pcAnywhere Manager window, click

Tools > Options

.

On the Remote Operation tab, check

Allow connection to multiple hosts

.

Make a connection to the first host.

For more information, see

“Starting a remote control session” on page 62.

Repeat this procedure for each host to which you want to connect.

65

Controlling another computer remotely

Changing online preferences

After you connect to a host computer, you might find that you need to change a setting. Perhaps the windows on the host’s computer screen are too large and do not fit on your screen. Or, perhaps you want to speed up the performance by reducing the number of colors displayed on your screen.

You can change these settings while you are running a session. Any changes you make affect only the current session and do not affect the configuration of your connection item or your global options.

To change display settings during a remote control session

1

On the remote online menu, click

pcAnywhere > Online Options

.

66

2

Select from among the following display options:

Check

Screen Scaling

to size the host screen to fit on the remote computer’s screen.

Check

Remote Control Toolbar

to display the online toolbar for quick access to online tasks, such as file transfer.

Check

Remote Control System Tray

to display the remote control system tray.

Check

Reduce Host Desktop Area To Match Remote

if you want the host computer to use the same resolution as your computer.

Recording and replaying sessions

3

Check

Host Active Window Tracking

to switch focus to the active window on the host computer.

For example, a dialog box that requires an action from you might appear out of the viewing area on your computer. Because you cannot see the message, you might think the session has locked. By checking this option, you ensure that such dialog messages appear in a visible part of your screen.

If you need to change the default color level during the session, make a selection from the ColorScale list box.

For more information, see

“Discovering optimum performance settings” on page 39.

Click

OK

.

4

If the host user has given you permission to do so, you can prevent others at the host site from viewing your session or inadvertently cancelling the session.

To protect your session

1

On the remote online menu, click

pcAnywhere > Online Options

.

2

3

4

Click

Host Keyboard Locked

to disable the host computer’s keyboard and mouse.

The host user can observe the session, but cannot perform any tasks on the computer. You might want to select this option if the host computer is running unattended.

Click

Host Screen Blanked

to prevent others at the host site from viewing your session.

Click

OK

.

Recording and replaying sessions

It is often helpful to have a recording of a remote control session. For example, as the host user demonstrates a complex procedure, you can record the host screen instead of taking notes. Later, you can replay the recording to review the exact steps.

Either the host or remote user can record a session. However, to record a session, host users must set up the host to start recording automatically as soon as the connection is made. This setting applies globally to all host sessions.

67

Controlling another computer remotely

For more information, see

“Recording host sessions” on page 118.

Remote users can start recording at any point during a remote control session or set up a connection item to automatically record a session upon connection.

Recording a remote control session

You can record a session for later playback at any point during the remote control session or set up your remote connection item to begin recording sessions automatically upon connection. You have the option to save the session in a new record file or to add your recording to the end of an existing file.

To start recording during a session

1

On the remote online menu, click

pcAnywhere > Recording

.

2

Do one of the following:

Choose an existing record file (*.rcd) if you want to add your recording to the end of that file.

3

Specify a file name to create a new record file.

Click

Save

.

Actions you perform on the host computer after this point are recorded in the file.

To record sessions automatically

1

In the pcAnywhere Manager window, click

Remotes

.

2

3

Right-click the connection that you want to use, then click

Properties

.

On the Automated Tasks tab, check

Record session in file for later playback

.

4

5

Type a name and path for the file.

Click

OK

.

Recording starts immediately after you connect to the host computer.

To stop recording without ending the session

On the remote online menu, click

pcAnywhere > Recording

.

68

Recording and replaying sessions

Replaying recorded sessions

Recorded sessions are saved as .rcd files in the pcAnywhere directory, unless you specify another file location. Sessions are played back in a replay window, which shows the host screen and each action you perform during the recording.

During the replay, you can control the speed, skip to another session, pause, or take a screen shot. You can control these actions from the replay window menu bar or from the Playback Control Panel.

This table explains the actions you can control during the playback, using the Playback Control Panel.

Action Definition

Play Plays the recording from the beginning.

View previous session Go to the beginning of the previous session. This button only works if the file contains more than one recorded session.

View next session

Stop

Pause

Go to the beginning of the next session. This button only works if the file contains more than one recorded session.

Ends the playback and returns you to the pcAnywhere

Manager window.

Pauses the playback. You must pause the playback to take a screen shot or save that part of the session in a separate file. Click again to resume.

Speed Controls the speed of the playback. Move the slide bar to the right to speed up the play back or to the left to slow it down.

69

Controlling another computer remotely

Action

Save Screen

Save Session

Definition

Lets you save a picture of the screen in a .scn file. You must pause the replay before you can take a screen shot.

Lets you save the session as a binary file.

If your file contains more than one session, you can specify which session you want to view first. By default, replay starts from the first session. You can also specify whether you want to stop the replay between sessions or whether you want to repeat the playback.

To play back recorded sessions

1

In the pcAnywhere Manager window, click

Tools > Playback

Sessions/Screens

.

2

3

Select the recorded file (*.rcd) that you want to view.

Click

Open

.

4

5

Specify the playback options.

You can change these preferences during the replay, using the

Playback Control Panel.

Click

OK

.

The replay window appears on your screen and begins replaying the recorded session.

To exit the replay window

On the File menu of the replay window, click

Exit

.

Saving information from a recorded session

You have two options for saving information from a recorded session: saving the recorded session as a raw binary file or taking a screen shot of a displayed screen.

To save a screen or a session

1

During the replay, on the Playback Control Panel, click

Pause

.

2

Do one of the following:

Click

Save Screen

to save a snapshot of the displayed screen.

Click

Save Session

to save the session as a raw binary file.

70

Saving screens

Saving screens

Capturing the contents of a screen during a session is like taking a snapshot with a camera. pcAnywhere stores screen shots in a .scn file in the pcAnywhere directory, so you can view them later. You have the option to save the screen shot in a new file or add it to an existing screen file.

To save session screens

1

On the remote online menu, click

pcAnywhere > Save Screen

.

2

Do one of the following:

Choose an existing screen file (*.scn) if you want to add your screen shot to the end of that file.

3

Specify a file name to create a new screen file.

Click

Open

.

Repeat the above steps for each screen that you want to capture. The screens are saved in the selected file in the order that they are captured.

To view captured screens

1

In the pcAnywhere Manager window, click

Tools > Playback

Sessions/Screens

.

2

3

Select the screen file (.scn) that you want to view.

Click

Open

.

Ending a session

Either the host or remote can end a session. Ending a session returns you to the pcAnywhere Manager window. Whether or not the host is available for another connection is determined by the security settings on the host computer.

To end a remote control session from the remote

On the remote online menu, click

pcAnywhere > End Session

.

If you have permission to restart the host computer, you can choose whether the host should accept other connections or cancel the host by restarting the computer.

71

Controlling another computer remotely

To allow the host to accept another connection

1

From the remote online menu, click

pcAnywhere > End Session

.

2 In the confirmation dialog box, click

Yes

.

72

C H A P T E R

Transferring files and folders

pcAnywhere File Manager lets you quickly navigate to the files and folders you need, transfer files and folders to and from another computer, and synchronize content. You can also set up your computer to automatically transfer files.

This chapter contains the following:

Navigating in pcAnywhere File Manager

Managing files and folders

Changing file transfer preferences

Transferring files

Performing automatic file transfers

Synchronizing and cloning

73

Transferring files and folders

Navigating in pcAnywhere File Manager

The pcAnywhere File Manager window opens when you select the file transfer option on the host or remote online menu or on a remote connection item pop-up menu.

Folder list box

Toolbar

Action bar

The first time you open the pcAnywhere File Manager window, it lists the files and folders under My Computer. You can specify another starting point, as well as other file transfer preferences, in the File Transfer properties page.

For more information, see

“Changing file transfer preferences” on page 79.

In the pcAnywhere File Manager window, the left pane lists the files and folders on your computer. The right pane lists the files and folders on the computer that you are connected to. Located between the two panes is an action bar, which contains shortcut buttons for commonly performed tasks.

pcAnywhere File Manager works much like Windows Explorer. You can sort files by name, type, size, or date and view or hide file details.

74

Navigating in pcAnywhere File Manager

Getting to files quickly

If you know the location of the file you want, you can get there quickly by typing the path name in the folder list box. The six most recent path names are saved in the Go list box, so you can get to your files even faster. This list is dynamic: the most recently typed path name is listed at the top, and older path names are replaced by newer ones. You can maintain a separate

Go list for both the host and remote computers.

Note:

To use this feature, both computers must be running pcAnywhere version 10.0 or above.

To go to a recently visited file location

In either the left or right pane in the pcAnywhere File Manager window, click the down arrow next to Go

,

then select an entry in the list box.

Tagging files and folders

Tagging lets you quickly select files and folders in your directory. This feature is useful if you have a large number of files or folders to transfer.

You can also use wild card characters to tag certain files in your directory, such as all .doc files.

Tagging files

Use this feature to quickly select all files in your folder, so you can transfer them.

To tag all files in a folder

1

2

In the pcAnywhere File Manager window, open the folder that contains the files that you want.

On the Edit menu, click

Tag > Files

.

75

Transferring files and folders

Tagging folders

Use this feature to quickly select all of the folders in your directory, so that you can transfer or synchronize them.

To tag all folders in a directory

1

In the pcAnywhere File Manager window, go to the directory that contains the folders that you want.

2 On the Edit menu, click

Tag > Folders

.

Tagging by wild card characters

If you want to select only certain files in a folder or are unsure of the exact file name, use this feature to select the files that meet your search criteria.

You can use any of the following wild card characters: *, ?, |.

These wild card patterns are stored in the Tag By list box, so you can select the ones you use frequently. If you want to tag several different types of files at once, you can use a string of wild cards. For example, you can enter a string that searches for all .doc, .xls, and .exe files and another string that searches for all .htm and .html files.

To tag files using wild cards

1

In the pcAnywhere File Manager window, open the folder that contains the files that you want.

2

3

On the Edit menu, click

Tag > Tag by

.

Type a wild card pattern.

If you are entering a string of wild cards, use a comma to separate the entries.

For example:

*.doc

*.doc, *.xls, *.exe

*.htm, *.html

76

Managing files and folders

Managing files and folders

pcAnywhere File Manager gives you control over files and folders on both the host and the remote computers, so you can copy, move, and delete files or folders on either computer. You can also create new folders, which is useful if you want to create a special directory for files.

Creating new folders

You can create a new folder for storing files on either the host or remote computer.

To create a new folder

1

In the pcAnywhere File Manager window, select the folder or drive in which you want to create the new folder.

2

3

4

On the File menu, click

New Folder

.

Type the name of the new folder.

Press

Enter

.

Deleting files and folders

You can delete files and folders on either the host or remote computer.

To delete files or folders

1

In the pcAnywhere File Manager window, select the file or folder that you want to delete.

2

3

Press

Delete

.

In the confirmation dialog box, click

Yes

.

Renaming files and folders

You can rename files and folders on either the host or remote computer.

To rename a file or folder

1

2

In the pcAnywhere File Manager window, select the file or folder that you want to rename.

On the File menu, click

Rename

.

77

Transferring files and folders

3

4

Type a new name.

Press

Enter

.

Copying files and folders

You can copy a file or folder from one computer to another.

3

4

To copy files and folders

1

In the pcAnywhere File Manager window, right-click the file or folder that you want to copy, then click

Copy

.

2

Navigate to the location on the other computer where you want to place the copy.

Right-click, then click

Paste

.

In the confirmation dialog box, click

Yes

.

Comparing folders

You can quickly determine how closely the contents of two folders matches by using the Compare Folders feature. For example, you can determine if a file on your computer is more recent than a file on the other computer, or whether you are missing an important file. pcAnywhere compares the contents of the folders on the host and remote computers and highlights any differences. This feature is especially useful if you want to synchronize or clone folders to ensure that you do not copy a file you no longer need or inadvertently delete an important file.

Note that pcAnywhere performs comparisons at the folder level. If you want to compare the contents of subfolders, you need to open each subfolder, then do a comparison.

1

2

3

4

To compare folders

On the pcAnywhere host or remote online menu, click

File Transfer

.

In the pcAnywhere File Manager window, open the folder on your computer that you want to compare with a folder on the other computer.

Open the folder on the other computer.

On the File menu, click

Compare Folders

.

78

Changing file transfer preferences

Changing file transfer preferences

You can specify the default file transfer preferences for all file transfer sessions or change them during a session. Changes you make during a session affect only the current session.

For more information, see

“Changing preferences during a session” on page 81.

Specifying a start-up location

You can choose to let pcAnywhere File Manager remember the location of your most recent file transfer and start from there, or you can choose to start from a specific directory. This setting applies globally for all file transfers. If the folder you specify no longer exists or cannot be found, pcAnywhere File Manager starts from My Computer.

To choose a start-up location

1

In the pcAnywhere Manager window, click

Tools > Options

.

2 On the File Transfer tab, do one of the following:

Click

Previous location

.

Click

Specified folder,

then type the path to the folder.

3

Click

OK

.

79

Transferring files and folders

Selecting an overwrite option

By default, pcAnywhere prompts you for confirmation before performing an action that might result in data loss, such as replacing an older file with a newer one. However, you might want to change this setting if you plan to perform an automatic file transfer and will not be available to respond to a confirmation prompt.

2

3

To select an overwrite option

1

In the pcAnywhere Manager window, click

Tools > Options

.

4

Click

File Transfer

.

In the Destination File list, select the overwrite option that you want to use if a file with the same name already exists in the destination directory.

Click

OK

.

Increasing file transfer performance

pcAnywhere is configured with optimum settings for file transfer, but if you notice a difference in speed or performance, you might want to check those settings. Any settings you change during a session affect only that session.

1

2

To increase file transfer performance

In the pcAnywhere File Manager window, click

Tools > Options

.

On the File Transfer tab, do one of the following:

Check

Use Compression

to compress files during file transfer.

Selecting this option can speed up the file transfer if you are transferring a large text file that has not been compressed by some other means, such as a zip tool.

Check

Allow crash recovery

for added protection in case the file transfer is interrupted.

When you are able to continue with the file transfer, pcAnywhere remembers where it left off and transmits only the portion of the file that was not sent, instead of resending the entire file.

Check

Use SpeedSend

to compare the contents of files with duplicate file names in the source and destination directories and transfer only the portions of the source file that differ.

80

Changing file transfer preferences

3

4

Check

Pause remote control to maximize file transfer performance

, if you want to perform file transfers during a remote control session.

Selecting this option pauses the remote control session to give full bandwidth to the file transfer, thus improving speed.

Click

OK

.

Changing preferences during a session

You can control some file transfer preferences, such as whether you want to receive a confirmation prompt before certain actions are performed, while you are connected to another computer.

You can also change settings to increase performance, before you transfer files.

For more information, see

“Increasing file transfer performance” on page 80.

2

3

To change file transfer preferences

1

On the pcAnywhere host or remote online menu, click

File Transfer

.

In the pcAnywhere File Manager window, click

Tools > Options

.

In the Destination File list, select the overwrite option you want to use if a file with the same name already exists in the destination directory.

By default, pcAnywhere confirms whether you want to overwrite the file.

81

Transferring files and folders

4

5

6

Select whether you want to receive a confirmation prompt for the following actions:

Check

Transfer, Move

if you want to receive a confirmation dialog box before transferring or moving a file or folder.

Check

Synchronize

if you want to receive a confirmation dialog box before synchronizing a file or folder.

Check

Include Subfolders In All Operations

if you want the options you have selected to apply to subfolders as well.

Click

OK

.

Transferring files

Either the host or remote user can transfer files during a remote control session. The remote user also has the option to transfer files to a host computer without starting a remote control session.

Selecting the file transfer option opens the pcAnywhere File Manager window. Using the pcAnywhere File Manager window, you can quickly find the files and folders that you need and specify where to put them.

See

“Navigating in pcAnywhere File Manager” on page 74 for information.

Transferring files during a remote control session

During a remote control session, either the host or the remote user can initiate a file transfer. When initiating a file transfer, host users can decide whether to control the action or to let the remote user take control.

Both computers must be connected using pcAnywhere.

For more information, see

“Starting a remote control session” on page 62

and

“Starting a host session” on page 50.

Transferring files from a remote computer

As a remote user, you can transfer files from your computer to the host or from the host to your computer during a remote control session.

82

Transferring files

4

5

To start a file transfer from a remote computer

1

On the remote online menu, click

pcAnywhere > File Transfer

.

2

3

In the either the left or right pane of the pcAnywhere File Manager window, open the folder in which you want to place the files.

In the opposite pane, select the files or folders that you want to transfer.

On the File menu, click

Transfer

.

In the confirmation dialog box, click

Yes

.

Transferring files from a host computer

As a host user, you can transfer files from the host computer to the remote or from the remote to the host computer during a remote control session. A dialog box appears on the remote computer, which provides status information and the option to cancel the file transfer.

To start a file transfer from a host computer

1

On the host online menu, click

File Transfer > Controlled by Host

.

2

3

4

5

In the either the left or right pane of the pcAnywhere File Manager window, open the folder in which you want to place the files.

In the opposite pane, select the files or folders that you want to transfer.

On the File menu, click

Transfer

.

In the confirmation dialog box, click

Yes

.

Letting the remote user control the file transfer

During a remote control session, the host user can give control of the file transfer to the remote user.

To let a remote user take control of the file transfer

On the host online menu, click

File Transfer > Controlled by

Remote

.

The pcAnywhere File Manager window appears on the remote computer.

83

Transferring files and folders

Transferring files without starting a remote control session

You can transfer files between a remote computer and a host computer without starting a remote control session. The host computer must be waiting for a connection on the same connection device that the remote is using. When you are finished, end your session or switch to remote control mode.

5

6

To transfer files without remote control

1

In the pcAnywhere Manager window, click

Remotes

.

2

3

4

Right-click the connection item that contains the connection settings for the host computer that you want to connect to, then click

Start File

Transfer

.

In the either the left or right pane of the pcAnywhere File Manager window, open the folder in which you want to place the files.

In the opposite pane, select the files or folders that you want to transfer.

On the File menu, click

Transfer

.

In the confirmation dialog box, click

Yes

.

If you want to perform other operations on the host computer, you can switch to remote control mode without starting a new session.

To switch to remote control mode

On the File Manager Action Bar, click

Remote Control

.

The remote desktop appears, displaying the host computer screen and the online toolbar.

Performing automatic file transfers

You can automatically transfer files and folders to and from a host computer or synchronize folders by setting up an AutoTransfer file (.atf) that contains the necessary commands.

Each remote connection item has an associated .atf file that you can modify, or you can create your own file.

84

Performing automatic file transfers

Setting up an AutoTransfer file

pcAnywhere provides a default .atf file for each remote connection item, which you can use to set up an AutoTransfer procedure. You can specify which file transfer operations you want to perform, the location of the files and folders, and what settings to use.

Adding file transfer operations

You can perform more than one operation in an AutoTransfer procedure.

For example, you can set up a procedure to automatically transfer a folder on your office computer hard drive to a folder on your laptop computer, then synchronize the two folders to make sure the contents of both folders match.

To add file transfer operations

1

In the pcAnywhere Manager window, click

Remotes

.

2

3

4

5

Right-click the connection item that you want to configure, then click

Properties

.

On the Automated Tasks tab, select the AutoTransfer file that you want to configure, then click

Properties

.

On the Contents tab, click

Add

.

Do one of the following:

6

7

8

Click

Send to host

to transfer files or folders to the host computer.

Click

Receive from host

to retrieve files or folders from the host computer.

Click

Sync

to synchronize folders on the host and remote computers.

In the Local folder/file text box, type the path to the file or folder located on your computer.

Type the path to the file or folder on the host computer.

Click

OK.

If you want to add more file transfer operations, repeat steps 4 through 8.

85

Transferring files and folders

Setting AutoTransfer preferences

You can run an AutoTransfer procedure using the default preferences specified in the File Transfer properties page, or you can ignore those settings and select preferences that are unique to the AutoTransfer procedure.

For example, if you plan to run an AutoTransfer procedure unattended, you should select a file overwrite preference that does not require confirmation from you. Rather than change this setting in your global options and risk losing data if you forget to change the setting later, you can select a verification option that applies only to your AutoTransfer procedure.

To set preferences for an AutoTransfer procedure

1

In the pcAnywhere Manager window, click

Remotes

.

2

3

Right-click the remote connection item that you want to configure, then click

Properties

.

On the Automated Tasks tab, select the AutoTransfer file that you want to configure, then click

Properties

.

4

5

6

7

8

On the Options tab, specify whether you want to use the default file transfer properties or override those settings.

If you want to override the settings, select which options you want to use.

For more information, see

“Changing file transfer preferences” on page 79.

Check

End session when finished

, if you plan to run this procedure unattended.

If the folder contains subfolders and you want to transfer those files as well, check

Transfer files within subfolders

.

Click

OK

.

Running an AutoTransfer procedure

You can set up an AutoTransfer procedure to run automatically when you start a remote control session, or you can run it manually from pcAnywhere File Manager. You can run only one AutoTransfer procedure at a time.

86

Performing automatic file transfers

Starting AutoTransfer automatically

To save time, set up your AutoTransfer procedure so that it runs automatically each time you log on to the host computer.

1

2

To start AutoTransfer automatically

3

4

In the pcAnywhere Manager window, click

Remotes

.

Right-click the connection item that you want to configure, then click

Properties

.

On the Automated Tasks tab, click

Run this AutoTransfer upon connection

.

Click

OK

.

Running AutoTransfer manually during a session

You can also run an AutoTransfer procedure from pcAnywhere File

Manager while you are connected to the host computer.

The pcAnywhere File Manager window appears when you select the File

Transfer option from the remote online menu or from the remote connection item’s pop-up menu.

For more information, see

“Transferring files” on page 82.

To run an AutoTransfer procedure during a session

In the pcAnywhere File Manager window, click

Tools > AutoTransfer > Run

.

Modifying an AutoTransfer procedure

Each operation listed in the AutoTransfer file represents a file transfer command, which specifies the file transfer action you want to perform and the location of the files. You can change the sequence of these operations or change the settings of an individual operation.

This section focuses on modifying the properties of a procedure in the connection item Automated Tasks property page, but you can also change the properties during a session from pcAnywhere File Manager.

87

Transferring files and folders

Modifying the contents of a procedure

When you run an AutoTransfer procedure, pcAnywhere performs the operations in your .atf file in the order in which they appear. You can change the order of these operations, remove an operation, or add a new one.

1

2

4

5

6

To change the sequence of an AutoTransfer procedure

3

In the pcAnywhere Manager window, click

Remotes

.

Right-click the remote connection item that you want to configure, then click

Properties

.

On the Automated Tasks tab, select the AutoTransfer file that you want to configure, then click

Properties

.

On the Contents tab, select the command that you want to change.

Click

Remove

,

Move Up

, or

Move Down

, as appropriate.

Click

OK

.

Modifying an operation

You can modify an operation so that it performs another function or specify another folder or file location.

To modify an operation

1

In the pcAnywhere Manager window, click

Remotes

.

2

3

Right-click the remote connection item that you want to configure, then click

Properties

.

On the Automated Tasks tab, select the AutoTransfer file that you want to configure, then click

Properties

.

4

5

6

On the Contents tab, click

Modify

.

Make your changes.

Click

OK

.

Synchronizing and cloning

Synchronizing and cloning both help you quickly match the contents between a folder on the host and a folder on the remote computer.

However, they perform this function differently. Synchronization involves a two-way comparison between two folders. Cloning involves a one-way

88

Synchronizing and cloning comparison between two folders. It is important to understand the differences before performing either procedure.

What is synchronization

Synchronization makes the contents of both the host and remote folders identical to each other by adding files. If one folder contains a file that the other folder does not have, the missing file is added to the other folder. If both folders contain a file with the same name, the older version is replaced by the newer version. To avoid confusion, perform a comparison of the two folders before synchronizing.

For more information, see

“Comparing folders” on page 78.

Synchronizing folders

Synchronize folders to ensure that both computers have copies of the most recent files.

To synchronize folders

1

2

In the pcAnywhere File Manager window, select the folder on your computer that you want to synchronize with a folder on the other computer.

Select the folder on the other computer that you want to synchronize with.

3

4

On the File menu, click

Synchronize

.

In the confirmation dialog box, click

Yes

.

Synchronizing by file type

In addition to synchronizing folders, you can synchronize selected files.

For example, you can synchronize only the *.doc files in your directory.

To synchronize by file type

1

2

In the pcAnywhere File Manager window, select the files on your computer that you want to synchronize with files on the other computer.

Select the files on the other computer that you want to synchronize with.

89

Transferring files and folders

3

4

On the File menu, click

Synchronize

.

In the confirmation dialog box, click

Yes.

What is cloning

Unlike synchronization, which makes the contents of two folders match by adding files to both, cloning adds and deletes files in one folder to make it match the contents of the other. Cloning is initiated from one folder, called the source, which is the folder you want to duplicate. The other folder is called the destination folder.

Files and subfolders in the source folder are added to the destination folder if they do not already exist. Duplicate files and subfolders in the destination folder are overwritten, even if they are more recent than the source. If a file or subfolder located in the destination folder does not exist in the source folder, it is removed from the destination folder.

You should exercise caution when cloning folders. To avoid deleting important information, perform a comparison of the two folders first.

For more information, see

“Comparing folders” on page 78.

Cloning folders

Before performing this procedure, perform a comparison of the two folders to avoid losing data. Files and subfolders located in the destination directory that do not exist in the source folder will be deleted. Duplicate files and subfolders in the destination folder will be replaced, even if they are more recent than the files and subfolders in the source.

To clone a folder

1

In the pcAnywhere File Manager window, open the destination folder, where you want to put the duplicated files and subfolders.

2

3

4

Open the source folder that you want to duplicate.

On the File menu, click

Clone

.

In the confirmation dialog box, click

Yes

.

90

S a f e g u a r d i n g y o u r s y s t e m a n d d a t a

Securing your computer and sessions

Using encryption to protect data

Monitoring and recording sessions

92

C H A P T E R

Securing your computer and sessions

Security is a paramount concern when allowing remote access to your computer. When others remotely connect to your computer, they potentially have access to your files, email messages and address book, programs, and computer configuration. If you are connected to your company’s network, they can also access any server, workstation, or other network resources to which you have access.

Symantec pcAnywhere has a number of built-in security features designed to ensure a secure remote computing environment.

This chapter contains the following:

Preventing unauthorized access

Limiting access privileges

Securing sessions

Protecting your configuration settings

Preventing unauthorized access

When you set up a host computer so that others can connect to it, one of your primary concerns should be to protect the host from unauthorized access. pcAnywhere requires that you set up a logon account for users who connect to your computer and select an authentication method to verify their identities.

93

Securing your computer and sessions

Choosing an authentication method

In a corporate environment, your network administrator might use a directory server, like Active Directory Server (ADS) or Novell Directory

Server (NDS), to create and maintain user accounts to control access to the corporate network. These accounts can be for individual users or groups of users. The process of taking a user’s credentials and verifying them against a directory or access list is called authentication.

You must select some method of authentication, regardless of whether you are connected to a network. The authentication method you choose depends on your computing environment. If you are not sure which method to use, contact your network administrator.

pcAnywhere Authentication can be used on any operating system. This method of authentication verifies whether a remote user has permission to connect to the host by checking the list of users and passwords maintained on the local host computer. This method of authentication is the least secure.

This table provides information on the authentication methods available for

Microsoft-based platforms.

Microsoft-based authentication methods

ADS Caller

Authentication

(For Windows

2000 only)

Explanation

Validates a user or group by checking a list stored in an

Active Directory Service.

Microsoft LDAP

Caller

Authentication

Validates a user or group by checking a user list stored in a

Lightweight Directory Access Protocol (LDAP) 3.0 compliant directory service.

NT Caller

Authentication

(For Windows NT and Windows

2000 only)

Validates a user or group by checking a workstation or user domain list.

Windows Caller

Authentication

Validates a user or group by checking a Microsoft

Networking Shared Directory.

94

Preventing unauthorized access

This table provides information on the authentication methods for

Novell-based platforms.

Explanation Novell-based authentication methods

Novell Bindery

Caller

Authentication

NDS Caller

Authentication

Novell LDAP

Caller

Authentication

Validates a user by checking a list stored in a Novell

NetWare Bindery.

Validates a user or group by using a list stored in a Novell

Directory Service.

Validates a user or group by checking a user list stored in an

LDAP 3.0 compliant directory service.

This table explains the Web-based authentication methods that are available.

Explanation Web-based authentication methods

FTP Caller

Authentication

HTTP Caller

Authentication

HTTPS Caller

Authentication

Netscape LDAP

Caller

Authentication

Lets a host that is running on an FTP server validate a user by checking a user list associated with the FTP service. User name and password are sent over the network in clear text.

Lets a host that is running on an HTTP Web server validate a user by checking a user list associated with the HTTP service. User name and password are sent over the network in clear text.

Lets a host that is running on an HTTPS Web server validate a user by checking a list associated with an HTTPS service.

This method is more secure than FTP and HTTP authentication because the user name and password are encrypted before they are sent over the network.

Validates a user by checking a list stored in an LDAP 3.0 compliant directory service.

For more information, see the

Symantec pcAnywhere Administrator’s

Guide.

95

Securing your computer and sessions

Setting up caller accounts

Before you can start a host session and allow others to connect to your computer, you must set up a caller account that specifies the logon information and what method you want to use to identify whether a person has permission to connect. This information is controlled in the

Callers property page. pcAnywhere requires that you select some method of authentication for each host connection item.

For more information, see

“Choosing an authentication method” on page 94.

To add a caller

1

In the pcAnywhere Manager window, click

Hosts

.

2

3

Right-click the connection item you want to configure, then click

Properties

.

On the Callers tab, select an authentication type from the list box.

96

Preventing unauthorized access

4

5

In the caller list area, right-click, then click

Add

.

On the Identification tab, specify the identification information for the caller.

6

The information you need to specify will vary, depending on which authentication method you selected. Select one of the following:

For Windows-based authentication methods, select a computer or domain name, then select a valid user or group name.

For ADS, NDS, or LDAP authentication, browse the directory for your user or group name.

If you are using Novell Bindery authentication, you must specify a logon server and a valid user name.

For Web-based authentication methods, specify a server name and the logon information for an individual user.

For pcAnywhere authentication, specify a user name and password.

Click

OK

in both dialog boxes.

Configuring logon security

The connection and logon options enable you to control the level of security for connections and remote access. For example, you can control how many times a remote user can enter the wrong password before being locked out.

97

Securing your computer and sessions

To configure logon security

1

In the pcAnywhere Manager window, click

Hosts

.

2

3

Right-click the host connection item that you want to configure, then click

Properties

.

On the Security Options tab, check

Prompt To Confirm Connection

if you want to receive notification when a remote user attempts to connect to your computer, then specify what should happen next if you fail to respond to the confirmation prompt, as follows:

Specify how many seconds you have to respond to the prompt.

The default value is 10 seconds.

Check

Disconnect If Time-Out

to disconnect the remote user after expiration of the specified time-out period.

98

4

5

Do any of the following:

Check

Limit Login Attempts Per Call

to specify how many times a remote user can attempt to log on before being locked out.

The default value is three attempts.

Check

Limit Time To Complete Login

to specify how much time a remote user has to log on successfully.

The default value is three minutes.

Click

OK

.

Limiting access privileges

Calling back remote users

Another method for confirming the identity of a remote user is to use the

Callback feature. This feature works only for modem connections. When a remote user attempts to connect to the host over a modem, the host computer terminates the connection, then calls back the remote computer at a pre-configured number. If the remote computer is not waiting for a connection at that number, the host cancels the session.

To configure a call back

1

In the pcAnywhere Manager window, click

Hosts

.

2

3

4

Right-click the connection item that you want to configure, then click

Properties

.

On the Callers tab, right-click the caller item that you want to configure, then click

Properties

.

On the Callback tab, check

Callback the remote user

.

5

6

Type the telephone number for the remote modem.

Click

OK

.

Limiting access privileges

As a host, you can specify who can connect to your computer and what they are allowed to do. For example, you can set up your computer so that you can connect to it and have full access rights. You can also create

99

Securing your computer and sessions accounts on your computer to let your coworkers retrieve files, but restrict them from restarting your computer. This information is controlled in the

Callers property page.

Depending on your operating system, you can also restrict users from accessing specific drives.

Specifying caller privileges

Caller privileges let you limit the level of access that a remote user has to your computer. You can control whether a user can perform certain functions, such as blanking your screen during a session, restarting your computer, or cancelling your host session.

Note that if you want to let a remote user synchronize or clone folders on your computer, you must enable both upload and download privileges.

You also have the option to limit the length of time that a user can stay connected. By setting time limits, you can protect your computer from a malicious user who wants to disrupt network service by overwhelming the server, as well as from innocent users who unintentionally forget to end a session.

To specify caller privileges

1

In the pcAnywhere Manager window, click

Hosts

.

2

3

4

Right-click the connection item you want to configure, then click

Properties

.

On the Callers tab, right-click the caller item that you want to configure, then click

Properties

.

On the Privileges tab, do one of the following:

Click

Superuser

to let the user have full access rights.

100

Limiting access privileges

Click

Specify individual caller rights

to limit access rights, then check or uncheck the options you want to allow or restrict access to.

5

6

7

Specify whether you want to limit the duration of a session to a specified number of minutes or disconnect the host after a long period of inactivity.

To allow the remote user to run an automated task after logging on, type the command information needed to run the program.

Click

OK

.

Restricting access to computer drives

On Windows 9x and Windows ME, you can limit a user’s access to certain areas of your computer, such as your hard drive. Note that Windows NT and Windows 2000 provide their own drive security, so this option is not available on those systems.

To restrict access to computer drives

1

In the pcAnywhere Manager window, click

Hosts

.

2

3

4

Right-click the connection item you want to configure, then click

Properties

.

On the Callers tab, right-click the caller item that you want to configure, then click

Properties

.

On the Privileges tab, click

Set Drive Access

.

101

Securing your computer and sessions

5

Specify whether the user should have no access, read-only access, or full access to your floppy drives, local drives, network drives, or

CD-ROM drives.

6

Click

OK

in all three dialog boxes.

Securing sessions

pcAnywhere provides a number of options that protect the privacy of your session and prevent others from inadvertently cancelling your session.

These options are also useful if you plan to run a host session unattended.

To secure a session

1

In the pcAnywhere Manager window, click

Hosts

.

2

3

Right-click the host connection item that you want to configure, then click

Properties

.

On the Security Options tab, check

Blank PC screen after connection

to ensure the privacy of your session.

4

When you check this option, others at the host site will not be able to view what is happening on the host monitor.

Do one of the following:

Click

Host and Remote

to let both users control the keyboard and mouse.

Click

Host

to lock the keyboard and mouse on the remote computer during a session.

Click

Remote

to lock the keyboard and mouse on the host computer during a session.

102

Protecting your configuration settings

5

6

7

Select this option if you are running your host unattended and want to prevent others from interfering with your session.

To automatically cancel a session after a specified period of inactivity, check

Disconnect if inactive

.

Specify the time-out period.

Click

OK

.

Protecting your configuration settings

Once you have taken measures to prevent unauthorized users from connecting to your computer and have ensured that others cannot disrupt your session, whether intentionally or inadvertently, it is important to protect your configuration.

You can protect your connection items and your caller accounts by setting a password. Although it is important to choose a password that you can remember, be sure to choose a password that would not be easy for others to discover.

Making passwords case sensitive

Using numbers, special characters, and mixing upper and lower case letters in the password decreases the chances of someone discovering your password. By making passwords case sensitive, you can set a password that mixes upper and lower case letters. The remote user must type the password exactly the way that you specified it.

2

3

To make passwords case sensitive

1

In the pcAnywhere Manager window, right-click the host connection item you want to configure, then click

Properties

.

On the Security Options tab, check

Make passwords case sensitive

.

Click

OK

.

Protecting your connection items

Your host and remote connection items contain the information needed to establish a connection and run a session, including logon information and security settings. To prevent unauthorized users from tampering with your settings or launching a session without your permission, set a password for your host and remote connection items.

103

Securing your computer and sessions

To protect a connection item

1

Do one of the following:

2

3

In the pcAnywhere Manager window, click

Hosts

to protect host connection items.

In the pcAnywhere Manager window, click

Remotes

to protect remote connection items.

Right-click the connection item that you want to protect, then click

Properties

.

On the Protect Item tab, type a password.

4

5

6

Retype the password for confirmation.

Specify which actions should require a password.

Click

OK

.

Protecting your caller accounts

Even if you have protected your connection items, you should also set a password for your caller accounts to prevent users who might be authorized to view your other settings from changing user passwords and access privileges. The procedures for protecting a caller account are similar to the procedures for protecting a connection item.

For more information, see

“Protecting your connection items” on page 103.

104

C H A P T E R

Using encryption to protect data

Modern methods of computer cryptography use complex mathematical algorithms to code and decode data. This process of coding and decoding is called encryption. Symantec pcAnywhere uses a combination of encryption methods to ensure that the data you send cannot be read or altered by unauthorized users while in transit.

This chapter contains the following:

What is encryption

What are the most common encryption methods

Understanding the trade-offs

How pcAnywhere works with encryption

Setting up encryption on your computer

What is encryption

Encryption is a method of encoding data so that only those who have the code can decipher the data. Computer encryption uses mathematical algorithms to encode the data, usually by substituting or scrambling characters or strings of characters. The encrypted data is sent with a cryptographic key, which contains the information needed to decipher the code and unscramble the data.

105

Using encryption to protect data

What are the most common encryption methods

The two most common forms of encryption are symmetric and public-key.

Each method has unique advantages and disadvantages. The most effective forms of encryption use a combination of both.

What is symmetric encryption

Symmetric encryption encodes and decodes data using the same cryptographic key. When you send data using this method, both the sender and the recipient share the same key.

This encryption method is generally faster than other methods, but it is not without risk. Because the key is sent with the data, it is important to distribute the key securely. It is possible for someone to intercept the data and discover the key. An even greater threat is the possibility that someone could alter the data without either the sender or recipient’s knowledge.

The recipient has no way of verifying that the data actually came from the person who sent it.

What is public-key encryption

Public-key encryption encodes and decodes data using key pairs. A public key encodes the data, and a matching private key decodes it. Both the sender and the recipient each have a key pair. Neither person distributes the private key, so there is no danger of someone else seeing it. When you send data using this method, the data is encoded on your computer using the recipient’s public key and decoded on the recipient’s computer using the recipient’s private key.

Public-key encryption uses certificates to ensure the secure distribution of the public keys. Certificates are digital documents that are issued by a certificate authority. They contain information needed to confirm the identity of the person who holds the public key, as well as the authority that issued it.

This encryption method is more secure than symmetric encryption because the key needed to decode the data is never shared. However, this method is much slower than symmetric encryption.

106

Understanding the trade-offs

Understanding the trade-offs

When deciding whether to use encryption and which method to use, you must balance performance with the need for security. Using strong encryption can protect the privacy and integrity of your data. However, it can also slow performance because stronger encryption requires more resources to process and transfer the data.

Sometimes protecting the security of the data is far more important than sacrificing performance. If the data you are sending is highly confidential or sensitive, and you want to ensure that it came from the right sender, and that it has not been viewed by unauthorized users or been otherwise tampered with, use strong encryption.

If the security of the data is not as important to you as knowing that it came from the right source, you might consider encrypting only the user name and password to enhance performance.

If you are using a secure network to transfer data to another user on the same network, you might not need to use encryption at all.

How pcAnywhere works with encryption

pcAnywhere uses a combination of symmetric and public-key encryption.

By combining both techniques, pcAnywhere takes advantage of the strengths of each method: speed and security.

■ pcAnywhere supports three types of encryption:

Public-key

Symmetric pcAnywhere

For more information, see the

Symantec pcAnywhere Administrator’s

Guide.

Using public-key encryption in pcAnywhere

If you choose public-key encryption, pcAnywhere uses a public-key certificate file or store to verify the identity of the person attempting to connect and send data, then uses the faster symmetric encryption to secure the session.

107

Using encryption to protect data

Some configuration is required to ensure that both the host and remote users have access to the appropriate key pairs. Host and remote users must provide each other with their certificates and set up a certificate store, containing the certificates of those users who will connect their computers.

The host and remote users should be configured with the common name from their certificates. When a connection is attempted, the common name for the host and the remote are verified for authenticity. pcAnywhere provides an Encryption Wizard to guide you through the process of setting up private-key encryption.

For more information, see

“Using the Encryption Wizard” on page 112.

What are certificates

Certificates are data documents that contain identification information including the person’s name, public key, and data signature of the certificate authority that issued the certificate. pcAnywhere requires that you use Microsoft-compatible certificates. You can obtain personal certificates (or key pairs) from a commercial certificate authority or from an internal certificate server.

After a certificate has been installed, it appears in the Private Key list on the host and remote connection item’s Security Options property page.

What is a certificate store

A certificate store is a secure database, containing one or more certificates.

To locate the public key for a session, pcAnywhere searches the certificate store for the certificate that belongs to the remote user. pcAnywhere can use any of the following file formats as a certificate store:

Microsoft-compatible certificate store

PKCS#7 cryptographic message

Certificate obtained from the certificate authority

108

Setting up encryption on your computer

Using symmetric encryption in pcAnywhere

If you choose symmetric encryption, pcAnywhere generates a unique public key and uses this key to encrypt and safely distribute the symmetric key used to encrypt the session. Because the public key is not obtained from a certificate authority, it does not provide the level of user authentication that public-key encryption does. However, you can offset this factor by using pcAnywhere’s caller authentication features.

For more information, see

“Preventing unauthorized access” on page 93.

The Symmetric encryption level is available on any operating system that supports CryptoAPI, such as Windows NT 4.0. For the Windows 95 operating system, CryptoAPI 1.0 is available with OSR2 or with Microsoft

Internet Explorer 3.0 and higher.

Using pcAnywhere encryption

pcAnywhere encryption applies a simple transformation to data so that the data stream cannot be easily interpreted by a third party. This encryption level is compatible with earlier versions of pcAnywhere that do not support public-key encryption.

Setting up encryption on your computer

You can choose one of the three types of encryption supported by pcAnywhere or choose no encryption. Both the host and remote users should choose the same level of encryption. Either user can deny a connection if the other is using a lower level of encryption. To increase performance, the host can encrypt just the remote user’s identification and password rather than the whole session.

Setting up pcAnywhere or symmetric encryption

The procedures for setting up pcAnywhere and symmetric encryption are virtually identical because neither method uses certificates. pcAnywhere encryption is intended for users who do not have access to a cryptographic service provider or want to connect to a computer that uses an older version of pcAnywhere that does not support a higher level of encryption.

Choose symmetric encryption if you have access to a cryptographic service provider, but do not have a certificate authority.

109

Using encryption to protect data

To set up pcAnywhere or symmetric encryption

1

Do one of the following:

2

In the pcAnywhere Manager window, click

Hosts

to set up encryption on the host computer.

In the pcAnywhere Manager window, click

Remotes

to set up encryption on the remote computer.

Right-click the connection item that you want to configure, then click

Properties

.

3

4

5

6

On the Security Options tab, select either the pcAnywhere or

Symmetric encryption level.

Check

Deny lower encryption level

to automatically disconnect if the computer you want to connect to is using a lower level of encryption.

If you are a host user and want to increase performance by encrypting only the remote user’s identity, check

Encrypt user ID and password only

.

Click

OK

.

Setting up public-key encryption

You must set up a certificate store, which contains the information needed to confirm the identify of the users who will connect to your computer.

You must also provide information about the encryption key pairs and what to do if you connect to a computer that uses a lower level of encryption.

pcAnywhere also provides a wizard to guide you through the configuration process.

Setting up the certificate store

When using public-key encryption, both the host and remote users must provide their certificates to each other, so they can add this information to their certificate stores.

110

Setting up encryption on your computer

To set up the certificate store

1

In the pcAnywhere Manager window, click

Tools > Options

.

2

3

On the Encryption tab, specify the path and name of the file containing the certificate information for the computer to which you want to connect.

Click

OK

.

Setting up key pairs

Public-key encryption provides the highest level of security and requires both the host and remote users to have a public key issued by a certificate authority, which sends the information to the cryptographic service provider.

To set up key pairs

1

Do one of the following:

In the pcAnywhere Manager window, click

Hosts

to set up key pairs on the host computer.

In the pcAnywhere Manager window, click

Remotes

to set up key pairs on the Remote computer.

2

3

4

5

6

7

8

Right-click the connection item that you want to configure, then click

Properties

.

On the Security Options tab, click

Public-Key

in the encryption level list box.

Check

Deny lower encryption level

to automatically disconnect if the computer that you want to connect to is using a lower level of encryption.

If you are a host user and want to increase performance by encrypting only the remote user’s identity, check

Encrypt user ID and password only

.

In the

Private Key Container

list, select the name of the certificate authority assigned to the your private key.

In the

Certificate Common Name

box, type the common name of the certificate provided by the certificate authority.

This information is case sensitive. Type the name exactly as you provided it to the certificate authority.

Click

OK

.

111

Using encryption to protect data

Using the Encryption Wizard

Setting up public-key encryption is more complicated than other types of encryption. pcAnywhere provides an Encryption Wizard to guide you through the process.

4

5

6

To use the wizard

1 Do one of the following:

In the pcAnywhere Manager window, click

Hosts

to set up encryption on the host computer.

In the pcAnywhere Manager window, click

Remotes

to set up encryption on the remote computer.

2

3

Right-click the connection item that you want to configure, then click

Properties

.

On the Security Options tab, click

Public-Key

in the encryption level list box.

Click

Encryption Wizard

.

Follow the prompts in the wizard.

When you are finished, on the Security Options tab, click

OK

.

112

C H A P T E R

Monitoring and recording sessions

Network administrators and other IT professionals can use the logging and recording features in pcAnywhere to monitor security and performance and to troubleshoot problems. There are a number of reasons why you might want to monitor or record a session. For example, you can check a log to confirm whether your automatic file transfer completed successfully.

If you leave your host running unattended, you can check the log file to see which files and programs were opened during a remote control session.

This chapter contains the following:

Monitoring events in pcAnywhere

Managing log files

Recording host sessions

Monitoring events in pcAnywhere

Event logging in pcAnywhere lets you monitor session activities and track performance issues behind the scenes. For security purposes, you can log information about failed logon attempts, how many host sessions are running, or whether sensitive files have been accessed.

Although logging can be a useful tool, be aware that tracking some types of events, such as logging every file that is opened on the host, can degrade performance. If you select an event that could affect performance, you will be prompted to confirm the action.

113

Monitoring and recording sessions

Depending on your operating environment, you can choose to send information events that occurred during a session to a pcAnywhere generated log file, NT or Windows 2000 event log, or a system network management protocol (SNMP) monitor.

For more information, see the

Symantec pcAnywhere Administrator’s

Guide.

Generating a pcAnywhere log file

If your operating system does not provide logging capabilities or if you want to maintain a separate log file for pcAnywhere events, you can enable pcAnywhere log generation. You can choose to record the file on your local computer or record it on a central server.

To generate a pcAnywhere log file

1

In the pcAnywhere Manager window, click

Tools > Options

.

2

On the Event Logging tab, check

Enable pcAnywhere log generation

.

114

3

Specify whether you want to generate the log file on a central server or in the pcAnywhere directory on the local computer.

If you want to maintain the log file on a central server, you must specify the location of the server and any necessary logon information.

Monitoring events in pcAnywhere

4

5

6

7

For more information, see

“Sending logging information to a central server” on page 116.

Click

Select Events

.

Select the events that you want to log.

Selecting some types of events, such as Host Executable Launched and

Host File Access can degrade system performance. To limit the impact, pcAnywhere only tracks the following types of application files: *.exe,

*.cmd, *.bat, and *.cmd. You can also limit the types of files that are logged, by specifying the file extensions.

For more information, in the Select Events to Log dialog box, click

Details, then follow the on-screen instructions.

In the Select Events to Log dialog box, click

OK

.

In the pcAnywhere Options dialog box, click

OK

.

8

Click

OK

in both windows.

Logging events on Windows NT and Windows 2000

If you are using pcAnywhere on a Windows NT or Windows 2000 computer, you can add logging information about pcAnywhere specific events to the Windows Event Viewer.

To record pcAnywhere events in the Windows Event Viewer

1

In the pcAnywhere Manager window, click

Tools > Options

.

2

On the Event Logging tab, check

Enable NT event logging

.

115

Monitoring and recording sessions

3

4

5

6

7

Specify whether you want to send the logging information to the Event

Viewer on a central server or to the Event Viewer on the local computer.

If you want to maintain the log file on a central server, you must specify the location of the server and any necessary logon information.

For more information, see

“Sending logging information to a central server” on page 116.

Click

Select Events

.

Select the events that you want to log.

Selecting some types of events, such as Host Executable Launched and

Host File Access can degrade system performance. To limit the impact, pcAnywhere only tracks the following types of application files: *.exe,

*.cmd, *.bat, and *.cmd. You can also limit the types of files that are logged, by specifying the file extensions.

For more information, in the Select Events to Log dialog box, click

Details, then follow the on-screen instructions.

In the Select Events to Log dialog box, click

OK

.

In the pcAnywhere Options dialog box, click

OK

.

Sending logging information to a central server

If others need to view the information in the log or if you have limited resources on the local computer to store a large log file, you can opt to generate pcAnywhere logging information on a central server.

4

5

To send logging information to a central server

1

In the pcAnywhere Manager window, click

Tools > Options

.

2 On the Event Logging tab, do any of the following:

Check Enable pcAnywhere log generation.

Check Enable NT event logging.

3 Under the logging option that you selected, do one of the following:

Check

Record pcAnywhere log on central server

to generate a pcAnywhere log file on the server.

Check

Record NT event on central server

to record pcAnywhere events in the Windows Event Viewer on the server.

Specify the path to the server.

Click

Advanced

.

116

Managing log files

6

7

In the Authentication Information dialog box, specify the information required to log on to the server, including user name, password, and, if applicable, domain name.

Click

OK

in both windows.

Managing log files

The pcAnywhere generated log file contains information about activities that occurred during a remote control session. Using this information, you can create reports to track security or performance issues or gather billing information.

Once you create a report, you can remove or archive older information contained in the log file. Even if you do not want to generate a report, you should remember to periodically archive or delete older log information to free up disk space.

Creating an activity log report

An activity log report is a chronological listing of the session events contained in a pcAnywhere generated log file. This information can be useful for security, troubleshooting, or billing purposes. pcAnywhere provides three options for report formats. Fully formatted reports contain the most information, including a listing of all possible events and how frequently they occurred. Data only formats list only the events that occurred during the session. You can choose between comma deliminated or fixed field (tabular) formats.

To create and view a log report

1

In the pcAnywhere Manager window, click

Tools > Activity Log

Processing

.

2

3

4

5

6

7

Click

Report

.

Select the pcA event log file (*.pl9).

Click

Open

.

Select a format for the report.

Specify the date range for the report.

Click

OK

.

117

Monitoring and recording sessions

8

9

10

11

Type a name for the report.

Fully formatted reports use a .log extension. Comma deliminated reports use a .csv extension. Fixed field reports use a .txt extension.

Click

Save

.

If you want to view the file, in the confirmation dialog box, click

Yes

.

Click

OK

.

Archiving or deleting logged information

pcAnywhere generated log files are not cleared automatically. New log information is appended to these log files, causing them to increase in size.

When a log file becomes too large, you can archive or delete older data.

6

7

8

3

4

5

To delete or archive log file data

1

2

In the pcAnywhere Manager window, click

Tools > Activity Log

Processing

.

Click

Archive/Delete

.

Select the pcA event log file (*.pl9), then click

Open

.

Specify the date range for the data that you want to archive or delete.

Specify what you want to do with the data that falls within the specified date range.

You can choose to copy and delete. The data will be copied to an archive file, then removed from the source log file.

Click

OK

.

If you are creating an archive file, specify a file name and destination.

Click

Save

.

Recording host sessions

Recording a session on a host is a useful security tool, especially if you are running the host unattended. You can set up the host to begin recording automatically as soon as a connection is established, so you can review every action that the remote user has performed on the host.

To record a remote control session on a host, you must set up your computer to begin recording as soon as the connection is made. This option applies globally to all sessions, and is controlled in the Host

Operations property tab.

118

Recording host sessions

To record a host session automatically

1

In the pcAnywhere Manager window, click

Tools > Options

.

2

3

On the Host Operation tab, check

Record host session for later playback

.

Specify the location on the host where you want to store the recording.

Some host servers require a password to save files on the system.

To specify logon information

1

On the Host Operation tab, click

Advanced

.

2

Type the information needed to access the directory in which you want to store the recording.

For more information, see

“Replaying recorded sessions” on page 69.

119

Monitoring and recording sessions

120

C u s t o m i z i n g s e t t i n g s

Customizing Symantec pcAnywhere options

Customizing connection devices

122

C H A P T E R

Customizing Symantec pcAnywhere options

You can customize pcAnywhere to improve performance, increase security, and manage connections. Some of these options are intended for network administrators and other advanced users. Depending on your work environment, your network administrator might restrict you from modifying some settings. When in doubt about whether you should perform a procedure, consult your network administrator.

This chapter contains the following:

Viewing or modifying pcAnywhere settings

Configuring host options

Configuring remote options

Using directory services

Viewing or modifying pcAnywhere settings

pcAnywhere lets you manage the default preferences for host and remote connections, file transfer, logging, and other functions from one location.

These options apply globally to all sessions, unless you override them during a session. Changes you make to the configuration during a session affect only that session.

To view or change pcAnywhere options

1

In the pcAnywhere Manager window, click

Tools > Options

.

2

On the pcAnywhere Options dialog box, click the tab that you want to view or modify.

3 When you are finished, click

OK

.

123

Customizing Symantec pcAnywhere options

The settings in the pcAnywhere Options dialog box are grouped by tabs.

This table explains where to find the settings that you need.

Tab

Host Operation

Remote Operation

Host

Communications

Remote

Communications

File Transfer

Event Logging

Explanation

Controls basic host operations, such as host name and video settings.

Controls performance and display settings for remote sessions.

For more information, see

“Controlling host operations” on page 125.

“Configuring remote operations” on page 128.

Contains customization options for modem and network connections on the host.

“Controlling host communications” on page 127.

Contains customization options for modem and network connections on the remote.

“Controlling remote communications” on page 128.

Controls file transfer settings.

“Changing file transfer preferences” on page 79.

Enables logging of events that occur during pcAnywhere sessions.

“Monitoring events in pcAnywhere” on page 113.

Directory Services Controls settings for using a directory service to find hosts.

Remote Printing Contains settings for configuring remote printing.

Encryption

“Using directory services”

page 35.

on page 129.

“Printing remotely” on

Specifies certificate information required for public-key encryption.

“Setting up public-key encryption” on page 110.

Network administrators and users who frequently need to change global settings to accommodate unique configuration requirements can create option sets that contain the settings they need.

Option sets can be used as templates for custom installation packages.

They can also be used as the default preferences for the local computer.

For example, if you work in different locations, you can avoid changing

124

Configuring host options the default settings each time you change locations. Create an option set for each location, then apply it when you arrive.

For more information, see the

Symantec pcAnywhere Administrator’s

Guide.

Configuring host options

Use the Host Operation tab to control basic host settings, specify a host name, select the video mode, or set the host to record remote control sessions automatically.

Use the Host Communications tab to view or customize modem or network settings.

Controlling host operations

pcAnywhere uses the Windows computer name or IP number as the default host name. Your system administrator might determine this setting for you.

The video setting you choose depends on the type of video card that you have. The default setting is Accelerator Enabled, which maximizes speed and performance. If you experience video problems or distortions during a

125

Customizing Symantec pcAnywhere options session, change the video setting to Compatibility. This option is slower, but works for most video cards.

If you want to monitor activities on the host, configure the host to record sessions for later playback.

For more information, see

“Recording host sessions” on page 118.

126

Configuring remote options

Controlling host communications

If a modem is installed and configured properly on the operating system, host users can customize the dial-up properties, specifying on what ring to answer an incoming call.

Network administrators can create an access list of TCP/IP addresses or subnets to restrict unauthorized users from connecting to the host server.

For more information, see the

Symantec pcAnywhere Administrator’s

Guide.

Configuring remote options

Use the Remote Operation tab to control performance and display settings for remote control sessions. You can control the size of the host desktop, reduce the number of colors that are displayed, as well as other settings to improve performance and navigation.

Use the Remote Communications tab to view or customize modem or network settings.

127

Customizing Symantec pcAnywhere options

Configuring remote operations

Screen resolution and color level have a direct impact on performance.

Other factors include cache file size. pcAnywhere stores data in a cache file to avoid resending the same data over the connection, thus improving performance. The size of the cache file depends on available disk space. pcAnywhere never uses more than 50 percent of available disk space for a cache file.

If you connect to multiple hosts at the same time, consider reducing the cache file size to ensure that there is sufficient cache for each host session.

For more information, see

“Connecting to multiple hosts” on page 65.

pcAnywhere includes an Optimization Wizard to assist you in selecting the right settings to improve performance.

For more information, see

“Improving performance” on page 37.

Controlling remote communications

If a modem is installed and configured properly on the operating system, remote users can customize dialing information, specifying calling card information and unique dialing instructions per location. Modem settings are controlled in the Modems Properties dialog box in Windows. However, you can also access these settings directly from pcAnywhere.

128

Using directory services

To access dialing properties

1

In the pcAnywhere Manager window, click

Tools > Options

.

2 On the Remote Communications tab, click

Change

to modify dialing properties or add a new location.

For more information, consult the Windows documentation.

3

In the pcAnywhere Options dialog box, click

OK

.

Network administrators can customize network settings to handle connections on both sides of a firewall.

For more information, see the

Symantec pcAnywhere Administrator’s

Guide.

Using directory services

Directory servers manage information about network users and resources.

Network administrators can use the Directory Services tab to configure a directory server.

For more information, see the

Symantec pcAnywhere Administrator’s

Guide.

129

Customizing Symantec pcAnywhere options

130

C H A P T E R

Customizing connection devices

Before you can use pcAnywhere to connect to another computer, you must configure a host or remote connection item, depending on whether you want to let others connect to your computer or whether you want to control another computer remotely. One of the first steps in configuring a connection item is to choose a connection device. A connection device is the type of hardware a computer uses to handle connections. In most cases, you can use the default settings for these devices; however, some devices do require specific information from you. This information is configured on the connection item Connection Info tab.

For more information, see

“Setting up a host computer” on page 45 and

“Setting up a remote connection” on page 55.

This chapter contains the following:

Customizing network connections

Customizing modem connections

Customizing ISDN connections

Customizing European ISDN connections

Customizing direct connections

Configuring infrared connections

131

Customizing connection devices

Customizing network connections

Most pcAnywhere host and remote network connections use TCP/IP.

Network administrators who use pcAnywhere to manage servers can also use the SPX or NetBIOS protocol, depending on the network environment.

For more information, see the

Symantec pcAnywhere Administrator’s

Guide.

By default, TCP/IP, SPX, and NetBIOS remote network connections are configured to connect to a host over a LAN. If your remote computer is not connected to a LAN, you can use dial-up networking to gain access. To do so, you must have an Internet Service Provider (ISP), remote access server account (RAS), or a Virtual Private Network (VPN) account. This type of connection is called dial-up networking or remote access.

Customizing modem connections

If a modem is installed and properly configured on your computer, pcAnywhere will automatically detect it and add it to the list of connection devices in the Connection Info tab. Choose this modem definition for modem connections.

Use the Windows control panel to add, configure, or modify the settings of a modem. Generally, you should use the default modem settings; however, you can select custom settings for pcAnywhere sessions.

Configuring dialing properties

Depending on your location and telephone service, you might need to specify additional dialing information to connect to another computer over a modem. This information might include calling card information, a special prefix for connecting to an outside line, or the code to use to disable call waiting. If you work in multiple locations, you can set up unique dialing properties for each location, so you can quickly change dialing preferences.

Dialing properties are controlled in the Windows Modem Properties dialog box; however, you can also access this information in pcAnywhere.

For more information, see

“Controlling remote communications” on page 128.

132

Customizing modem connections

Customizing modem settings

Modem settings are controlled in the Modem Properties dialog box in

Windows. You can customize these settings for pcAnywhere without changing your default preferences in Windows. Custom settings temporarily override the modem properties that are configured in the

Windows Modem Properties dialog box and affect only the pcAnywhere sessions that use the customized connection item.

This table explains the settings that you can customize.

Tab

General

Connection

Options

Explanation

Lets you select a different COM port, adjust speaker volume, and control connection speed.

Lets you control error-checking rates, set time limits for handling busy connections or idle activity, adjust buffer settings for the COM port, and configure advanced settings, such as flow control methods and modulation type.

Lets you control whether you want to use a terminal window, specify how long to wait for a credit card tone when making an operator assisted or manually dialed call, and enable status information.

For more information, consult the documentation that came with your modem or the Windows documentation.

To customize modem connections

1

Do one of the following:

2

In the pcAnywhere Manager window, click

Hosts

.

In the pcAnywhere Manager window, click

Remotes

.

Right-click the connection item that you want to configure, then click

Properties

.

3

4

On the Connection Info tab, select the modem device that you want to use.

Click

Details

.

133

Customizing connection devices

5

Modify the settings that you want to change.

6

7

Click

OK

.

In the Connection Info dialog box, click

OK

.

Customizing ISDN connections

If an ISDN device is installed and properly configured on your computer, pcAnywhere will automatically detect it and add it to the list of connection devices in the Connection Info tab. Choose this modem definition, if you are using ISDN in any location except Europe.

If you are using ISDN in Europe, you must select ISDN via CAPI.

For more information, see

“Customizing European ISDN connections” on page 135.

An ISDN device works much like a modem, except that it uses digital signals to transmit and receive data. The configuration requirements are similar.

For more information, see

“Customizing modem connections” on page 132.

134

Customizing European ISDN connections

Customizing European ISDN connections

In Europe, ISDN devices use the Common ISDN Application Programming

Interface (CAPI) to transmit and receive data. Even if a separate ISDN device is listed in the Connection Info tab, you must select ISDN via CAPI.

To improve connection speed, you can configure pcAnywhere to use channel bonding. Channel bonding combines two 64K channels into a single channel, providing for 128K bps transmission. Channel bonding only works if both channels are available.

For security or economy purposes, you can restrict incoming calls to specific extensions. If you do not specify an extension, you can receive calls on any extension.

To customize European ISDN connections

1

In the pcAnywhere Manager window, click either

Hosts

or

Remotes

.

2

Right-click the connection item that you want to configure, then click

Properties

.

3

4

5

On the Connection Info tab, check

ISDN via CAPI

.

Click

Details

.

Configure the settings that you want to use.

6

7

Click

OK

.

In the Connection Info dialog box, click

OK

.

135

Customizing connection devices

Customizing direct connections

If the computer you want to connect to is nearby, you can connect the two computers directly, using an appropriate cable for your port. Direct connections require either a parallel (LPT) or a serial (COM) port.

Windows 9x and Windows ME support both parallel and serial connections. Although you can use either type of connection, parallel connections are preferred, because they are faster than serial connections.

Configuring parallel LPT connections

To use a parallel connection, you must configure the parallel port in the

BIOS for bi-directional operations and use a bi-directional parallel cable.

For more information, consult the Windows documentation or see your network administrator.

Customizing serial COM port connections

Windows NT and Windows 2000 do not support parallel connections. On these operating systems, you must use a serial, COM port. Generally, you can use the default settings for the COM port, but if performance is an issue, you can customize these settings.

COM ports use a null modem cable, so the settings for a COM port resemble modem settings. For direct connections, the settings on both computers must match. This table explains the port settings that you can control.

Setting

Speed

Parity

Explanation Default setting

Controls the speed of the connection.

Most newer computers can handle speeds of 38,400 or greater.

38,400

Checks for errors on the communications line. To increase performance, select

None. Most operating systems and modems have their own methods of validating data integrity.

None

136

Customizing direct connections

Setting Explanation Default setting

Flow control Controls the flow of information between computers. For direct and modem connections, use RTS/CTS. RTS is a request to send status message, used to verify that the computer is ready to receive information. CTS is a clear to send status message, used in response to an RTS message.

RTS/CTS

Started by Carrier detect (DCD)

Ended by

Controls the method by which a session begins.

Controls the method by which a session ends.

Carrier detect (DCD)

To customize settings for COM ports

1

Do one of the following:

2

3

4

In the pcAnywhere Manager window, click

Hosts

.

In the pcAnywhere Manager window, click

Remotes

.

Right-click the connection item that you want to configure, then click

Properties

.

On the Connection Info tab, select the COM port that you want to use.

Click

Details

.

137

Customizing connection devices

5

Select the connection preferences that you want to use.

6

7

Click

OK

.

In the Connection Info dialog box, click

OK

.

Configuring infrared connections

If a Microsoft-compatible infrared device is installed and configured properly on your computer, pcAnywhere automatically detects it and lists the device in the Connection Info tab.

For more information, see the Windows documentation.

138

S U P P O R T

Service and support solutions

Service and support information is available from the Help system of your

Symantec product. Click the Service and Support topic in the Help index.

Technical support

Symantec offers two technical support options:

Online Service and Support

Connect to the Symantec Service & Support Web site at http://service.symantec.com, select your user type, and then select your product and version. This gives you access to current hot topics, knowledge bases, file download pages, multimedia tutorials, contact options, and more.

PriorityCare telephone support

PriorityCare fee-based telephone support services are available to all registered customers.You can access the PriorityCare number for your product through the Service & Support Web site. You’ll be led through the online options first, and then to the telephone contact options available for your product and version.

139

Service and support solutions

Support for old and discontinued versions

When a new version of this software is released, registered users will receive upgrade information in the mail. Telephone support will be provided for the old version for up to twelve months after the release of the new version. Technical information may still be available through the

Service & Support Web site (http://service.symantec.com).

When Symantec announces that a product will no longer be marketed or sold, telephone support will be discontinued 60 days later. Support will be available for discontinued products from the Service & Support Web site only.

Customer service

Access customer service options through the Service & Support Web site at http://service.symantec.com. From this site, you can receive assistance with non-technical questions, and for information on how to do the following:

Subscribe to the Symantec Support Solution of your choice.

Obtain product literature or trialware.

Locate resellers and consultants in your area.

Replace missing or defective CD-ROMS, disks, manuals, and so on.

Update your product registration with address or name changes.

Get order, return, or rebate status information.

Access customer service FAQs.

Post a question to a Customer Service representative.

For upgrade orders, visit the online upgrade center at: http://www.symantecstore.com

Worldwide service and support

Technical support and customer service solutions vary by country. For information on Symantec and International Partner locations outside of the

United States, please contact one of the service and support offices listed below, or connect to http://service.symantec.com and select your region under the Global Service and Support.

140

Service and support offices

North America

Symantec Corporation

555 International Way

Springfield, OR 97477

U.S.A.

http://www.symantec.com/

Argentina and Uruguay

Symantec Region Sur

Cerrito 1054 - Piso 9

1010 Buenos Aires

Argentina

Asia/Pacific Rim

Symantec Australia

Level 2, 1 Julius Avenue

North Ryde, NSW 2113

Sydney

Australia

Brazil

Symantec Brasil

Market Place Tower

Av. Dr. Chucri Zaidan, 920

12° andar

São Paulo - SP

CEP: 04583-904

Brasil, SA http://www.service.symantec.com/mx

+54 (11) 5382-3802 http://www.symantec.com/region/reg_ap/

+61 (2) 8879-1000

Fax: +61 (2) 8879-1001 http://www.service.symantec.com/br

+55 (11) 5189-6300

Fax: +55 (11) 5189-6210

Europe, Middle East, and Africa

Symantec Customer Service Center

P.O. Box 5689

Dublin 15

Ireland http://www.symantec.com/region/reg_eu/

+353 (1) 811 8032

141

Service and support solutions

Mexico

Symantec Mexico

Blvd Adolfo Ruiz Cortines,

No. 3642 Piso 14

Col. Jardines del Pedregal

Ciudad de México, D.F.

C.P. 01900

México

Other Latin America

Symantec Corporation

9100 South Dadeland Blvd.

Suite 1810

Miami, FL 33156

U.S.A.

http://www.service.symantec.com/mx

+52 (5) 661-6120 http://www.service.symantec.com/mx

Subscription policy

If your Symantec product includes virus, firewall, or web content protection, you might be entitled to receive protection updates via

LiveUpdate. The length of the subscription could vary by Symantec product.

When you near the end of your subscription, you will be prompted to subscribe when you start LiveUpdate. Simply follow the instructions on the screen. After your initial subscription ends, you must renew your subscription before you can update your virus, firewall, or web content protection. Without these updates, your vulnerability to attack increases.

Renewal subscriptions are available for a nominal charge.

Every effort has been made to ensure the accuracy of this information.

However, the information contained herein is subject to change without notice. Symantec Corporation reserves the right for such change without prior notice.

January 15, 2002

142

Symantec pcAnywhere 10.5

CD Replacement Form

CD REPLACEMENT:

After your 60-Day Limited Warranty, if your CD becomes unusable, fill out and return 1) this form, 2) your damaged CD, and 3) your payment (see pricing below, add sales tax if applicable), to the address below to receive replacement CD.

DURING THE 60-DAY LIMITED WARRANTY PERIOD, THIS SERVICE IS FREE.

You must be a registered customer in order to receive CD replacements.

FOR CD REPLACEMENT

Please send me: ___ CD Replacement

Name ________________________________________________________________________________________________________________

Company Name _______________________________________________________________________________________________________

Street Address (No P.O. Boxes, Please)_____________________________________________________________________________________

City ______________________________________________________________________ State _______ Zip/Postal Code _________________

Country* _________________________________________________________Daytime Phone _______________________________________

Software Purchase Date _________________________________________________________________________________________________

*This offer limited to U.S., Canada, and Mexico. Outside North America, contact your local Symantec office or distributer.

Briefly describe the problem:_____________________________________________________________________________________________

______________________________________________________________________________________________________________________

CD Replacement Price

Sales Tax (See Table)

Shipping & Handling

TOTAL DUE

$ 10.00

______

$ 9.95

______

SALES TAX TABLE: AZ (5%), CA (7.25%), CO (3%), CT (6%), DC (5.75%), FL (6%), GA (4%), IA (5%),

IL (6.25%), IN (5%), KS (4.9%), LA (4%), MA (5%), MD (5%), ME (6%), MI (6%), MN (6.5%), MO (4.225%),

NC (6%), NJ (6%), NY (4%), OH (5%), OK (4.5%), PA (6%), SC (5%), TN (6%), TX (6.25%), VA (4.5%), WA (6.5%),

WI (5%). Please add local sales tax (as well as state sales tax) in AZ, CA, FL, GA, MO, NY, OH, OK, SC, TN, TX, WA,

WI.

FORM OF PAYMENT ** (CHECK ONE):

___ Check (Payable to Symantec) Amount Enclosed $ _________ __ Visa __ Mastercard __ American Express

Credit Card Number ___________________________________________________________________________________Expires __________

Name on Card (please print) ________________________________________________ Signature ___________________________________

**U.S. Dollars. Payment must be made in U.S. dollars drawn on a U.S. bank.

MAIL YOUR CD REPLACEMENT ORDER TO:

Symantec Corporation

Attention: Order Processing

555 International Way

Springfield, OR 97477 (800) 441-7234

Please allow 2-3 weeks for delivery within the U.S.

Symantec and pcAnywhere are trademarks of Symantec Corporation.

Other brands and products are trademarks of their respective holder/s.

2002 Symantec Corporation. All rights reserved. Printed in the U.S.A.

144

Get a parallel cable

pcAnywhere can make connections over a wide range of protocols, including modems, network,

Internet, ISDN, and direction connections.

The parallel cable allows you to direct-connect two computers using parallel ports. A parallel cable significantly increases the performance of pcAnywhere when using a parallel port to connect two computers. It facilitates the file transfer and synchronization of two computers, as well as pcAnywhere training. If you need this parallel port cable, you can order it through the address below for $9.95.

Shipping and Handling is Free. Offer good only in U.S. and Canada.

Send to:

Symantec Corporation

Attn: Order Services

175 W. Broadway

Eugene, OR 97401

1-800-441-7234

(Choose Corporate Support Option)

Parallel Cable Price: 9.95

Sales Tax: + _____

TOTAL DUE: = _____

Name (please print): _________________________________________________________

Mailing Address: ____________________________________________________________

City:_______________________________________________________________________

State: _________________________________________________ Zip: _________________

Daytime Phone:_____________________________________________________________

Form of Payment (Check One)

___ Check Payable to Symantec ___ Visa ___ Mastercard ___ American Express

Credit Card Number _______________________________ Expires ___________________

Name on card ______________________________________________________________

Signature __________________________________________________________________

Please allow 4-6 weeks for delivery. Limit one per name, address, and household.

Promo Code: PCACHORD

Symantec, the Symantec logo, and pcAnywhere are U.S. registered trademarks of

Symantec Corporation. Microsoft, Windows, Windows NT, and the Windows logo, are registered trademarks of Microsoft Corporation. Other brands and products are trademarks of their respective holders.

146

I N D E X

Symbols

*

76

.atf file

.csv

.log

118

118

84

?

|

.pl9

.rcd

.scn

.txt

76

76

117

68, 69

71

118

A

access privileges

accessing

100

host online menu

50

other documentation

Administrator’s Guide

pcAnywhere File Manager

pcAnywhere Manager remote online menu

32

33 remote online toolbar

Action Button, defined

32

33

18

74

Active Directory Service authentication

activity reports

117

adding

caller accounts

96

folders

77

host connection items

44

remote connection items remote printer

35

ADS authentication

ADSL

61

administrator tools

15

Administrator’s Guide, accessing

94

18

configuring on host

47

configuring on remote

58

overview

archiving logs

30

118

authentication

94 defined

94

Microsoft-based methods

Novell-based methods on local computer

94

Web-based methods

Automated Tasks tab

62

95

95

94

AutoTransfer configuring

85

modifying running

86

87

setting preferences

AutoTransfer file

84

AWCustom32

17

86

B

backwards compatibility

18

bandwidth, increasing during file transfer

Banyan

18

binary files

70

bitmaps, transferring in clipboard

34, 36

blanking screen configured by host

102

configured by remote

67

81

C

cable modems configuring on host

47

configuring on remote

58

overview

cache file

128

30

call back

99

caller accounts

adding

96

password protecting

104

restricting access to drives

specifying privileges

100

caller privileges

Callers tab

44

100

cancelling host

52

CAPI

101

Search the online Help index for more information. 147

configuring on host

47

configuring on remote

57

customizing connections

135

enhancements in pcAnywhere

carrier detect

137

case-sensitive passwords

103

certificate store

configuring

explained

110

108

certificates

106, 108

changes, in pcAnywhere

chat sessions

34, 37

Class D address range

54

14

16

34, 36

clipboard, transferring contents cloning explained of folders

90

90

preparing for

ColorScale

67

78

COM ports

customizing

136

for host connections for remote connections

comparing folders

78

compression, of files

80

47

56

computer drives, restricting remote access

Conference tab

45

conferencing

52

53

choosing an IP address

configuring a host

53

explained

52

starting a session

using routers

54

54

configuring

automatic file transfers

caller accounts

96

direct connections

encryption

107

56

file transfer preferences host computer

45

85

81

modem connections network connections

57

58

remote computer

55

confirmation prompts, for file transfer

connecting to a host

62, 64

to a remote computer

51

82

101

148 Search the online Help index for more information.

connection devices cable modems

COM ports

47, 58

47, 56 digital subscriber lines

for hosts

46

47, 58

for network connections

ISDNs

47, 57

LPT ports modems

47, 56

47, 57

47, 58

Connection Info tab

on host

44

on remote

62

connection item icons

32

connection items

adding on host

44

adding on remote

61

defined

31

password protecting

103

connection types, guidelines for choosing

contacting Symantec

18

copying files and folders

78

80 crash recovery, during file transfer

Ctrl+Alt+Del command

CTS

137

35

customization features

15

28

D

DCD

137

default modem

57

deleting

files

77

folders

77

logged information desktop area

66

dialing properties

118

customizing

129, 132

entering manually

58

for modem connections dial-up networking explained

13

digital subscriber lines connection devices

overview

30

57

47, 58

direct connections configuring on remote connection devices

47

56

customizing

136

directory services

configuring

129

Directory Services tab

124

disk space requirements

22

display adapter requirements display, full-screen

34

22

documentation

Administrator’s Guide

DOS

18

configuring on remote

overview

30

18

downloading, Live Updates

DSL

configuring on host

47

26

58

E

editing.

See

modifying encryption defined

105

of logon information

pcAnywhere

configuring

109

defined

109

performance trade-offs

110, 111

107

public-key certificate store certificates

108

configuring

107

108, 110

explained key pairs wizard

106

111

108, 112

symmetric

configuring

explained

109

106

encryption level indicator

Encryption tab

124

35

ending

host sessions

52

remote sessions

35, 71

error checking

event logging

136

generating reports

on a central server

117

116

on Windows NT and Windows 2000

overview

113

115

setting up

114

Event Logging tab

124

F

file compression

File Manager file transfer

74

34

80

doing automatically finding files quickly

84, 85

75

improving performance

including subfolders

82

80

modifying preferences pausing remote control

81

81

recovering from crashes

80

starting

from host

83

from remote

83

without a remote session

startup location

79

switching to remote control

84

84

tagging by wild card of files

75

76

of folders

file transfer mode

76

56, 57, 59

File Transfer tab

124

files

comparing

deleting

77

78

renaming

77

selecting overwrite options synchronizing

89

75

finding files and folders

flow control

137

folders cloning

90

comparing

deleting

77

78

renaming

77

selecting overwrite options synchronizing

FTP authentication

89

95

Full product, explained

23

80

80

Search the online Help index for more information. 149

G

gateways

17

global options, modifying

Go list

75

123

H

hiding host status dialog box

Host Communications tab

124

48

host connection items

configuring

45

creating

44

customizing

125

defined explained host icon

50

31

43

host keyboard, locking

host name, specifying

host online menu

50

67

125

23

Host Only product, explained

Host Operation tab

host screen blanking

67

124

matching to remote

resizing on remote

66

66

switching focus

67

host sessions accepting calls from remote blanking screen

102

125

48

51 calling a remote

51

configuring connection devices

48

configuring startup options ending

49, 52

playing back

70

recording

118

securing

48, 98, 102

specifying host name

starting automatically timing out

103

transferring files

83

using Internet

29

waiting for connections

50

with multiple remote users

host, defined

12, 43

HTTP authentication

HTTPS authentication

95

95

52

46

150 Search the online Help index for more information.

I

improving performance

inactivity time-out

103

138 infrared connections

installation of upgrades

23

37

preparation for

procedures

24

21

Integrated Services Digital Networks.

See

ISDN

Integrity Checker.

See Symantec pcAnywhere

Administrator’s Guide

Internet connections

29

IP address, for conferencing

IPX

18

53

ISDN configuring on host configuring on remote customizing

134

47

57

K

key pairs

111

keyboard, locking

67, 102

L

LAN Host Only product, explained launching host sessions

48, 50

remote in file transfer mode

23

56, 57, 59

LDAP authentication

Microsoft-based

Novell-based

95

94

Web-based

95

Lightweight Directory Access Protocol authentication

Microsoft-based

Novell-based

Web-based

95

95

94

LiveUpdate locking

26

caller accounts

104

connection items

103

host keyboard

NT workstation

67

48

log files

archiving

118

deleting

118

generating on pcAnywhere logging

generating reports

117

of pcAnywhere events

on a central server

116

114

logging on automatically

60

logon encrypting

securing

98

110, 111

LPT ports

56, 136

for host connections

47

114

M

main window

32

microprocessor requirements

Microsoft-based authentication

22

94

minimizing host

48

modem connections

calling back remote

99

changing dialing properties

configuring

57

connection devices

47

using dialing properties

129

customizing

133

entering dialing properties manually

57

using Voice First

modifying

51, 65

AutoTransfer procedures

87

color levels

67

file transfer preferences

global options

123

79

host connection items online preferences

66

45

remote connection items monitor, blanking on host mouse, locking

102

102

62

multicast.

See

conferencing multiple connections on host

52

to hosts

65

58

N

NDS authentication

NetBIOS

58, 132

95

Netscape LDAP authentication

95

network connections configuring on remote connection devices specifying IP

59

47

58

using NetBIOS protocol using SPX protocol

132

network protocols new features

14

58

132

notification, of logon attempts

NT service

98

Novell Bindery Services authentication

Novell Directory Services authentication

95

95

NT caller authentication

94

48

O

OLE automation

15

online menu for host

50

for remote

33

online registration

online services

17

25

online software updates optimization

26

online toolbar

63

operating system requirements

39

22

option sets

124

overwriting files, during file transfer

80

P

Packager.

See Symantec pcAnywhere

Administrator’s Guide

parallel ports

47, 56, 136

parity

136

passwords

for caller accounts

for connection items for screen savers

48

104

103

103

making case-sensitive

pcA Config

17

pcAnywhere new features

14

overview

11

pcAnywhere authentication pcAnywhere encryption

109

94

Search the online Help index for more information. 151

pcAnywhere File Manager

accessing

74

adding files and folders deleting files and folders

77

77

77

renaming files and folders

pcAnywhere log file

114

pcAnywhere Manager

32

pcAnywhere Packager.

See Symantec

pcAnywhere Administrator’s Guide

performance cache file

128

new features

16

ways to improve

37

Playback Control Panel

69

Policy Manager.

See Symantec pcAnywhere

Administrator’s Guide

preferences for file transfer

79

modifying globally

preinstallation procedures

printing, during a session

123

21

35

privileges, on host

100

Protect Item tab on host

45

on remote

62

protecting caller accounts

104

connection items

103

host sessions

48, 102

public-key encryption certificate store

108, 110

certificates

configuring

106, 108

107

explained

106

key pairs

111

software wizard

112

R

RAM requirements

22

RAS.

See

remote access server

Readme file recording ending

21

68

playback

70

starting from host

118

starting from remote

68

152 Search the online Help index for more information.

recording sessions redialing host

60

34

registering pcAnywhere

25

Remote Access Perimeter Scanner.

See Symantec pcAnywhere Administrator’s Guide

remote access server explained

13

Remote Communications tab

remote computer, defined

13

124

remote connection items

adding

61

customizing

defined

31

127

explained modifying

55

62

remote control

defined

13, 55

pausing during file transfer

remote control system tray

66 remote control toolbar

remote desktop

33, 63

66

remote icon

63

remote networking remote online menu

13

33

remote online toolbar

33, 63

81

Remote Only product, explained

Remote Operation tab

124

remote printing

35

Remote Printing tab remote sessions

124

capturing screens

71

23

conducting with multiple hosts

conferencing with multiple users

65

52

ending

71

60

logging on automatically playing back

70

recording starting

62

68

transferring files using Internet

29

83

using voice first

65

viewing screen shots

71

waiting for host connections

removed features

17

removing pcAnywhere

26

renaming, files and folders

77

reports, generating from logs

117

64

resizing screen

34

resolution requirements

restarting host computer

routers, in conferencing

RTS

137

22

35

54

S

screen captures taking of recorded sessions taking of sessions

34

viewing

71

screen savers

screen scaling

48

34, 66

screen, blanking on host scripting

17

securing host sessions security

48

102

70

case-sensitive passwords

103

encrypting logon information

110, 111

for host sessions

102

performance trade-offs

107

protecting caller accounts

104

protecting connection items

103

security features

14

Security Options tab on host

45

on remote serial ports

customizing

62

136

for host connections

47

for remote connections

56

Service and Support

139

session recording

34

session status indicator sessions

35

capturing screen shots defined

13

ending from host

52

71

ending from remote playing back

70

recordings

68

security features

102

viewing screen shots

71

71

Settings tab on host

44

on remote

62

settings, modifying globally

123

SNMP traps.

See Symantec pcAnywhere

Administrator’s Guide

software updates, downloading software wizards

for encryption

for optimization

108

39

overview

SpeedSend

80

19

SPX

58, 132

26

starting automatic file transfers conferences

54

host automatically

48

remote control sessions

86

62

remote in file transfer mode

start-up location, for file transfer

startup options for hosts

48 status dialog box, hiding

48

56, 57, 59

79

subfolders, including in file transfer superuser privileges

100

Symantec Web site

18

symmetric encryption configuring

109

explained

106

synchronization by file type explained

89

89

of folders

89

preparing for

78

tagging by wild card

tagging folders

system requirements

76

22

system tray

66

76

82

T

tagging by wild cards

files

75

folders

76

76

TAPI configuring on host

47

configuring on remote

57

134 customizing connections

task switching on host

TCP/IP

58

35

Search the online Help index for more information. 153

Technical Support

time-out

toolbar

98, 103

for remote

63

139

on remote desktop

transferring

graphics

34, 36

33

of files automatically

84

Windows clipboard contents

34, 36

traps, SNMP.

See Symantec pcAnywhere

Administrator’s Guide

U

uninstalling pcAnywhere

unsupported features

updating pcAnywhere usability features

16

17

26

26

usage examples, for pcAnywhere

11

V

video settings connections

125

virus scanning

17

voice conversations, over modem

65

voice first calls accepting

51

initiating from remote

voice mode

34

65

W

waiting

for host connection

64

for remote connections

Web site, for Symantec

18

95

Web-based authentication wild card patterns

76

window tracking

67

Windows 2000 ports for

56

50

22 system requirements

Windows 3.X

Windows 9x

18

ports for

56

system requirements

22

154 Search the online Help index for more information.

Windows caller authentication

Windows NT

ports for

56

system requirements

task switching on host wizards for optimization

39

22

35

for public-key encryption

overview

19

94

108, 112

Y

Yahoo! Pager

18

advertisement

Was this manual useful for you? Yes No
Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Related manuals

Download PDF

advertisement

Table of contents