advertisement
C H A P T E R
Allowing others to control your computer
As a host, you let authorized remote users connect to your computer and take control of it. The remote user sees your computer screen and can open files or programs that you have given the user permission to access.
In a corporate setting, your system administrator may be responsible for setting up a host server so that people can connect to the network while away from the office. However, there are a number of reasons why you may need to set up your computer as a host. For example, you can set up your office computer as a host, so that your system administrator can remotely fix a problem, or so that you can connect to your office computer when working from home.
■
■
This chapter contains the following:
■
■
■
Letting multiple remote users hold a conference
Managing host connections
Host connection items contain the connection and security information that the host requires to let a remote user connect, perform operations, and end a session. These items appear as icons in the pcAnywhere Manager window. You can manage your host connections by creating new connection items that contain unique settings for each type of connection
43
Allowing others to control your computer that the host supports, or by modifying the settings of an existing connection item.
Creating a new host connection item
For more control over your connections, you can create unique connection items to handle connections from specific types of hardware devices or from specific users. For example, if many remote users need to connect to your computer, you can set up a separate connection item for each user that contains a unique password and file access permissions.
For more information, see
“Setting up a host computer” on page 45.
To create a new host connection item
1
In the pcAnywhere Manager window, click
Hosts
.
2
On the File menu, click
New
.
Modifying a host connection item
The settings on the host connection item’s property page are grouped by tabs. This table explains where to find the settings that you need.
Tab
Connection Info
Settings
Callers
Lets you For more information, see
Select the connection device for sessions that use this connection item.
A host can wait for a connection on two separate devices.
“Selecting the host connection method” on page 46.
Control the options for a remote control session, including when to start and end a session and what to do if a remote user loses the connection.
“Controlling the host session” on page 47.
Select a method for verifying that a user has permission to connect to the host, set up logon accounts for individuals or user groups, and specify what level of access the user should have.
“Setting up caller accounts” on page 96 and
“Specifying caller privileges” on page 100.
44
Setting up a host computer
Tab Lets you
Security Options Set security options for connections and logons and data encryption levels for remote control sessions.
For more information, see
“Securing your computer and sessions” on page 93 and
“Using encryption to protect data” on page 105.
Conference
Protect Item
Set up a conference, so that multiple remote users can log on to the host.
Protect the connection item with a password.
“Letting multiple remote users hold a conference” on page 52.
“Protecting your configuration settings” on page 103.
To modify a host connection item
1
In the pcAnywhere Manager window, click
Hosts
.
2
Right-click the connection item that you want to modify, then click
Properties
.
Setting up a host computer
Before remote users can connect to your computer, you must set up your computer to allow the connections. You must specify the connection device, what method to use to ensure that remote users have permission to access your computer, and what to do after the session has ended. You can also prevent others from viewing or inadvertently cancelling your host session.
This information is stored in a host connection item file, which appears as an icon in the pcAnywhere Manager window. pcAnywhere provides three default connection items: direct, modem, and network, each of which contains unique connection and security settings.
For more information, see
“Managing host connections” on page 43.
45
Allowing others to control your computer
Selecting the host connection method
Whether you set up a host to wait for a connection from a remote computer or to initiate a connection to a remote computer, you must specify what type of device your computer uses to handle connections.
You can set up a host to wait for a connection from two different devices.
For example, you can set up your office computer to wait for either a modem connection from your home computer or a direct connection from your laptop computer. A host can accept only one connection at a time.
After establishing a connection on one device, the other device is not available until the session ends.
You can also control the settings of some types of connection devices such as a modem or communications port.
For more information, see
“Customizing connection devices” on page 131.
To select the host connection method
1
In the pcAnywhere Manager window, click
Hosts
.
2 Right-click the connection item that you want to configure, then click
Properties
.
46
Setting up a host computer
3
4
On the Connection Info tab, select up to two connection devices:
■
For modem connections, select the name of your modem, which is listed at the top of the device list.
■
For network connections, select the network protocol (TCP/IP, SPX,
NetBIOS) that the host uses.
If you are using a cable modem or digital subscriber line, such as
ADSL or DSL, you must use TCP/IP.
For direct connections, select an available port.
■
An LPT port is recommended; however, if you are using Windows
NT or Windows 2000, you must select a COM port.
Click
OK
.
If an ISDN device is installed and configured properly on the computer, pcAnywhere adds it to the list of connection devices. ISDN connections are handled differently, depending on your location.
For more information, see
“Customizing ISDN connections” on page 134 or
“Customizing European ISDN connections” on page 135.
To configure an ISDN connection
1
In the pcAnywhere Manager window, click
Hosts
.
2
3
Right-click the connection item that you want to configure, then click
Properties
.
On the Connection Info tab, do one of the following:
■
In Europe, check ISDN via CAPI.
4
■
In any other location, select the name of your ISDN device.
Click
OK
.
Controlling the host session
For each host connection item, you can control when to start the host, what to do after ending a session, and how to protect the security of the host during and after a session.
47
Allowing others to control your computer
To set the host startup options
1
In the pcAnywhere Manager window, click
Hosts.
2 Right-click the connection item that you want to configure, then click
Properties
.
48
3 On the Settings tab, select from among the following host start-up options:
■
Check
Launch With Windows
to automatically start a host session when the host computer is started.
■
■
Check
Use Windows Screen Saver
to launch a Windows screen saver whenever the host is waiting for a connection.
Add a password to prevent unauthorized users from cancelling the waiting host.
Check
Run Minimized
to hide the status dialog box.
■
■
A host icon appears in the system tray when waiting for a connection.
(NT only) Check
Lock NT Workstation
to prevent unauthorized users from cancelling the waiting host.
(NT only) Check
Run As A Service
if you are launching a host in
Windows NT.
Setting up a host computer
You can also control what to do after an unexpected loss of connection.
Normally, a session ends when either the host or the remote user cancels the session. However, network or equipment problems might cause either the host or the remote to lose a connection. A connection might also be dropped because of a security issue, such as an unauthorized user trying to break in; therefore, it is important to secure the host after a session ends.
You can choose different options for handling an abnormal end of session and a normal end of session.
To secure the host after a session ends
1
In the pcAnywhere Manager window, click
Hosts
.
2
Right-click the connection item that you want to configure, then click
Properties
.
3
4
5
On the Settings tab, do one of the following:
■
Click
Wait For Anyone
to wait for another connection.
■
Click
Cancel Host
to prevent other connections.
When configuring security options for an abnormal end of session, select how many minutes to wait before proceeding with the security option.
Check
and secure by
, then do one of the following:
■
Click
Logoff user
.
■
■
Click
Restart host computer
.
(NT only) Click
Click
OK
.
Lock NT Workstation
.
Protecting the host computer
The first line of defense in protecting your computer and network from unauthorized access is to select the strongest method of user authentication that your computer environment can support. User authentication is the method by which a remote user who attempts to connect to your computer is checked against a list of valid users to ensure that the remote user has permission to access your computer. pcAnywhere requires that you select some method of user authentication for a host session. You can further control the level of access a remote user has to your computer once a connection has been established. For instance, you can restrict a remote user’s access to specific files.
49
Allowing others to control your computer
For more information, see
“Securing your computer and sessions” on page 93.
Starting a host session
You can host a remote control session in one of three ways:
■
Launching a host to wait for connections from authorized remote users
■
For more information, see
“To wait for a call from a remote computer” on page 51.
Initiating a connection with a remote computer, then allowing the remote user to take control
For more information, see
“To call a remote computer” on page 51.
■
Accepting a voice first connection over a telephone line, then switching to data mode, using the same connection
For more information, see
“To wait for a voice first call from the remote” on page 52 and
“To make a voice first modem connection to the host” on page 65.
When you start a session, a host icon appears on the system tray on your
Windows desktop. Unless you select security measures to hide the activity on your screen or lock your keyboard and mouse, you can access the host online menu by right-clicking the host icon.
Host online menu
Host icon
Using the host online menu, you can display status information, end a session, and initiate file transfers.
For more information, see
“Ending a host session” on page 52 and
“Transferring files” on page 82.
Waiting for a connection
When you launch a host session, your computer waits for connections from authorized remote users, using the connection device that is selected in the host’s Connection Info property tab. If two devices are selected, the host waits for a call on both devices. However, the host can accept only
50
Starting a host session one type of connection at a time. When a connection is established on one device, the other device is not available until the session ends.
Use this method if the host computer is running unattended, or if you do not need to interact with the remote user. For example, use this method if you want to connect to your office computer from home.
To wait for a call from a remote computer
1
In the pcAnywhere Manager window, click
Hosts
.
2
Double-click the host connection item that you want to run.
Calling a remote computer
The host computer can initiate a connection with a remote computer. The remote computer resembles host behavior in that it must be waiting for the connection. However, unlike a typical host session, after the connection is established, the remote computer controls the activities on the host. Use this method for added security if you do not want remote users to initiate connections with your computer.
To call a remote computer
1
In the pcAnywhere Manager window, click
Hosts
.
2
Right-click the host connection item that uses the same connection device that the remote computer is waiting on, then click
Call
Remote
.
3
Do one of the following:
■
For dial-up or modem connections, type the telephone number for the remote computer, then click
OK
.
■
For network connections, type the host name or IP address, then click
OK
.
Once the connection is made, the remote user can take control of the host computer.
Accepting a voice first call
Voice first connections require a modem. The remote and host users have a voice conversation and then switch to data mode, using the same connection. Use this method to save time if you need to speak with the host user over the telephone before starting the remote control session.
51
Allowing others to control your computer
The remote user initiates the call, and the host computer must be waiting for the call.
To wait for a voice first call from the remote
1
In the pcAnywhere Manager window, click
Hosts
.
2
3
Right-click the modem connection item that you want to use, then click
Voice First
.
When you answer a call from the remote user, a dialog box appears on both the host and remote computers.
Click
OK
when you are finished with your conversation.
The remote control session can begin after you both hang up the receiver.
Ending a host session
Either the host or remote can end a session. The security settings that you select on the Settings property tab determine whether the host waits for another connection or is cancelled.
For more information, see
“To secure the host after a session ends” on page 49.
To end a session from the host
■
On the host online menu, click
End Session
.
Letting multiple remote users hold a conference
Conferencing lets multiple remote users connect to a single host and simultaneously view the host’s activities. For example, you can host a conference to conduct a software training demonstration that can be viewed by any remote user who connects to the host PC.
A conference is basically a remote control session, except that multiple remote users connect to the host at the same time. The first caller can connect using any connection device; however, subsequent callers must use a TCP/IP network connection. The first remote user to establish a connection controls the host. Other users can view the activity on the host screen, but cannot take control of the host.
52
Letting multiple remote users hold a conference
Setting up the conference host
To let multiple remote users connect to your host computer, you must specify the information needed to make the connection. You can start with an existing host connection item or create a new one.
For more information, see
“To create a new host connection item” on page 44.
For more information, see
“Setting up a host computer” on page 45.
To configure a conference host
1
In the pcAnywhere Manager window, click
Hosts
.
2 Right-click the host connection item that you want to use, then click
Properties
.
3
4
On the Conference tab, check
Enable conferencing
.
Select one of the following options:
■
Obtain IP Address Automatically
Selecting this option lets your network server automatically assign an available Class D IP address. (Conferencing uses a form of communication called multicast, which requires a valid Class D address.)
53
Allowing others to control your computer
5
6
■
Specify IP Address
Select this option if you know the IP address and want to type it in.
The address must be a valid Class D IP address within the range of
225.1.1.1 through 239.254.254.254.
If you are using routers to increase the broadcast area of the conference, select the number of routers you want to use in the
Allow
Conference Over “x” Routers
list box.
Click
OK
.
Starting a conference
The steps for starting a conference are almost the same as starting a remote control session.
To start a conference
1
2
Configure the computer that will host the conference.
For more information, see
“Letting multiple remote users hold a conference” on page 52.
On the computer that will host the conference, start a host session.
3
4
For more information, see
“Starting a host session” on page 50.
On the remote computer that will control the host computer, start a remote control session.
This computer can connect to the host using any connection method, provided that method is supported by the host.
For more information, see
“Starting a remote control session” on page 62.
On the remote computers that will participate in the conference, connect to the host computer using a TCP/IP network connection.
54
advertisement
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Related manuals
advertisement
Table of contents
- 1 Symantec pcAnywhere™ User’s Guide
- 3 CONTENTS
- 9 Getting started
- 11 Introducing Symantec pcAnywhere
- 11 What you can do with pcAnywhere
- 12 How pcAnywhere works
- 12 Understanding the terms host and remote
- 13 Understanding remote control
- 13 How remote control differs from remote networking
- 14 What’s changed in this version
- 14 Security enhancements
- 15 Increased customization
- 16 Improved performance
- 17 Removed features
- 18 Where to find more information
- 18 Information on the Symantec Web site
- 18 Information on the pcAnywhere CD
- 19 Using pcAnywhere software wizards
- 21 Installing Symantec pcAnywhere
- 21 Preparing for installation
- 22 System requirements
- 22 Choosing an installation option
- 23 If you have a previous version installed
- 24 Installing pcAnywhere
- 25 Opening pcAnywhere after installation
- 25 Registering pcAnywhere
- 26 Updating pcAnywhere
- 26 Uninstalling pcAnywhere
- 27 Understanding pcAnywhere basics
- 27 Choosing a connection method
- 29 Connecting over the Internet
- 30 About cable modems
- 30 About digital subscriber lines
- 30 About ISDN lines
- 31 Making connections
- 32 Introducing pcAnywhere Manager
- 33 Using the remote desktop
- 34 Using the remote online toolbar
- 35 Printing remotely
- 36 Transferring the contents of the Windows clipboard
- 37 Chatting with other users
- 37 Improving performance
- 38 Issues that affect performance
- 39 Discovering optimum performance settings
- 41 Getting connected
- 43 Allowing others to control your computer
- 43 Managing host connections
- 44 Creating a new host connection item
- 44 Modifying a host connection item
- 45 Setting up a host computer
- 46 Selecting the host connection method
- 47 Controlling the host session
- 49 Protecting the host computer
- 50 Starting a host session
- 50 Waiting for a connection
- 51 Calling a remote computer
- 51 Accepting a voice first call
- 52 Ending a host session
- 52 Letting multiple remote users hold a conference
- 53 Setting up the conference host
- 54 Starting a conference
- 55 Controlling another computer remotely
- 55 Setting up a remote connection
- 56 Configuring direct connections
- 57 Configuring modem or ISDN connections
- 58 Configuring network connections
- 60 Including logon information
- 60 Automatically redialing if the host is busy
- 61 Managing remote connection items
- 61 Creating a new remote connection item
- 62 Modifying a remote connection item
- 62 Starting a remote control session
- 64 Connecting to a host computer
- 64 Waiting for a host connection
- 65 Initiating a voice conversation with host
- 65 Connecting to multiple hosts
- 66 Changing online preferences
- 67 Recording and replaying sessions
- 68 Recording a remote control session
- 69 Replaying recorded sessions
- 70 Saving information from a recorded session
- 71 Saving screens
- 71 Ending a session
- 73 Transferring files and folders
- 74 Navigating in pcAnywhere File Manager
- 75 Getting to files quickly
- 75 Tagging files and folders
- 75 Tagging files
- 76 Tagging folders
- 76 Tagging by wild card characters
- 77 Managing files and folders
- 77 Creating new folders
- 77 Deleting files and folders
- 77 Renaming files and folders
- 78 Copying files and folders
- 78 Comparing folders
- 79 Changing file transfer preferences
- 79 Specifying a start-up location
- 80 Selecting an overwrite option
- 80 Increasing file transfer performance
- 81 Changing preferences during a session
- 82 Transferring files
- 82 Transferring files during a remote control session
- 84 Transferring files without starting a remote control session
- 84 Performing automatic file transfers
- 85 Setting up an AutoTransfer file
- 86 Running an AutoTransfer procedure
- 87 Modifying an AutoTransfer procedure
- 88 Synchronizing and cloning
- 89 What is synchronization
- 89 Synchronizing folders
- 89 Synchronizing by file type
- 90 What is cloning
- 90 Cloning folders
- 91 Safeguarding your system and data
- 93 Securing your computer and sessions
- 93 Preventing unauthorized access
- 94 Choosing an authentication method
- 96 Setting up caller accounts
- 97 Configuring logon security
- 99 Calling back remote users
- 99 Limiting access privileges
- 100 Specifying caller privileges
- 101 Restricting access to computer drives
- 102 Securing sessions
- 103 Protecting your configuration settings
- 103 Making passwords case sensitive
- 103 Protecting your connection items
- 104 Protecting your caller accounts
- 105 Using encryption to protect data
- 105 What is encryption
- 106 What are the most common encryption methods
- 106 What is symmetric encryption
- 106 What is public-key encryption
- 107 Understanding the trade-offs
- 107 How pcAnywhere works with encryption
- 107 Using public-key encryption in pcAnywhere
- 109 Using symmetric encryption in pcAnywhere
- 109 Using pcAnywhere encryption
- 109 Setting up encryption on your computer
- 109 Setting up pcAnywhere or symmetric encryption
- 110 Setting up public-key encryption
- 113 Monitoring and recording sessions
- 113 Monitoring events in pcAnywhere
- 114 Generating a pcAnywhere log file
- 115 Logging events on Windows NT and Windows 2000
- 116 Sending logging information to a central server
- 117 Managing log files
- 117 Creating an activity log report
- 118 Archiving or deleting logged information
- 118 Recording host sessions
- 121 Customizing settings
- 123 Customizing Symantec pcAnywhere options
- 123 Viewing or modifying pcAnywhere settings
- 125 Configuring host options
- 125 Controlling host operations
- 127 Controlling host communications
- 127 Configuring remote options
- 128 Configuring remote operations
- 128 Controlling remote communications
- 129 Using directory services
- 131 Customizing connection devices
- 132 Customizing network connections
- 132 Customizing modem connections
- 132 Configuring dialing properties
- 133 Customizing modem settings
- 134 Customizing ISDN connections
- 135 Customizing European ISDN connections
- 136 Customizing direct connections
- 136 Configuring parallel LPT connections
- 136 Customizing serial COM port connections
- 138 Configuring infrared connections
- 139 Service and support solutions
- 143 CD Replacement Form
- 147 INDEX