You can configure stand-alone and centrally managed environments before installation to ensure optimum settings for your environment.
A user’s access and associated permissions in the enterprise are managed through address book settings in the DSM Explorer. Create an address book that includes the computers for which you want to grant access using the Add Users task from the Remote Control Permissions pane. Once you add the users or groups that you want to access the computers, you can further control the access by setting permissions for the users or group.
Note: This chapter is for advanced users of Remote Control. Entering incorrect information may result in the product not working properly.
This section contains the following topics:
Configuring in a Centrally Managed Environment
Configuring in a Stand-alone Environment
|
Copyright © 2013 CA.
All rights reserved.
|
|