Previous Topic: ScenarioNext Topic: How to Deploy Stand-alone Hosts with Preconfigured Users


Users

Again, the IT administrator in our scenario has the overall responsibility of defining security requirements and managing all IT assets. Access is determined through configuration of agent policy and the use of a local address book. The IT administrator can also deploy stand-alone hosts with preconfigured users and import address books and permissions.

As stated earlier, the host user can decide whether or not a remote connection is allowed if the appropriate policy is enabled.

Note: For more detailed information about implementing Remote Control, see the Implementation Guide.