Previous Topic: Add Users and User PermissionsNext Topic: Purge Rejected Sessions


Configure Host Remote Control Permissions

You, as an administrator, can define or modify the type of remote control operations that a user can perform on computers in the current asset group. For example, you may want one user group to have exclusive and secure control permissions for all host computers and other user groups to have more limited control, such as a corporate training user group with shared control and chat permissions only. If users attempt to connect with invalid permissions, the session will be rejected and added to a list of rejected sessions in the Rejected Sessions pane that you can view.

Note: The Rejected Sessions node and corresponding Rejected Sessions pane are only available when the DSM Explorer is connected to a CA ITCM [assign the value for rn in your book] domain manager. If the DSM Explorer is connecting to an older manager, this node will not be available.

To configure the type of remote control operations that a specified user can perform

  1. Right-click the user in the Remote Control Permissions pane, and click Properties.

    The User Remote Control Permissions dialog appears.

  2. Review the permissions—such as View, Exclusive Control, Shared Control, Chat, Send Files, Record, and so on—that are currently allowed.
  3. (Optional) Select a permission, modify its value, and click Change.

    The value of the selected permission is changed.

  4. Click OK.

    The specified user's remote control permissions are configured.