You, as an administrator, can define or modify the type of remote control operations that a user can perform on computers in the current asset group. For example, you may want one user group to have exclusive and secure control permissions for all host computers and other user groups to have more limited control, such as a corporate training user group with shared control and chat permissions only. If users attempt to connect with invalid permissions, the session will be rejected and added to a list of rejected sessions in the Rejected Sessions pane that you can view.
Note: The Rejected Sessions node and corresponding Rejected Sessions pane are only available when the DSM Explorer is connected to a CA ITCM [assign the value for rn in your book] domain manager. If the DSM Explorer is connecting to an older manager, this node will not be available.
To configure the type of remote control operations that a specified user can perform
The User Remote Control Permissions dialog appears.
The value of the selected permission is changed.
The specified user's remote control permissions are configured.
|
Copyright © 2013 CA.
All rights reserved.
|
|