RemoteFX vGPU makes it possible for multiple virtual machines to share a physical GPU. This feature was introduced in Windows 7 and was removed as an option for users in Windows Server 2019. We are now aware that the current implementation of RemoteFX vGPU appears susceptible to security vulnerabilities (see the FAQ section for CVE details). RemotePC provides a quick, secure, and easy alternative to VPN. Your remote desktop is just a few clicks away; work productively from anywhere, any device over any network. TLS v 1.2 and AES 256-bit encryption ensures secure communication. Connect from anywhere - manage work emergencies. SolarWinds Dameware Remote Support (DRS) SolarWinds DRS is a real-time remote computer. Remote computer access -Access your office PC from home or provide remote support and remote IT management. Remote computer access software for home, office, or for remote IT access, with unattended remote access & built-in remote support tools.
As we are moving forward with remote classes, there is a new tool called Remote PC where you can access your office computer from home, if you are working from home. We will need a minimum of 24 hours’ notice to install the software, send the email invite and send the instructions.
You will receive an email from [email protected] saying:
[email protected] has invited you to create a RemotePC account.
Create account now!
With RemotePC, you will be able to access your computers from any PC, Mac or mobile devices, from anywhere!
After some testing, there is a new way to remote into your PC besides the steps mentioned above. After you login, go to the top right corner of your login of Remote PC and click install and download RemotePC Viewer:
Note: If you have a WVC laptop at home, you will not be able to install it due to administrator rights. You will need to bring the laptop to the IT building to have an IT tech install it for you.
While using the web version, there are several tools to use.
Another way to access RemotePC is the Desktop Application.
Open Remote PC with the prompt. If you have more than 1 monitor, you will be shown the message indicating that you have more than one monitor. If you do not want to show this message again, click the box and then press OK.
At the top of the screen, you will see different options:
Applies to: Configuration Manager (current branch)
This topic contains security and privacy information for remote control in Configuration Manager.
Use the following security best practices when you manage client computers by using remote control.
|Security best practice||More information|
|When you connect to a remote computer, do not continue if NTLM instead of Kerberos authentication is used.||When Configuration Manager detects that the remote control session is authenticated by using NTLM instead of Kerberos, you see a prompt that warns you that the identity of the remote computer cannot be verified. Do not continue with the remote control session. NTLM authentication is a weaker authentication protocol than Kerberos and is vulnerable to replay and impersonation.|
|Do not enable Clipboard sharing in the remote control viewer.||The Clipboard supports objects such as executable files and text and could be used by the user on the host computer during the remote control session to run a program on the originating computer.|
|Do not enter passwords for privileged accounts when remotely administering a computer.||Software that observes keyboard input could capture the password. Or, if the program that is being run on the client computer is not the program that the remote control user assumes, the program might be capturing the password. When accounts and passwords are required, the end user should enter them.|
|Lock the keyboard and mouse during a remote control session.||If Configuration Manager detects that the remote control connection is terminated, Configuration Manager automatically locks the keyboard and mouse so that a user cannot take control of the open remote control session. However, this detection might not occur immediately and does not occur if the remote control service is terminated.|
Select the action Lock Remote Keyboard and Mouse in the ConfigMgr Remote Control window.
|Do not let users configure remote control settings in Software Center.||Do not enable the client setting Users can change policy or notification settings in Software Center to help prevent users from being spied on. If one user changes it, it can allow a different user on the same machine to be viewed remotely. |
This setting is for the computer, not for the logged-on user.
|Enable the Domain Windows Firewall profile.||Enable the client setting Enable remote control on clients Firewall exception profiles and then select the Domain Windows Firewall for intranet computers.|
|If you log off during a remote control session and log on as a different user, ensure that you log off before you disconnect the remote control session.||If you do not log off in this scenario, the session remains open.|
|Do not give users local administrator rights.||When you give users local administrator rights, they might be able to take over your remote control session or compromise your credentials.|
|Use either Group Policy or Configuration Manager to configure Remote Assistance settings, but not both.||You can use Configuration Manager and Group Policy to make configuration changes to the Remote Assistance settings. When Group Policy is refreshed on the client, by default, it optimizes the process by changing only the policies that have changed on the server. Configuration Manager changes the settings in the local security policy, which might not be overwritten unless the Group Policy update is forced.|
Setting policy in both places might lead to inconsistent results. Choose one of these methods to configure your Remote Assistance settings.
|Enable the client setting Prompt user for Remote Control permission.||Although there are ways around this client setting that prompts a user to confirm a remote control session, enable this setting to reduce the chance of users being spied upon while working on confidential tasks.|
In addition, educate users to verify the account name that is displayed during the remote control session and disconnect the session if they suspect that the account is unauthorized.
|Limit the Permitted Viewers list.||Local administrator rights are not required for a user to be able to use remote control.|
Managing client computers by using remote control has the following security issues:
Do not consider remote control audit messages to be reliable.
If you start a remote control session and then log on by using alternative credentials, the original account sends the audit messages, not the account that used the alternative credentials.
Audit messages are not sent if you copy the binary files for remote control rather than install the Configuration Manager console, and then run remote control at the command prompt.
Remote control lets you view active sessions on Configuration Manager client computers and potentially view any information stored on those computers. By default, remote control is not enabled.
Although you can configure remote control to provide prominent notice and get consent from a user before a remote control session begins, it can also monitor users without their permission or awareness. You can configure View Only access level so that nothing can be changed on the remote control, or Full Control. The account of the connecting administrator is displayed in the remote control session, to help users identify who is connecting to their computer.
Wall watch with alarm. By default, Configuration Manager grants the local Administrators group Remote Control permissions.
Before you configure remote control, consider your privacy requirements.