Tags
malware activity virus scope autoruns Proxy servers fallback flag Inactive discovered devices SNMP Apple Device Enrollment Program set up service explorer manually deploy Comodo EDR agent parent process multiple ticket selection selected tickets security events folder transfer discoveries network management remote folder TLS TLS1.2 pci dss pci compliance ITarian Portal Endpoint Manager vdi environment vdi clone environment instant clone documentation vendor notice security dashboard events resolution remote tool partner onboard itarian unknown file hunter TLS Encryption procedure parameters pass profiles history performance metrics real time remote endpoints download browse service URL Security Components system Global Software Inventory 2 minutes Integrate intagrate Active Directory Portable Interception SSL enable reporting Rule Threat Protection Rule Advance spam Customize archived outgoing incoming administrator validate domains add Antispam type PCI data loss Location Network information start software session extensions appoinments resource connection computers Comodo Rescue Disk infected opportunity opportunities custom relationship management quote COMODO-CRM protect mac device email notifications registry COM Quarantined point system restore msi contained applications processes security client events Release date department registration particular os section Two Factor Authentication Login interface dashboard report generate Direct Download Link One drive Google drive HIPS mode cleanup automatic suspicious suspicious certificates shellcode injection detect Elevated Access system user access default charging groups move current malware list store push IP address ip installer acronis auto-remediation server machine icon Product Logos Rebrand backup Device Control data Chromoting WebRTC ports Protocol skip offline manual time entries ticket assignee Help Guide Tour schedule Reschedule appointment unknown application protection virtual desktop Local Verdict server manage calculation cost configuration charging SD contract prepaid hours products classification inventory analyze Device list OS patches global search bar Tool bar Windows Defender Security Center file group white Citrix record SPF work billable time onsite email template template variables emails Gmail SMTP disable Add collaborators admin action Audit logs feature requests submit vote remotely Reset proxy swg secure web gateway dome error disk ticket detail page thread section tickets section internal notes Sub-help topic help topic features Application control white_list Patch Management child parent scheduled customized get to headers columns company restrict customer technician remote access list iOS devices field Reports iOS device APN Certificate MAC OS X options Linux block Comodo Client Communication (CCC) allow Comodo Client Security (CCS) network zones active component tray icon hide show packages additional install block port baseline installation package bulk implement restrict firewall endpoints security and communication global export virus import Database folders files define exclusions change staff admin rating check reassign assign permissions new role create for user of device enroll associated use how profile specific Removing Devices Uninstall windows profile Configuration templates latest version clients comodo file ratings monitoring custom All Devices Ratings Track widgets Agent valkyrie malware files Kill chain report automated establishing endpoint remote session Users prevent Android organization windows assets Mac OS billing identified threats Sort Closed inside Program executed containment service desk remote control Locally runs update scan antivirus SLA Business Hours control CCS Password access Client Auto Specific Device Response Application Third party Status View Logs intended devices alert fails Company Information Configure Verdict Patch Procedures Executable Comodo Internet Security ITSM Analysis Command Line Heuristic Filter Unrecognized Trusted File Rate Malicious Purge Calendar Device Exclusion USB Admin Panel Settings ticket Default system-wide Specific Path Details Monitor Multi Set Currency Connected Who Quick Actions Comparison Version Enterprise Managed Service Provider C1 Portal Remote management Comodo Remote Control ticket management staff panel assign tickets
More

How to take Remote Control of a device

Release Time
06/25/2017
Views
5857 times
Category
Remote Control
Tags

  • The remote control (RC) application lets you take over Windows and Mac devices to solve issues, install third party software, and run system maintenance.

  • Once installed, you can start the application from the Endpoint Manager interface or direct from your desktop.

  • This tutorial explains how to:

    • Install the application

    • Take control of a Windows or Mac OS device

    • Use the application to perform operations on the remote device

Process in brief:

  • Login to ITarian

  • Click ‘Applications’ > ‘Endpoint Manager’

  • Click ‘Devices’ > ‘Device List' > 'Device Management'

  • Select the device you want to control

  • Click the 'Remote Control' button above the table

    • Install the remote control application if required

  • Log in to the application with your ITarian username and password

  • Connect to the target device

Process in detail

  • Login to ITarian from your Windows or Mac OS device

  • Click ‘Applications’ > ‘Endpoint Manager’

  • Click ‘Devices’ > ‘Device List' > 'Device Management'

  • Select the device that you want to control

  • Click 'Remote Control'


     

    • Click 'Download Remote Control by ITarian'

    • Save the setup file and install it on your computer

  • From this point forward, the application will automatically open when you click the ‘Remote Control’ button.

  • You can also open the application outside of Endpoint Manager by clicking the tray icon on your desktop.

  • Next, log-in to the remote control application with your username and password:
     

 

There are two ways you can log in:

  • ITarian admins and technicians – Click the 'ITarian' tab and enter your ITarian account username and password

  • Endpoint Manager admins – Click the 'Endpoint Manager' tab and enter your sub-domain, username, and password:

 

  • Select your region and click 'Sign-in'

    • If two-factor authentication is enabled then you have to enter a code from the app on your mobile device
       




See this page If you haven’t set up two-factor, but would like to.

  • After login, the application shows a list of devices enrolled to your account:



     

  • Click the tree icon on the left to filter devices by company or device group:




     

  • Move your mouse over the device you want to control then click the icon on the right:


     

  • A connection request is shown to the end-user if so configured in the device profile:


     

  • You can configure these connection requests in the ‘Remote Control’ section of an endpoint manager profile. You have the following broad options:

  • The following notification appears on the endpoint when you have established control:


     

    You can now access the desktop of the remote computer:


     

  • Use the toolbar at the top of the interface to perform the following actions:

           

                            

       Full Screen - The remote desktop will cover your entire display, without a window-frame.

       Click the icon again to exit full-screen mode.

     

              

     

       Position - Click and drag the tool bar to your preferred location.

             

             

     

       Pin - Lock or unlock the tool bar to the title bar in full screen view.

               

     

                     

      

       Minimize/Maximize - Show/hide tool bar options.

               

       Actions - Send control commands to the endpoint.

       Send Ctrl + Alt + Del - (Windows only)
       Opens the Windows security screen.

       This lets you lock the computer, log the current user out of the machine, change passwords, view task manager, or shutdown/restart/hibernate the machine.

      Lock Session - Locks the remote endpoint. A password will be required to unlock it.

      Send Special Keys - If enabled, allows you to send key combination commands such as Ctrl+C, Windows+R, etc.

      Special key combinations depend on the operating system of the local device and the remote device. See the list of available special key combinations below.

                                             

       View - Change the display size of the remote desktop. The options are:

       Best Fit - Automatically adjusts the screen resolution for the best visual experience.

       Scaled - Displays the target desktop with the resolution of the admin computer

       Original - Displays the target desktop at its own resolution

       Fullscreen - Displays the remote desktop in full-screen view

     

     

       Multi-Screen - The multi-screen icon only appears if the target point endpoint has a multi-monitor setup. The drop-down shows all monitors connected to the endpoint and allows you to choose which to view.

                           

    • Select 'Switch Screen' to move to the next screen on the list
       
    • Select 'All Monitors' to view all connected screens simultaneously
       
    • Select an individual monitor to view it in stand-alone mode

     



Special Key Combinations

 

      Admin Device                    

                                                                                                              Remote Device

                                                     Windows

                                                                    Mac OS

      Windows

   'Windows' key is sent only to the remote device

   Shortcuts in combination with 'Windows' key are applied only to the remote device

    'Windows'/'Command' key is sent only to the remote device.

    Exceptions:

    Ctrl+Alt+Del

    Win+L

    PRINT SCREEN and NUMLOCK are not sent to the remote device

   NumPad digit keys always behave as arrow-keys on Mac OS

   'Context Menu' key is sent as zero scan code and appears as a key 'a'.

      Mac OS

   All shortcuts with the 'Command' key are applied to the remote device except 'Command+Esc’

  Command+Tab - Switches between applications

  F11 - Shows desktop

  Ctrl +Up Arrow - Shows all Windows

  Ctrl+Down Arrow - Shows active application Window

   If Apple is keyboard used:

   Media buttons (e.g. PLAY, STOP, MISSION CONTROL), POWER, EJECT keys and all system shortcuts with these keys are applied only to the local device.

   Shortcuts with COMMAND are applied to the remote device, except 'COMMAND' key+Esc

   Command+Tab - Switches between applications

   Ctrl +Up Arrow - Shows all Windows

   Ctrl+Down Arrow - Shows active application Window

    Fn+F11 - Shows desktop

    Fn+F12 - Shows Dashboard or enable standard key in Keyboard settings

    If non-Apple keyboard is used:

    Shortcuts with WIN are applied to the remote device, except 'WIN' key+Esc

    Command+Tab - Switches between applications

    Ctrl +Up Arrow - Shows all Windows

    Ctrl+Down Arrow - Shows active application Window

    F11 - Shows desktop

    F12 - Shows Dashboard