Vector PC-Duo Technical Information Page 27

  • Download
  • Add to my manuals
  • Print
  • Page
    / 147
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 26
PC-Duo overview
27
relationship
Gateway-Host
relationship
Gateway
Host
No
Gateway-managed (Master & Host are not in same domain)
Master-Gateway
relationship
Master
Gateway
Yes
Gateway-Host
relationship
Host
Gateway
Yes
Authorization
One of the strongest features of PC-Duo remote support solutions is the fine-grained
access control. For example, to perform remote support, you must have the following:
Proper credentials with which to connect to the Host computer
Authorization to view the Host computer remotely
Authorization to control the Host computer remotely
Your credentials are established when you connect to a Host computer (or to a PC-Duo
Gateway), and persist until the connection breaks. You can configure access and other
rights directly on the Host computer for peer-to-peer connections. Alternatively, you can
use the PC-Duo Gateway to enforce custom access rights policies on PC-Duo Master
users, roles, or groups for Gateway-managed connections.
Auditing
PC-Duo Gateway provides a detailed log of connection attempts, actions and other
activities that occur in the network. This log is also customizable and exportable to 3rd
party reporting products using standard formats.
PC-Duo Gateway also features screen recording for any Host in contact with a Gateway,
whether or not there is an active remote support connection. With this feature, PC-Duo
Master users can keep a visual log of activities going on in the network.
Encryption
To ensure privacy of communications between PC-Duo applications across the network,
PC-Duo provides advanced encryption using Advanced Encryption Standard (AES) block
ciphers and Secure Hashing Algorithm (SHA-1). This protection will be automatic and
transparent every time two PC-Duo 11.0 components or later are communicating with
each other.
By default, PC-Duo Express and PC-Duo Enterprise uses AES 256-bit encryption,
however other encryption options can be set, including:
AES encryption (256-bit key) with SHA1 hash
AES encryption (192-bit key) with SHA1 hash
Page view 26
1 2 ... 22 23 24 25 26 27 28 29 30 31 32 ... 146 147

Comments to this Manuals

No comments