What you can do during a remote management
session
Table 6-1
lists the tasks that you can perform during a remote management
session.
Table 6-1
Remote Management tasks
Description
Task
Lets you view and control applications and processes that
are running on the host computer to which you are
connected.
See
“Managing tasks remotely”
on page 140.
Task Manager
Lets you run basic DOS commands on a host computer
(for example, ipconfig) and view the text-based results
locally.
See
“Running DOS commands”
on page 141.
Command Prompt
Lets you view all services that are running on the host
computer. You can start or stop a service, change its
startup mode, change its logon properties, and view
dependencies.
See
“Viewing services”
on page 143.
Services
Lets you view and edit text-based system files and save
your changes locally or on the host computer.
See
“Viewing and editing system files”
on page 145.
Edit System Files
Lets you remotely edit the system registry of a host
computer over a network or modem connection.
See
“Viewing and editing the system registry”
on page 146.
Edit Registry
Lets you view information about application, system, and
security events on the host computer and save the event
log files.
See
“Viewing the event log”
on page 147.
Event Log
Lets you view information about the programs and
software updates that are installed on the host computer
and uninstall them if necessary.
See
“Viewing and uninstalling programs”
on page 148.
Installed Programs
139
Supporting computers and servers remotely
What you can do during a remote management session
Summary of Contents for 14541094 - pcAnywhere Host & Remote
Page 1: ...Symantec pcAnywhere User s Guide 10529206...
Page 3: ...http www symantec com Printed in the United States of America 10 9 8 7 6 5 4 3 2 1...
Page 7: ...Select your country or language from the site index...
Page 8: ......
Page 18: ...Contents 18...
Page 30: ...Introducing Symantec pcAnywhere Where to find more information 30...
Page 46: ...Installing Symantec pcAnywhere Post installation tasks 46...
Page 90: ...Allowing others to control your computer What you can do during a host session 90...
Page 188: ...Automating file transfer and management tasks Running a command queue file 188...
Page 220: ...Securing your computer and sessions Ways to assess host security 220...