6
To refuse a connection with a computer that uses a different algorithm, do
one of the following:
■
If you are configuring a remote connection item, check Prevent
connections to hosts set for a different algorithm.
■
If you are configuring a host connection item, check Deny connections
from remotes requesting a different algorithm.
7
Click Public Key Encryption Wizard.
Follow the on-screen instructions to set up the private-key container and
certificate common name.
8
When you are finished, click OK.
Protecting configuration settings
You can protect your connection items and your caller accounts by setting a
password. Although it is important to choose a password that you can remember,
be sure to choose a password that is not easy for others to discover.
Your host and remote connection items contain the information that is needed
to establish a connection and run a session. This includes logon information and
security settings. Your caller accounts contain authentication information and
access rights for a user or group of users. By setting a password, you can prevent
unauthorized users from tampering with your settings or launching a session
without your permission.
To protect a connection item
1
In the Symantec pcAnywhere window, in Advanced view, on the left navigation
bar, do one of the following:
■
To protect host connection items, click Hosts.
■
To protect remote connection items, click Remotes.
2
In the right pane, right-click the connection item that you want to protect,
and then click Properties.
3
In the properties window, on the Protect Item tab, type a password.
4
Retype the password for confirmation.
5
Select the actions that should require a password.
6
Click OK.
Securing your computer and sessions
Protecting configuration settings
214
Summary of Contents for 14541094 - pcAnywhere Host & Remote
Page 1: ...Symantec pcAnywhere User s Guide 10529206...
Page 3: ...http www symantec com Printed in the United States of America 10 9 8 7 6 5 4 3 2 1...
Page 7: ...Select your country or language from the site index...
Page 8: ......
Page 18: ...Contents 18...
Page 30: ...Introducing Symantec pcAnywhere Where to find more information 30...
Page 46: ...Installing Symantec pcAnywhere Post installation tasks 46...
Page 90: ...Allowing others to control your computer What you can do during a host session 90...
Page 188: ...Automating file transfer and management tasks Running a command queue file 188...
Page 220: ...Securing your computer and sessions Ways to assess host security 220...