To configure logon security
1
In the Symantec pcAnywhere window, on the left navigation bar, click Hosts.
2
In the right pane, under Hosts, right-click the connection item that you want
to configure, and then click Properties.
3
In the Host Properties window, on the Security Options tab, under Login
options, select any of the following:
Lets you use a combination of uppercase and
lowercase letters in a password.
This setting applies to pcAnywhere Authentication
only.
Make passwords case sensitive
Specifies how much time a remote user has to log on
successfully.
The default value is three minutes.
Limit time to complete login
Specifies the number of times that a remote user can
attempt to log on before being locked out.
The default value is three attempts.
Limit login attempts per call
Blocks connections from a specific IP address for the
number of minutes that you specify.
This setting applies only for TCP/IP connections in
which the remote user exceeds the maximum number
of login attempts per call.
Block failed IP addresses
4
Click OK.
Securing the host computer upon connection
Symantec pcAnywhere lets you secure the host computer after you have made a
remote connection.
To secure the host computer upon connection
1
In the Symantec pcAnywhere window, in Advanced View, on the left
navigation bar, click Hosts.
2
In the right pane, under Hosts, right-click the connection item that you want
to configure, and then click Properties.
195
Securing your computer and sessions
Protecting a host computer from unauthorized access
Содержание 14541094 - pcAnywhere Host & Remote
Страница 1: ...Symantec pcAnywhere User s Guide 10529206...
Страница 3: ...http www symantec com Printed in the United States of America 10 9 8 7 6 5 4 3 2 1...
Страница 7: ...Select your country or language from the site index...
Страница 8: ......
Страница 18: ...Contents 18...
Страница 30: ...Introducing Symantec pcAnywhere Where to find more information 30...
Страница 46: ...Installing Symantec pcAnywhere Post installation tasks 46...
Страница 90: ...Allowing others to control your computer What you can do during a host session 90...
Страница 136: ...Controlling another computer remotely Connecting to a computer that does not have a host running 136...
Страница 188: ...Automating file transfer and management tasks Running a command queue file 188...
Страница 220: ...Securing your computer and sessions Ways to assess host security 220...