Symantec 14541094 User Guide - Page 190

About authentication in pcAnywhere, Symantec, pcAnywhere Administrator's Guide

Page 190 highlights

190 Securing your computer and sessions Protecting a host computer from unauthorized access Secure the logon process You can protect the host computer from unauthorized access and denial of service attacks by limiting the number of logon attempts and by limiting the amount of time that a user has to log on. See "Configuring logon security" on page 194. Secure the host session You can use encryption to protect the data stream between the host computer and the remote computer. See "Using encryption to protect data" on page 204. Symantec pcAnywhere provides a number of options to help protect the security of the host session. For example, you can choose to receive a confirmation prompt before a remote user can connect to your computer, restrict control of the keyboard and mouse, and set inactivity limits for a session. See "Securing the host computer upon connection " on page 195. For modem connections, you can use the callback feature as a security measure. See "Calling back remote users" on page 197. Limit access to the host You can set up caller accounts to limit the access rights of a user computer or group of users on the host computer. See "About access rights" on page 198. You can also hide a host computer from network search results (for example, to minimize a server's exposure on a network). See "Hiding the host name from network search results" on page 196. Symantec pcAnywhere provides administrators with a number of global security options that help block unauthorized users at the point of entry. These options include serialization, centralized authentication, and strong encryption. For more information on managing security in pcAnywhere, see the Symantec pcAnywhere Administrator's Guide. About authentication in pcAnywhere The first line of defense in protecting your computer and network from unauthorized access is to select the strongest type of user authentication that your computer environment supports. In pcAnywhere, user authentication is the process by which a user's credentials are verified against a directory or access list to ensure that the user has permission

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313

You can protect the host computer from unauthorized access
and denial of service attacks by limiting the number of logon
attempts and by limiting the amount of time that a user has to
log on.
See
“Configuring logon security”
on page 194.
Secure the logon process
You can use encryption to protect the data stream between the
host computer and the remote computer.
See
“Using encryption to protect data”
on page 204.
Symantec pcAnywhere provides a number of options to help
protect the security of the host session. For example, you can
choose to receive a confirmation prompt before a remote user
can connect to your computer, restrict control of the keyboard
and mouse, and set inactivity limits for a session.
See
“Securing the host computer upon connection ”
on page 195.
For modem connections, you can use the callback feature as a
security measure.
See
“Calling back remote users”
on page 197.
Secure the host session
You can set up caller accounts to limit the access rights of a user
or group of users on the host computer.
See
“About access rights”
on page 198.
You can also hide a host computer from network search results
(for example, to minimize a server's exposure on a network).
See
“Hiding the host name from network search results”
on page 196.
Limit access to the host
computer
Symantec pcAnywhere provides administrators with a number of global security
options that help block unauthorized users at the point of entry. These options
include serialization, centralized authentication, and strong encryption.
For more information on managing security in pcAnywhere, see the
Symantec
pcAnywhere Administrator's Guide
.
About authentication in pcAnywhere
The first line of defense in protecting your computer and network from
unauthorized access is to select the strongest type of user authentication that
your computer environment supports.
In pcAnywhere, user authentication is the process by which a user's credentials
are verified against a directory or access list to ensure that the user has permission
Securing your computer and sessions
Protecting a host computer from unauthorized access
190