Symantec 14541094 User Guide - Page 204

Setting inactivity time limits for sessions, Using encryption to protect data, Hosts, Properties

Page 204 highlights

204 Securing your computer and sessions Using encryption to protect data 4 In the Caller Properties window, on the Security tab, select one of the following: Host and Remote Host Remote Lets both users control the keyboard and mouse Locks the keyboard and mouse on the remote computer during a session Locks the keyboard and mouse on the host computer during a session 5 Click OK. Setting inactivity time limits for sessions Unless the host is configured as a conference host, only one remote user can connect to a host computer at a time. Other remote users are denied service until the original remote user disconnects. You can protect the host from denial of service by limiting the length of time that a user can stay connected and by configuring the host to automatically disconnect after a specified length of inactivity. This option sets a time limit for all sessions. Symantec pcAnywhere also lets you configure time limits for individual callers. When you set a time limit for a session, you should ensure that you allow remote users sufficient time to perform their tasks. See "Setting time limits for callers" on page 199. To set inactivity time limits for sessions 1 In the pcAnywhere window, in Advanced View, on the left navigation bar, click Hosts. 2 In the right pane, under Hosts, right-click the connection item that you want to configure, and then click Properties. 3 In the Host Properties window, on the Security Options tab, under Session Options, check Disconnect if inactive. 4 Select the time-out period. 5 Click OK. Using encryption to protect data Encryption is a method of encoding or scrambling data to prevent unauthorized users from reading or tampering with the data. Modern methods of computer

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313

4
In the Caller Properties window, on the Security tab, select one of the
following:
Lets both users control the keyboard and mouse
Host and Remote
Locks the keyboard and mouse on the remote computer
during a session
Host
Locks the keyboard and mouse on the host computer during
a session
Remote
5
Click
OK
.
Setting inactivity time limits for sessions
Unless the host is configured as a conference host, only one remote user can
connect to a host computer at a time. Other remote users are denied service until
the original remote user disconnects. You can protect the host from denial of
service by limiting the length of time that a user can stay connected and by
configuring the host to automatically disconnect after a specified length of
inactivity.
This option sets a time limit for all sessions. Symantec pcAnywhere also lets you
configure time limits for individual callers. When you set a time limit for a session,
you should ensure that you allow remote users sufficient time to perform their
tasks.
See
“Setting time limits for callers”
on page 199.
To set inactivity time limits for sessions
1
In the pcAnywhere window, in Advanced View, on the left navigation bar,
click
Hosts
.
2
In the right pane, under Hosts, right-click the connection item that you want
to configure, and then click
Properties
.
3
In the Host Properties window, on the Security Options tab, under Session
Options, check
Disconnect if inactive
.
4
Select the time-out period.
5
Click
OK
.
Using encryption to protect data
Encryption is a method of encoding or scrambling data to prevent unauthorized
users from reading or tampering with the data. Modern methods of computer
Securing your computer and sessions
Using encryption to protect data
204