You may have a very strict security policy in your company network with Internet access either restricted or entirely blocked. For example, if both computers reside on the same LAN, simply specify the LAN IP address of the target computer: New connection dialog Work in restricted or isolated environments With Remote Utilities you can connect from computer A to computer B without any web server in-between. You can use domain user credentials to authorize on a remote Host provided that you enabled Windows security authorization method in the Host settings: Host security settings.You can add more domain controllers to display in the Viewer. When you install the Viewer on a computer in Active Directory, the Viewer automatically fetches and displays the AD tree.Remote Utilities integrates with Active Directory in multiple ways: Connect through Host Use a single PC on your LAN as a gateway through which to connect to its peers on the same network.ĭeploy Remote Utilities client across your network and access unattended workstations and servers. Proxy server support Configure Remote Utilities to connect through your company's proxy server. Self-hosted server Use the self-hosted server for remote connection, address book sync and authorization. Unlimited one-to-many sessions Multitask by connecting to multiple remote PCs at once from the same machine. RDP-over-ID Use Remote Utilities as transport to start an RDP session over the Internet when the remote PC is not accessible directly by an IP address. UAC support User Access Control (UAC) prompts can be controlled remotely and are no longer an obstacle (using Host instead of Agent is required to override UAC). No installation and administrative rights are required. Attended access Provide spontaneous remote support over the Internet using the Agent module. The Host starts automatically as a system service. Unattended access Deploy the Host module for 24/7 access to remote workstations and servers. No complicated network configuration is necessary. Remote access over the Internet Use Internet-ID connection to bypass firewalls and NAT devices when connecting over the Internet. You can also seamlessly deploy the program in an Active Directory network. Remote access over LAN or VPN Establish direct connection to a remote PC using its IP address or DNS name.