Installation guide
Gateway Configuration
131
Chat: Determines if a PC-Duo Master user can be added to a private chat room
including the PC-Duo Host user, and any other PC-Duo Master users connected to the
same Host.
Remote Management: Determines if a PC-Duo Master user can issue WMI commands
to a PC-Duo Host and process responses via the Remote Management tab in the Master
Remote Desktop Window.
Bypass Connection Permission: Determines if a PC-Duo Master user can connect to a
PC-Duo Host without causing the Permission to Connect window to pop-up on the Host
even if it is set to do so.
Start Recording: Determines if PC-Duo Master user can record activity on any Host.
Take Input Control: Determines if PC-Duo Master user can take control of any Host,
from another remote user who has control.
Connect for Administration: Determines if PC-Duo Master user can connect to a Host
so PC-Duo Master user can view or modify PC-Duo Host settings.
Delete Host: Determines if PC-Duo Master user can delete any Host from the PC-Duo
Gateway. This removes all references to the Host.
Read Permissions: Determines if PC-Duo Master user can read permissions in the
Host Security tab.
Change Permissions: Determines if PC-Duo Master user can allow or deny
permissions in the Host Security tab.
Take Ownership: Determines if PC-Duo Master user can take ownership of
permissions in the Host Security tab away from another user. If PC-Duo Master user take
ownership of permissions, PC-Duo Master user can change them.
How effective security is calculated
Effective security for an individual managed Host is calculated by the Gateway by
sequentially applying the following configurable security policies:
―Host security‖ for an individual managed Host
―Host security for a group‖
Because effective security is calculated by the Gateway, it is not editable. However, since
the calculation of the effective security for a managed Host depends on configurable
security settings, by modifying these settings you can effect change to the managed Host
effective security.
Gateway computes effective security in one of two ways, depending on your Gateway
management options:
When user-based managed Host management is not enabled, the security of the
remote machine is considered only. The security is calculated using the following
sequence:
1 The individual managed Host security policy is applied first.
2 The group security policy for any group to which the managed Host belongs is applied
next.
In each case, denied access to features takes precedence over allowed access.
When user-based managed Host management is enabled, the security of both the
user (logged-in user at the console of the remote machine) and the remote machine is
considered. The security is calculated using the following sequence: