![]() R: Allow the user to view registry keys and values list installed applications.D: Allow the user to delete files remove shares and disconnect users from shared files.W: Allow the user to copy, paste, rename and edit files create and share folders edit attributes and access control lists.R: Allow the user to list drives, folders and files read and download files view file attributes, shared folder information and access control lists and use File Manager.By revoking this permission, you can temporarily disable a user's access to the host without having to clear any other permissions.Īllow the user to read (view-only) or write (change) settings under the Preferences menu.Īllow the user to read (R) or delete (D) Windows event logs. This allows you set the IP address (or range) from which the user can access the host.Īllow the user to log into the host. Use this drop-down list to apply an existing IT filter profile to this user. Limit the host user to Main Menu view of the HTML interface (as opposed to the Dashboard). Give the user full control over all features. Some options are only available on computers running Set the user's permissions using the following options.In the Name field, type (or browse for) the name of the user for whom you want to set permissions.Result: The User Access Controls dialog is displayed. Under User Access Control, click Show details.This provides an extra layer of security by forcing the remote user to type the exact name of the chosen domain. Select this option to clear the list of active domains in the host authentication dialog box. Hide list of domains on the Remote Access login screenĪvailable on Windows hosts only. Select this option to grant full permissions to anyone with administrative rights on the host computer. Under User Access Control, select from the following general options: Option.From a client device, connect to the host Main Menu and follow this path: Preferences > Security.From the host computer, open the LogMeIn Control Panel and follow this path: Options > Preferences > Security.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |