Preview

Windows Remote Desktop: Use and Set-Up Procedures

Good Essays
Open Document
Open Document
912 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Windows Remote Desktop: Use and Set-Up Procedures
Windows Remote Desktop: Use & set-up procedures
Using Windows Remote Desktop
The Remote Desktop feature in Windows allows you to control your computer from another office or from home. Remote Desktop allows you to use the applications on your office computer, and access your data without being in your office.
Caution! There is a risk that technologies which allow you to access your desktop may be exploited by others to attempt to do the same. Be careful to properly secure your desktop to minimize this risk.
Information to configure your Office computer can be found at the following links for the various versions of Windows:
Note: You will need to install VPN on your home computer before you can use Remote Desktop.
Windows 7
Windows 8
Configuring your Windows 7 office machine for Remote Desktop
If you would like to connect to your work computer from home, and your desktop work computer is running Windows 7, then you will need to set up your work computer to allow you access. You do this from the Control Panel by selecting “Allow remote access” from the System category:

You need to allow remote access as shown below:

Select “Select Users”, and add your userid. Note: you need to be administrator to do this.

Using Remote Desktop to connect to another computer
If you have Windows 7 or Windows 8 on your home computer, it is very easy to connect to your computer at work. Remember that you need to leave your office computer on.
1. Click on the Start button, point to All Programs, point to Accessories, and then click on Remote Desktop Connection. Or just search for Remote Connection.
2. In Computer window, type the computer name for your office computer. If you don't know your computer name, you will need to find out at work On your office computer, double-click on the System icon in Control Panel, then click on the Computer Name tab. You will see an entry for Full Computer Name.
3. Click Connect.
4. The Log on to Windows dialog box appears. Type in

You May Also Find These Documents Helpful

  • Good Essays

    The Workstation Domain includes all workstations approved on the company network. No personal devices or removable media may be used on this network. All devices and removable media will be issued by the company for official use only. To access any workstation, a user will need to be first verified, then setup with an account to be logged in with a username and pass code adhering to the IT departments set standards. All systems will undergo regular updates and be provided with anti-virus and anti-malware software for system monitoring. Access Control Lists (ACLs) will be drawn up to appropriately define what access each individual will have. Any violations will cause an immediate suspension of privileges and again the person(s) in violation will be subject to company executives decisions and/or the authorities for punitive action.…

    • 471 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Documents NETW240 Wk4 Lab

    • 1983 Words
    • 10 Pages

    If the remote console is not displayed automatically in the main window (or popup) click the Connect icon located in the tools bar to start your session.…

    • 1983 Words
    • 10 Pages
    Satisfactory Essays
  • Good Essays

    There will be 25 employees at the main office and 15 employees at the two new locations. Each employee will have their own workstation at their employed location. Each employee will have their own unique user id and password to log into their workstations. Each employees profile will be set up so they can log into any workstation at all three locations. All the profiles will be connected to a public shared drive that gives all employees access to all documentation under this drive. Each employee will also have a private drive that will give them access to private documentation at any location they may be working at. There are 10 employees that will be traveling to different locations when needed. Although the employees have the capability of logging onto any workstation and/or customer relations workstation at either location; we will also provide laptops and/or tablets connected to the network they will be able to access their profiles…

    • 598 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The Remote Access will provide the Virtual Private Networks with services that the users can use to access the corporate networks over the Internet as it they were directly connected. This remote access will enable the remote…

    • 623 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Lab 18

    • 490 Words
    • 3 Pages

    In this exercise, you will create a connection that enables the workstation to connect to your server using virtual private networking.…

    • 490 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Employees will be also using the workstation domain is where they will connect to the company’s network. Tight security and access controls will be enforced on company equipment and users must have proper access rights…

    • 539 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The workstation domain is where a user can connect to the business network through the local area network. This can be done by laptops, phones, tablets, and desktops. Each workstation requires a user ID and password. To prevent unauthorized access pass word protection should be enabled. A strong password should consist of uppercase, lowercase letters and special characters. If a workstation is idle for a certain amount of time there should be automatic screen lock, which requires the user to reenter their password for access. Certain user should only have the ability to make changes like downloading and installing something to internet access. This along with an anti-virus program will reduce threats like viruses and malware. So if a virus was present on a workstation it will be removed before it spreads throughout the network.…

    • 347 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Unit 9 D1

    • 508 Words
    • 2 Pages

    The reason why all the staff have to be able to log on to any networked computer is so they don’t have to move everything over by peer to peer network or keep everything on a USB, this will save time for each worker and make it a lot easier as anyone can work anywhere so if someone is ill downstairs then someone from upstairs can cover easily.…

    • 508 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Comp230 wk4 Ilab

    • 822 Words
    • 4 Pages

    To start simply click on the named Workstation from the device list (located on the left hand side of the screen) and click the Power on from the in tools bar. In some cases the devices may power on automatically.…

    • 822 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It 240 Week 2 Appendixb

    • 565 Words
    • 3 Pages

    I would suggest installing a Local Area Network, which will supply networking capabilities to computers in the company. The set up for installation requires a modem and wireless routers to be able to connect all computers to the internet, using Ethernet cables or wireless card connections will allow all computers access to the internet via a broadband connection. Each computer or client will be able to access all necessary information on the network this can be achieved by utilizing file sharing will allowing that company to dictate who has access to what information on the network. I would also suggest printer sharing, which will allow the company to dictate who has access to the printer. I would also utilize TCP/IP Protocols; which are the rules that allow computers to connect to one another and that enable computers and peripheral devices to exchange information.…

    • 565 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 8 Exercise 1

    • 196 Words
    • 1 Page

    It was no problem at all helping you setup the US office. I am sorry to hear that you are having these problems with your new computers. What I would recommend is setting up an Active Directory. Active Directory stores information about network components. It allows clients to find objects within its namespace. The term namespace (also known as console tree) refers to the area in which a network component can be located.…

    • 196 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    lab 6

    • 252 Words
    • 2 Pages

    4. Through command window determine the cause of the network connection loss using the IP configuration. Next renew the connection lost.…

    • 252 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 1 Upgrade letter

    • 297 Words
    • 2 Pages

    One feature that will also help your remote workstations is the offline file feature, which automatically store copies of the network files on your local drives, with this users can access files even when the network is unavailable. The learning curve is very low, users coming from Windows XP will find Windows 7 very easy due to the similar interface and applications.…

    • 297 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Ip Networking

    • 327 Words
    • 2 Pages

    The Workstation Domain is where all the user information will be confirmed, and an account will be set up. They will need to have a user name and password that is assigned to them by the IT department, before they can access the systems, application or data. No personal devices or removable media will be allowed on the network, and all systems will undergo regular updates, and have anti-virus and anti-malware installed on each workstation for monitoring. There will also be an Access Control List (ACL) drawn up to define what access each individual will have on the network.…

    • 327 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    221 - Use office equipment

    • 2807 Words
    • 12 Pages

    The computers have lots of important features. A lot of confidential information and documents are kept safe in protected electronic files on the computer such as PAS (patient attendance system). We also have intranet, which I mostly use to access…

    • 2807 Words
    • 12 Pages
    Powerful Essays