About Dynamic IP Addresses.....................................................................................................................................8
Accessing RemotelyAnywhere through a Firewall or Router......................................................................................8
Mapping a Firewall Port to the Computer..............................................................................................................9
Accessing RemotelyAnywhere through a Firewall..................................................................................................9
Logging In to RemotelyAnywhere.................................................................................................10
Bypassing the Login Screen......................................................................................................................................10
RemotelyAnywhere User Interface................................................................................................12
Log Out and Timeout................................................................................................................................................14
RemotelyAnywhere System Tray Icon.......................................................................................................................14
Using Remote Control...................................................................................................................16
How to Start a Remote Control Session.....................................................................................................................16
What You Can Do During Remote Control.................................................................................................................16
How to View the Host Computer in Full Screen Mode............................................................................................16
How to Change the Color Quality of the Host Screen..............................................................................................17
How to Magnify a Section of the Host Screen........................................................................................................17
How to Change Screen Size During Remote Control..............................................................................................17
How to Switch Between Multiple Host Monitors during Remote Control................................................................18
How to Draw on the Host Screen..........................................................................................................................18
How to Use the Laser Pointer................................................................................................................................18
How to Copy and Paste Between Devices (Clipboard Synchronization)..................................................................18
How to Open the Windows Task Manager on the Host Computer (Ctrl-Alt-Del)......................................................19
How to Force Quit Applications on a Mac Host (Command-Alt-Escape).................................................................19
Working with Remote Sound ...............................................................................................................................19
How to Connect Drives during Remote Control......................................................................................................19
How to Blank the Host Screen During Remote Control..........................................................................................20
How to Block Input During Remote Control..........................................................................................................20
How to Optimize Remote Control Performance at Slower Connection Speeds.......................................................20
How to Print During Remote Control....................................................................................................................20
Customizing the Remote Control Toolbar..............................................................................................................21
Managing Files and Folders using the File Manager......................................................................22
How to Navigate and Sort Files using File Manager..................................................................................................22
How to Transfer Files Between Computers using File Manager.................................................................................22
How to Edit Files using File Manager.......................................................................................................................23
How to Select Files using File Manager....................................................................................................................23
How to Chat in RemotelyAnywhere...............................................................................................25
RemotelyAnywhere User Guideii
Contents
Sharing your Desktop with Another Person (Desktop Sharing)......................................................26
How to Send a Desktop Sharing Invitation................................................................................................................26
How to Disable/Enable or Delete a Desktop Sharing Invitation.................................................................................26
Customizing and Controlling your RemotelyAnywhere Experience................................................28
How to Optimize Remote Control Performance.........................................................................................................28
How to Set Keyboard and Mouse Priority for Remote Control...................................................................................28
How to Set Remote Control Permission Defaults (Host-side User's Consent).............................................................29
How to Display/Remove the RemotelyAnywhere System Tray Icon............................................................................29
How to Prevent RemotelyAnywhere Notification Messages from Appearing ............................................................30
How to Set the Host to Lock after Remote Control.....................................................................................................30
How to Set Remote Control Time-out.......................................................................................................................30
How to Set Compression for Data Transferred from the Host.....................................................................................31
How to Change Proxy Settings..................................................................................................................................31
How to View RemotelyAnywhere Log Files...............................................................................................................32
How to Record Remote Control Sessions..................................................................................................................33
How to Set RemotleyAnywhere to Report Software Errors........................................................................................34
Controlling Access to Host Computers...........................................................................................35
Using IP Filters to Protect your Computer from Intruders.........................................................................................35
How to Create an IP Filter Profile.........................................................................................................................35
IP Filtering Examples...........................................................................................................................................35
Detecting and Locking out Potential Intruders..........................................................................................................36
How to Set up a Denial of Service Attack Blocker..................................................................................................37
How to Set up an Authentication Attack Blocker ..................................................................................................37
Controlling Who can Access your Host Computers (User Access Control)..................................................................38
How to Specify User Access Rights in RemotelyAnywhere.....................................................................................38
Remote Management of RemotelyAnywhere Hosts.......................................................................43
Managing the Rights of Windows Users and Groups................................................................................................43
Monitoring Events in the Application, Security, and System Logs..............................................................................43
Working with Services.............................................................................................................................................44
Working with Processes...........................................................................................................................................44
Working with Drivers...............................................................................................................................................45
Editing the Registry.................................................................................................................................................45
Opening the Command Prompt................................................................................................................................46
Rebooting the Host..................................................................................................................................................46
Enabling Windows Automatic Logon (autologon).................................................................................................46
Viewing a Host Computer Desktop without Taking Control........................................................................................47
Working with Environment Variables.......................................................................................................................47
Changing System Time on a Host.............................................................................................................................48
Setting Automatic Change Process Priorities............................................................................................................48
How to Create an FTP Server....................................................................................................................................50
How to Create Users of an FTP Server.......................................................................................................................51
How to Create User Groups for FTP Servers..............................................................................................................51
How to Start and Stop FTP Servers...........................................................................................................................52
How to Manage Users of an FTP Server....................................................................................................................52
How to Change Group Membership of an FTP Server...........................................................................................52
How to Change User Permissions of an FTP Server...............................................................................................53
How to Set Upload/Download Ratio for an FTP User.............................................................................................53
iii
How to Disable FTP Users....................................................................................................................................54
How to Set up Home Directories and Quotas for FTP Users...................................................................................54
How to Set Maximum Number of Connections to an FTP Server............................................................................55
How to Change the Welcome Message for an FTP User........................................................................................55
How to View the Permissions of FTP Users...........................................................................................................56
How to View User and Server Statistics....................................................................................................................56
How to Secure an Externally Accessible FTP Server..............................................................................................56
How to View FTP Server Status.................................................................................................................................57
About Port Forwarding............................................................................................................................................58
How to Configure Port Forwarding.......................................................................................................................59
How to View Port Forwarding Status....................................................................................................................60
How to View Active Directory Settings..................................................................................................................60
How to Create an Externally Accessible FTP Server...................................................................................................60
How to Set User Access to an Externally Accessible FTP Server.............................................................................61
How to Set a Welcome Message to an Externally Accessible FTP Server................................................................61
How to Set ODBC Access to an Externally Accessible FTP Server...........................................................................62
Managing Schedules and Alerts...................................................................................................64
How to Monitor Your System....................................................................................................................................64
How to Set Up Email Alerts......................................................................................................................................64
How to Set Up Scheduled Tasks...............................................................................................................................64
Viewing CPU Load....................................................................................................................................................65
Viewing Disk Space Utilization.................................................................................................................................65
Viewing Drive and Partition Information..................................................................................................................66
Viewing Open TCP/IP Ports......................................................................................................................................66
Viewing a List of Open Files.....................................................................................................................................66
Viewing a List of Registry Keys Open on a Host.........................................................................................................67
Viewing a List of DLLs in Use....................................................................................................................................67
Viewing Telnet and SSH Connections........................................................................................................................67
Windows Tools in RemotelyAnywhere..........................................................................................69
Working with RemotelyAnywhere from Command Line................................................................70
How to Install RemotelyAnywhere on the Client.......................................................................................................70
How to Install RemotelyAnywhere on a Remote Computer.......................................................................................70
How to Uninstall RemotelyAnywhere from the Client................................................................................................71
How to UnInstall RemotelyAnywhere from the Host..................................................................................................71
How to Start, Stop, and Restart a Service..................................................................................................................71
How to Export and Import RemotelyAnywhere Configuration Settings......................................................................72
How to Install RemotelyAnywhere without Generating a Certificate..........................................................................73
How to Install RemotelyAnywhere with the MD5 Hash Server Certificate...................................................................73
How to Install RemotelyAnywhere with a Self-Signed Server Certificate....................................................................73
How to Install RemotelyAnywhere with the Usescbyca Option...................................................................................74
How to List Available RemotelyAnywhere Server Certificates with MD5 Hash............................................................74
How to Select RemotelyAnywhere Certificates for Use..............................................................................................74
How to Create a Self-Signed Server Certificate for RemotelyAnywhere.....................................................................74
How to List Available RemotelyAnywhere CA Certificates..........................................................................................74
How to Select CA-signed RemotelyAnywhere Server Certificate................................................................................75
How to Start and Stop FTP Servers in RemotelyAnywhere.........................................................................................75
RemotelyAnywhere is a remote administration tool that lets you control and administer Microsoft® Windows®-based
computers over a local area network or the Internet. RemotelyAnywhere acts as the host software on the machine
that is to be controlled or accessed. The client requires no special software. RemotelyAnywhere provides such
useful capabilities as Java-based desktop remote control, file transfer protocol (FTP) for downloading and uploading
of files, configuration of the Host, remote-to-local printing, and advanced scripting.
The client software is any Java- or ActiveX-enabled web browser, such as Internet Explorer (IE). Many
RemotelyAnywhere features can also be accessed through your smartphone browser.
• Minimize Downtime RemotelyAnywhere helps system administrators keep IT systems up and computer users
happy by offering a versatile remote-support toolkit. Support staff can often detect, diagnose, and solve problems
faster than local support using built-in operating system functions. Background access means the user is not
interrupted during the implementation of solutions.
• Deliver the Solution, Not the Person All RemotelyAnywhere features can be accessed securely from any web
browser. Support and diagnostics can even be delivered via smartphone browser. This means you can offer
genuine global support from anywhere, anytime.
• Stop Fighting Fires RemotelyAnywhere brings predictability to system management. By giving you monitoring,
scripting, and alerts, RemotelyAnywhere allows you to detect potential problems on all your systems before they
bring a halt to business. This ensures that you are often the first to know about workstation issues, ranging from
attempted security breaches to unstable software installations.
• Fast, Simple, Secure Enterprise Deployment RemotelyAnywhere was designed for professionals responsible for
large installations of workstations. The product is simple to install and configure on systems of anywhere between
a handful and thousands of computers. Five levels of security and built-in event logging give you the confidence
that your systems are safe.
• Keep Your Company Productive Less downtime means more productivity. RemotelyAnywhere can also reduce IT
operating costs for a low price.
RemotelyAnywhere System Requirements
• Microsoft Windows Vista (including 64 bit version), XP (including 64 bit version), 2000, or NT4 both on the host
and client computers.
• ActiveX or Java-compatible web browser on the client computer.
1. Download the remotelyanywhere.msi installer from http://www.RemotelyAnywhere.com/downloads.htm
and run it.
2. On the Welcome screen, click Next.
3. On the License Agreement screen, click I Agree if you agree to the terms and conditions.
4. The Software Options screen appears next. If the default listening port is acceptable, click Next. For more
information regarding customizing RemotelyAnywhere during installation, see Custom Installation on page 6.
5. The setup will then ask for confirmation of the destination location for the files for RemotelyAnywhere.
6. To change the destination folder, click Browse. Click Next to confirm the destination folder.
7. To start copying the files to their destination folder, click Next.
8. Click Finish to complete the Setup.
Custom Installation
1. Download the remotelyanywhere.msi installer from http://www.RemotelyAnywhere.com/downloads.htm
and run it.
2. On the Welcome screen, click Next.
3. On the License Agreement screen, click I Agree if you agree to the terms and conditions.
The Software Options page is displayed.
4. Specify the listening port that RemotelyAnywhere will use.
If the default port used by RemotelyAnywhere (2000) conflicts with an existing application or service, you can
change it here. Consult your Network Administrator before a port is assigned.
5. Optionally, on the Software Options you can copy configuration settings from an existing RemotelyAnywhere
installation.
6. After all options have been configured, click Next.
7. To change the destination folder, click Browse. Click Next to confirm the destination folder.
8. To start copying the files to their destination folder, click Next.
9. Click Finish to complete the setup.
Activating RemotelyAnywhere
Once you have installed RemotelyAnywhere you must activate it. If you have already purchased a license, you can
paste it into the space provided and activate the software.
RemotelyAnywhere User Guide6
If you have not purchased a license but would like to do so, you will be given the option to do this on the software
activation screen. If you purchase online, your license will be delivered immediately, so you can activate your
software without delay. Alternatively, you can contact our sales department.
When the installation is complete, the default Internet browser will open with the address of
http://MachineName:2000.
To access the host machine from a different machine, open an Internet browser and enter
http://111.111.11.1:2000 in the Location/Address line. 111.111.11.1 represents the IP address of
the host machine. 2000 represents the default port shown on the Software Options page during installation. If
you changed this port during installation, then use the specified port when accessing RemotelyAnywhere. On the
same network the machine name can also be used.
On the host itself you can access a machine by entering the loopback address http://127.0.0.1:2000 at
the Location/Address line. This address allows the user to communicate with the RemotelyAnywhere installation
only at the machine on which it is installed.
About Dynamic IP Addresses
Many DSL and cable Internet connections assign your machine a new IP address each time you connect to the
Internet. This is known as a Dynamic IP address. RemotelyAnywhere will work if you have a dynamic IP (DNS)
address, but RemotelyAnywhere needs to be able to track your IP address so that if it changes, the connection can
be maintained. There are dynamic DNS solutions available, often for free, which means that your machine can be
assigned a fully qualified and static domain name regardless of your IP address. Alternatively, under Preferences
> Network you can configure RemotelyAnywhere to send you an email message pointing to the IP address of your
remote host every time it detects a change. This way, you always know where to find your Host.
Accessing RemotelyAnywhere through a Firewall or Router
Most organizations today employ a range of security measures to protect their computer networks from hostile
intrusion. One of the common measures includes creating a firewall. A firewall is a system designed to prevent
unauthorized access to a private (internal) network. Firewalls can be implemented either as hardware or software,
or a combination of the two.
The most common use of a firewall is to prevent unauthorized intrusion from Internet users attempting to access
a private network or Intranet. A firewall examines all traffic entering or leaving the internal network/Intranet,
ensuring that traffic meets security criteria established by the Network Administrator.
RemotelyAnywhere can be configured to work with a firewall-protected computer. This requires mapping an
external, incoming port on the firewall to the internal IP and port on the computer running RemotelyAnywhere.
Routers, on the other hand, operate in much the same way as firewalls. They both offer the opportunity to open
and map ports to specific computers. For the rest of this document, the term "router" can be interchangeable with
"firewall."
From outside your LAN, you would gain access to the computer running RemotelyAnywhere by entering the firewall's
IP address and the port to which the desired machine is mapped. For example:
Router: External IP address: 111.111.111.111
RemotelyAnywhere User Guide8
RemotelyAnywhere computer: IP address: 192.168.0.10, Port: 2000 (port 2000 is the default but this can
also be changed).
Note: No two router models are exactly alike, and this document lacks sufficient space or scope to offer
detailed support for all routers and firewalls and RemotelyAnywhere. However, the overarching principles
for port forwarding remain the same. Should your router or firewall documentation prove confusing or
insufficient, there are several resources available on the Internet that provide exhaustive instruction and
help with configuring routers and firewalls.
Mapping a Firewall Port to the Computer
In this case, you would pick a port on the router, for example 5200, and map it to 192.168.0.10:2000.
The procedure for mapping ports from routers to computers is router-specific. Usually your router will have a
web-based interface that allows you to configure and maintain it. Sometimes router companies refer to this action
as Port Forwarding or Port Mapping.
Accessing RemotelyAnywhere through a Firewall
Having done the above, you will now be able to fully access the RemotelyAnywhere computer with the URL
http://111.111.111.111:5200 - that is the firewall's external IP, followed by the port you mapped to
the RemotelyAnywhere machine.
After entering the URL into your browser and pressing enter, you will see the RemotelyAnywhere Login screen.
RemotelyAnywhere will access the user database to authenticate the user. Initially, you will need to log on as
someone who is a member of the Administrators group. You can later change this default behavior by granting
NT users or NT groups access to RemotelyAnywhere under Security > Access Control.
By clicking NTLM you can use your current Windows login credentials to verify your identity on the Host. This option
is only available on local networks when accessing a Windows NT/2000 or XP computer. It will use your current
credentials (those you entered at the NT logon prompt on the computer running your browser) to identify you to
the Host.
Advanced Login Options
By clicking on Show advanced options in the login window the following additional options become available:
DescriptionOption
Go directly to Remote
Control
Full and Light Interfaces
SSL
Using these buttons you can select whether you want to go directly into Remote
Control, to File Transfer & Synchronization or to the Main Menu page - this last
option being the default.
You can choose between the full and light interfaces. RemotelyAnywhere’s full
interface is for DHTML capable browsers. The light interface is more suitable for old
browsers or users with slow Internet connections.
If you set up SSL Support for RemotelyAnywhere all traffic between the client and
the host will be encrypted using industry-strength 128-bit ciphers, protecting your
passwords and data. You can do this by going to Security > SSL Setup, and following
the step-by-step instructions there.
You can select the language of your RemotelyAnywhere user interface.Select language
Bypassing the Login Screen
You can force an NTLM login - and thus bypass the login screen entirely - by appending /ntlm/ to the URL with
which you access RemotelyAnywhere. For example, the URL http://MAILSERVER:2000 would become
http://MAILSERVER:2000/ntlm/. Ensure you include the trailing slash.
You can also use this method to bypass the menu system and access certain parts of RemotelyAnywhere directly:
Similarly, you can specify your username and password in the URL - thus forcing a normal login - by appending
the credentials in a /login:username:password:domain/ form to the URL with which you access
RemotelyAnywhere.
RemotelyAnywhere User Guide10
For example, the URL http://MAILSERVER:2000 would become
http://MAILSERVER:2000/login:username:password:domain/. Ensure you include the trailing
slash.
The Windows NT domain you are logging into is optional. If omitted, RemotelyAnywhere will try to authenticate
you to the computer on which it is running, then in the domain to which it belongs. The following URLs are examples:
The Dashboard gives you a detailed, up-to-the-minute diagnostic view of system information for an individual
RemotelyAnywhere computer.
Figure 1: RemotelyAnywhere Dashboard
Each section of the Dashboard displays a summary of activity.
DescriptionDashboard Section
System Information
Network Traffic
Provides details about the Host's operating system; the
CPU installed; the amount of physical and virtual memory
available and used; when the computer was last booted;
and which user is logged in.
Provides details of network traffic on the selected
network interface. The area at the top shows the loading
on the network interface: you can redraw this graph to
show the latest data by clicking Refresh. You may also
adjust the sensitivity of the graph by changing the values
in the Max Inbound/Outbound fields.
RemotelyAnywhere User Guide12
DescriptionDashboard Section
Events
Disk Drives
Processes
Scheduled Tasks
Most Recent Accesses
Installed Hotfixes
Provides an instant view of information that is generally
retrieved using the Administrative Tools > Event Viewer
in Windows. It displays the five (default value) most
recent events from the Application Event Log, Security
Event Log, and System Event Log. You can customize
which events are displayed by clicking Set Filter.
Displays the size and amount of used/free space on each
disk drive of the Host.
Provides an instant view of information similar to what
you can see in the Processes tab of Windows TaskManager. It displays information about the five (default
value) processes using most CPU resources; the
percentage of CPU each process is using; and the amount
of memory each process is using.
Provides an instant view of information similar to what
the Scheduled Tasks feature in Windows retrieves. It lists
the most recently executed scheduled tasks.
Provides details of the most recent accesses to the Host
using RemotelyAnywhere.
Provides details of the Windows Hotfixes (updates,
service packs, and so on) installed on the Host.
Journal
RemotelyAnywhere Dashboard Features
The Dashboard offers the following features:
Item-level details
Tooltips
Customizable layout
Journal
Provides a list of the five (default value) most recent
Journal entries. The Journal allows you to add useful,
time-stamped comments by typing in the input field and
clicking Add.
DescriptionDashboard Feature
To view detailed information, click a section heading.Section-level details
Click any item to view detailed information about the
event, process, disk drive, and so on.
Hold your mouse over an item to see a tooltip containing
a select set of details about the event, process, disk drive,
and so on.
You can drag, drop, minimize, maximize or reposition
the various sections. Also, you can change the number
of items to be displayed in certain sections (Events,
Processes, Scheduled Tasks, and Journal).
Use this feature to leave notes on the Host's desktop. For
example, notes on the current status of scheduled tasks,
or the reason the computer was remotely accessed.
You can filter Event messages. For information, see
Monitoring Events in the Application, Security, and System
Logs on page 43.
RemotelyAnywhere Performance Data Viewer
On every page of RemotelyAnywhere you can see a real-time Performance Data Viewer:
Figure 2: RemotelyAnywhere Performance Data Viewer
This java applet is to the right of the RemotelyAnywhere logo in the top frame. It shows CPU load (green) and
Memory load (red) and is updated every few seconds, so you can get instant feedback on the effects of performance
intensive processes. This graph can be disabled under Preferences > Appearance.
RemotelyAnywhere Quicklinks
QuickLinks are accessible from every page of RemotelyAnywhere. You can add your favorite pages to the QuickLinks
drop down menu wherever you see the star icon in the tool bar of the page you are viewing. You can also edit your
QuickLinks by clicking on Edit your QuickLinks in the QuickLinks drop-down menu.
The QuickLinks menu is situated in the top frame of the page so that your favorite pages are always only a click
away.
Log Out and Timeout
You can Log Out from RemotelyAnywhere by clicking Disconnect. If you are inactive for 10 minutes you will be
logged out automatically. You can set the session timeout interval under Preferences > Network.
RemotelyAnywhere System Tray Icon
RemotelyAnywhere includes a multi-purpose system tray icon that you can configure via Preferences > Appearance
> Systray Settings.
Systray menu options
Right-clicking the RemotelyAnywhere icon in the systray will bring up the following options:
RemotelyAnywhere User Guide14
DescriptionSystray Menu Option
Open RemotelyAnywhere
This option opens the RemotelyAnywhere client user interface:
Open RemotelyAnywhere Web
Interface
Initiate chat with
RemotelyAnywhere
Convert Remote Control
Recordings
Figure 3: RemotelyAnywhere client user interface
Starts RemotelyAnywhere on the local host and log you in using your network
credentials.
Opens a window that updates you on the current status of RemotelyAnywhere.Open Status Window
You can start a chat session with the user whose computer you are connected
to.
You can turn the RemotelyAnywhere service on and off.Switch Off/Switch On
You can invite a guest to view or control your desktop.Share my Desktop
This wizard converts RemotelyAnywhere remote control screen recording files
into an AVI file for playback in any media player.
Provides basic information about RemotelyAnywhere.About
Once connected to the host, click Remote Control on the left menu to start remote control.
From the Host Dashboard
Available on Windows hosts only.
Once connected to the host, click the Remote Control icon (not the text) on the Dashboard menu and select a remote
control client from the list.
What You Can Do During Remote Control
How to View the Host Computer in Full Screen Mode
In Full Screen Mode the host display covers the entire client display. Full Screen mode gives you the most realistic
"as if you were there" experience.
•On the Remote Control toolbar, click the Full Screen Mode button.
The RemotelyAnywhere interface is minimized and the host computer's display appears on your entire screen.
Only the Remote Control toolbar remains visible.
•To exit full screen mode, click the Full Screen Mode button again.
RemotelyAnywhere User Guide16
Tip: For best results during Full Screen viewing, go to Options > Resolution Settings and select Match
Resolution.
How to Keep the Remote Control Toolbar Visible During Full Screen Mode
In Full Screen Mode, the Remote Control toolbar will be hidden to allow maximum visibility.
•To keep the toolbar visible, click the pin icon on the Full Screen version of the Remote Control toolbar.
The toolbar will remain open.
How to Change the Color Quality of the Host Screen
Select a lower setting to optimize the amount of information transferred during remote control, or select a higher
setting to improve the quality of the image.
1. On the Remote Control toolbar, click Options > Color Quality.
The Color Quality options are displayed.
2. Select the appropriate setting.
Tip: Choose Automatically adjust color settings to allow RemotelyAnywhere to detect the optimal setting.
Your selection is applied immediately.
How to Magnify a Section of the Host Screen
The Magnifying Glass feature opens a box that you move on the host screen to view a small area in high resolution
without otherwise adjusting your resolution.
The Magnifying Glass is available when screen resolution is less than 100%.
1. On the Remote Control toolbar, click Options > Magnify.
The magnifying glass is activated.
2. Drag the box.
Any area within the box in displayed in high resolution.
3. Click the Magnify button again to deactivate the magnifying glass.
How to Change Screen Size During Remote Control
View the host display on the client device in a way that you find comfortable.
1. On the Remote Control toolbar, click Options > View.
2. Select the appropriate setting.
Your selection is applied immediately.
Tip: To change the actual screen resolution of the host display, edit the host Desktop Properties.
How to Switch Between Multiple Host Monitors during Remote Control
When connected to a host with two monitors, the Switch Monitors button will be available on the remote control
toolbar. Click this button to switch between monitors.
Also, there is a Monitors button in Options on the Remote Control toolbar. Click the Monitors button to switch
between monitors.
Tip: On a Windows PC, try this shortcut. Press Left CTRL key-Left Windows key-Right/Left
Arrow key to switch monitors. To see all monitors at once, keep moving through until you can see all
available monitors on the client display.
Note: The Java and HTML remote control clients do not offer multiple monitor support.
How to Draw on the Host Screen
Use the Whiteboard to activate a pencil tool that you can use to draw freehand images on the host computer's
screen.
1. On the Remote Control toolbar, click Options > Whiteboard.
The pencil tool is activated.
Note: You cannot control the host while Whiteboard is enabled.
2. Draw on the host screen.
The pencil tool leaves a red line on the host screen. All drawings appear on both the client and host.
3. To erase drawings, click Options > Whiteboard.
How to Use the Laser Pointer
The Laser Pointer is a small red dot that the client-side user moves around the host screen to highlight features
for the host-side user.
1. On the Remote Control toolbar, click Options > Laser Pointer.
To the host-side user, the laser pointer appears as a simple red dot.
Note: You cannot control the host while Laser Pointer is enabled.
2. To exit, click Laser Pointer again.
How to Copy and Paste Between Devices (Clipboard Synchronization)
Use Clipboard Synchronization to save time and avoid errors by directly copying and pasting information between
devices during remote control.
RemotelyAnywhere User Guide18
This feature is not available during Monitor Host Screen.
•On the Remote Control toolbar, select Options > Sync Clipboard.
Anything copied on either device is available to be pasted to the other.
How to Open the Windows Task Manager on the Host Computer (Ctrl-Alt-Del)
During a remote session, the Ctrl-Alt-Del key combination entered on the client will only be registered by
the client.
This feature is not available during Monitor Host Screen.
•On the Remote Control toolbar, click Options > Ctrl-Alt-Del button.
The Windows Task Manager opens on the host computer.
Tip: You can also use a hotkey to send the Ctrl-Alt-Del command to the host. The default is
Ctrl-Alt-Insert. To change the hotkey, open the host preferences and go to General > Remote Control
> Interaction and select a key combination using the Ctrl-Alt-Del Hotkey drop-down list.
How to Force Quit Applications on a Mac Host (Command-Alt-Escape)
This feature is not available during Monitor Host Screen.
•When controlling a Mac from a Windows PC, press Windows Key-Alt-Esc on the client keyboard.
The Force Quit Applications window opens on the host.
•When controlling a Mac from a Mac, click Options > Cmd-Alt-Esc on the Remote Control toolbar.
The Force Quit Applications window opens on the host.
Working with Remote Sound
Use the Remote Sound feature to listen to sounds played on the host computer while you are at the client.
Mute
To mute remote sound during remote control, click the loudspeaker icon on the Remote Control toolbar.
Adjust the volume
To adjust the volume during remote control, drag your mouse across the volume bars on the Remote Control
toolbar.
Change sound quality
To change sound quality during remote control, click Options > Sound on the Remote Control toolbar and adjust
the Quality slide bar.
How to Connect Drives during Remote Control
Use the Connect Drives feature to make files on the client accessible to the host without copying or moving any
data. To connect client-side drives to the host, click Options > Connect Drives on the Remote Control toolbar. You
can turn this feature on or off at any time.
Connect Drives does not function with the Flash remote control client.
Tip: To access connected client-side drives, open My Computer in Windows. Client-side drives are listed as
Network Drives.
Connecting Drives: Example
You have a Spyware cleaner program saved on a removable disk (such as a USB stick) attached
to the client. You want to run the Spyware cleaner on the host. Connect to the host and open
My Computer on the host. Under Network Drives, locate and run the executable file for the
Spyware cleaner to run it directly from the drive attached to the client. There is no need to
copy or move any files.
Note: Some programs may require additional configuration or a license key before
they will run on the host.
How to Blank the Host Screen During Remote Control
Protect your data by blanking the host display during a remote control session.
•On the Remote Control toolbar, click Options > Blank Screen.
You can turn this feature on or off at any time.
•If this is the first time you are using the screen blanking feature on the host, you will be prompted to install a
DPMS (Display Power Management Services) driver.
Not all monitors, video cards, motherboards, or BIOS support DPMS. Check with your hardware vendor if you
experience problems with the DPMS driver. In case of incompatibility, you may not be able to use this feature
with some host computers.
Anyone at the host device will see a blank screen on the physical monitor while the remote session is active.
How to Block Input During Remote Control
Lock the host keyboard and mouse to prevent anyone sitting at the host machine from entering data during a
remote control session.
•On the Remote Control toolbar, select Options > Lock Keyboard.
You can turn this feature on or off at any time.
How to Optimize Remote Control Performance at Slower Connection Speeds
Adjust your network connection speed to achieve optimal performance during remote control.
On the Remote Control toolbar, click Options > Network.
•Select Slow to optimize your connection on lower speed connections
•Select Fast to exploit a high bandwidth connection
•Select Auto to allow to detect the optimal settings
How to Print During Remote Control
You can print from the host computer to a printer connected to the client.
Make sure at least one printer is connected to the client.
Note: Remote printing does not function with the Flash remote control client.
RemotelyAnywhere User Guide20
1. Activate Remote Printing:
•On the Remote Control toolbar, click Options > Connect Printer.
Tip: You will be able to connect one or more printers when multiple client-side printers are available.
The selected printer (or the client's default printer if there is only one printer available) will be ready to receive
print jobs from the host.
2. On the host, print as you normally would during regular use.
3. Make sure the client printer is selected in the Print dialog box: [Printer Name] via
RemotelyAnywhere.
4. Click Print on the Print dialog box.
The file will print to the selected client-side printer.
Having trouble printing? See Troubleshooting Remote PrintingHaving trouble printing? Review this checklist and
instructions. .
Customizing the Remote Control Toolbar
Add icons to the remote control toolbar for easy access to favorite remote control features. All features available
under the Options menu can be added.
Navigate and Sort options are accessed via a drop-down menu on the File Manager toolbar. Shortcut keys are
available for each item.
Note: The host computer's files are displayed in the right frame, the client computer's in the left. Use the
Tab key to switch between the two frames.
Option
Show…
client)
Alt+F1Select left drive
Alt+F2Select right drive
Ctrl+GGo to folder…
Ctrl+4Sort by Date
DescriptionShortcut (Windows
Refreshes the folders on both the client and host computer.F5Refresh
Moves up to the parent directory.BackspaceUp
Displays the available root drives on the selected computer.Ctrl+BackspaceDrive list
Click to select the disk drive you want to view in the left
pane of the File Manager window.
Click to select the disk drive you want to view in the right
pane of the File Manager window.
Click this item to open a box where you can type the name
of a specific folder or directory you want to view.
Sort the directory contents by file name.Ctrl+1Sort by Name
Sort the directory contents by file type.Ctrl+2Sort by Type
Sort the directory contents by file size.Ctrl+3Sort by Size
Sort the directory contents by the date files were last
modified.
Select Show folders for all users, Show hidden files, and/or
Show system files in any combination.
How to Transfer Files Between Computers using File Manager
Transferring files between computers is as easy as selecting files and dragging them to the appropriate folder.
Otherwise, use the appropriate options on the File Manager toolbar.
Option
Icon (Windows
client)
client)
DescriptionShortcut (Windows
Copy a file or folder to your clipboard.Ctrl+CCopy
RemotelyAnywhere User Guide22
Option
Icon (Windows
client)
DescriptionShortcut (Windows
client)
Ctrl+XMove
Ctrl+SSynchronize
Ctrl+RReplicate
Cut a file or folder from the existing location
so you can paste it to a new location.
Update the current folders to the client and
host so that their contents are the same. Files
and folders that exist only on one side are
copied normally. If both folders contain one
or more files that are different on the client
and host, the newer version will be copied.
The folders must be open, not simply
selected.
Files and folders that do not exist in the
destination folder are copied normally. Files
that already exist in the destination folder
will be transferred from the source folder. If
a destination folder contains a file or a folder
that does not exist in the source it will bedeleted.
This is very useful if you update the Source
folder and want to push those changes to the
Destination.
How to Edit Files using File Manager
Edit options are accessed on the File Manager toolbar or by right clicking on a file. Shortcut keys are available for
each option.
Option
Icon (Windows
client)
client)
DescriptionShortcut (Windows
Create a new folder in the selected locationCtrl+NCreate Folder
Rename a selected file or folderF2Rename
Delete a selected file or folderDelete keyDelete
How to Select Files using File Manager
File selection options are accessed on the File Manager toolbar. Shortcut keys are available for each option.