NOTE
Numara Remote is an add-on module. Numara Remote supports Windows Vista on the client machine provided the client obtains a patch from Numara Software. Contact Numara Software Support to obtain the patch.
Numara Remote allows you to control a user’s desktop remotely for troubleshooting purposes. FootPrints includes an email feature that can be used to send instructions for downloading and installing the Numara Remote Host application to customers.
There are two parts to Numara Remote:
The Host and Guest can reside on different machines, and even on different networks, as long as they can communicate via TCP/IP (dial-up is not supported). The Host and Guest machines can also be on different platforms.
The agent obtains the Guest software by selecting Communication | Remote Control from the Numara FootPrints Toolbar and then clicking the "To download Numara RemoteGuest, click here" link. The agent can then install the Guest over the web or download it to his or her computer and install it from there.
The agent performs this installation the first time he or she requires remote control. After that, the installation need not be repeated.
When the agent selects the Communication | Remote Control link from the Numara FootPrintsToolbar, the Numara Remote page is displayed in the main frame.
The customer must install the Numara Remote Host on his or her machine in order for the agent to use the Numara Remote Guest to control the customer machine. In order to do this:
For additional instructions on using Numara Remote, consult the online documentation that accompanies Numara Remote. To obtain the documentation, start the client and then click the Help button.
Agents can run Numara Remote such that it genuinely resembles sitting at the desktop. Instructions for this procedure can be found at http://technet2.microsoft.com/windowsserver/en/library/0866b48e-aa78-40b2-b150-47fc679300d91033.mspx.
Smart Card Authentication to Active Directory requires that the Security Server(s), Active Directory and Active Directory domain controllers be configured properly. Active Directory must trust a certification authority to authenticate users based on certificates from that CA. As with any PKI implementation, all parties must trust the Root CA to which the issuing CA chains.