RDM2020 1 PDF
RDM2020 1 PDF
1
2| Remote Desktop Manager
Table of Contents
Part I Overview 13
1 ............................................................................................................................................................................................
Remote Desktop Manager 14
2 ............................................................................................................................................................................................
Security 15
3 ............................................................................................................................................................................................
System Requirements 17
Prerequisite Softw are
............................................................................................................................................................................ 18
4 ............................................................................................................................................................................................
The Devolutions Platform 18
Rem............................................................................................................................................................................
ote Desktop Manager Agent 19
Rem............................................................................................................................................................................
ote Desktop Manager Jum p 21
2 ............................................................................................................................................................................................
Checklist for Individuals 26
Select the Data Source type - Individuals
............................................................................................................................................................................ 27
3 ............................................................................................................................................................................................
Checklist for Teams 29
Select the Data Source type - Team s
............................................................................................................................................................................ 31
Set ............................................................................................................................................................................
up a team folder for default settings 33
4 ............................................................................................................................................................................................
Creating an Entry 35
5 ............................................................................................................................................................................................
Managing Credentials 37
3 ............................................................................................................................................................................................
Uninstall 83
4 ............................................................................................................................................................................................
Update 83
2 ............................................................................................................................................................................................
Style 87
3 ............................................................................................................................................................................................
Theme 91
4 ............................................................................................................................................................................................
Top Pane 92
Quick Access Toolbar
............................................................................................................................................................................ 93
5 ............................................................................................................................................................................................
Navigation Pane 95
Opened Sessions
............................................................................................................................................................................ 97
Favorite Entries
............................................................................................................................................................................ 100
Most Recently Used Entries
............................................................................................................................................................................ 103
6 ............................................................................................................................................................................................
Content Area 103
Em............................................................................................................................................................................
bedded Sessions 104
Dashboard
............................................................................................................................................................................ 107
Wake-on-LAN
............................................................................................................................................................................ 109
7 ............................................................................................................................................................................................
Panes (Footer) 112
Attachm ents
............................................................................................................................................................................ 114
............................................................................................................................................................................................
8 Status Bar 116
Search/Filter
............................................................................................................................................................................ 116
Grab Input
............................................................................................................................................................................ 119
9 ............................................................................................................................................................................................
Tray Icon 120
3 ............................................................................................................................................................................................
Create a data source 142
4 ............................................................................................................................................................................................
Data Source Types 146
Advanced Data Sources
............................................................................................................................................................................ 151
Devolutions
....................................................................................................................................................................
Online Database 152
Devolutions
....................................................................................................................................................................
Passw ord Server 157
MariaDB
.................................................................................................................................................................... 164
Microsoft
....................................................................................................................................................................
SQL Azure 171
Microsoft
....................................................................................................................................................................
SQL Server 195
MySQL
.................................................................................................................................................................... 210
Private
....................................................................................................................................................................
Vault 218
DropBox
............................................................................................................................................................................ 220
Google Drive
............................................................................................................................................................................ 226
Devolutions Online Drive
............................................................................................................................................................................ 228
SQLite
............................................................................................................................................................................ 234
WebDAV
............................................................................................................................................................................ 240
XML
............................................................................................................................................................................ 243
5 ............................................................................................................................................................................................
Import/Export Data Source 248
6 ............................................................................................................................................................................................
Lock Data Source 250
7 ............................................................................................................................................................................................
Offline mode 251
Offline Read/Write
............................................................................................................................................................................ 255
............................................................................................................................................................................................
8 Manage Cache 259
3
4| Remote Desktop Manager
9 ............................................................................................................................................................................................
Private Vault 261
Private Vault Search
............................................................................................................................................................................ 262
4 ............................................................................................................................................................................................
Contact 427
5 ............................................................................................................................................................................................
Credentials 430
Credential Redirection
............................................................................................................................................................................ 433
7 ............................................................................................................................................................................................
Folder 485
8 ............................................................................................................................................................................................
Synchronizer 491
Active Directory
............................................................................................................................................................................ 492
Active
....................................................................................................................................................................
Directory Sample Structure 498
Am............................................................................................................................................................................
azon EC2 500
9 ............................................................................................................................................................................................
VPN 504
Microsoft VPN
............................................................................................................................................................................ 507
Microsoft
....................................................................................................................................................................
VPN Phone-book Management 510
10 ............................................................................................................................................................................................
Macros/Scripts/Tools 516
Pow erShell (Local)
............................................................................................................................................................................ 519
Tem plate
............................................................................................................................................................................ 523
11 ............................................................................................................................................................................................
Variables 524
5
6| Remote Desktop Manager
Import
....................................................................................................................................................................
Netw ork Scan 600
Import
....................................................................................................................................................................
Sessions 601
Import
....................................................................................................................................................................
Logins 602
Import
....................................................................................................................................................................
Contacts 603
Export
............................................................................................................................................................................ 605
Encrypted
....................................................................................................................................................................
Html 608
Options
............................................................................................................................................................................ 610
Advanced
.................................................................................................................................................................... 611
Import
....................................................................................................................................................................
Options 617
Export
....................................................................................................................................................................
Options 619
My............................................................................................................................................................................
Account Settings 622
My....................................................................................................................................................................
Personal Credentials 624
User....................................................................................................................................................................
Specific Settings List 626
Tem plates
............................................................................................................................................................................ 628
Creating
....................................................................................................................................................................
Templates 633
Default
....................................................................................................................................................................
Settings 639
Passw
....................................................................................................................................................................
ord Templates 641
............................................................................................................................................................................................
3 Home 646
4 ............................................................................................................................................................................................
Actions 646
Com m ands
............................................................................................................................................................................ 651
RDP .................................................................................................................................................................... 651
VNC .................................................................................................................................................................... 652
SSH ....................................................................................................................................................................
Shell (Rebex) 654
Telnet
.................................................................................................................................................................... 656
5 ............................................................................................................................................................................................
Edit 658
Edit............................................................................................................................................................................ 663
Play....................................................................................................................................................................
List 663
Setting Overrides
............................................................................................................................................................................ 671
Specific
....................................................................................................................................................................
Settings 671
Batch............................................................................................................................................................................ 674
Batch
....................................................................................................................................................................
Edit 674
6 ............................................................................................................................................................................................
View 678
Panels
............................................................................................................................................................................ 681
Task....................................................................................................................................................................
List 681
View
............................................................................................................................................................................ 684
Activity
....................................................................................................................................................................
Logs 684
Advanced
....................................................................................................................................................................
Search 686
Documentation
....................................................................................................................................................................
Search 689
7 ............................................................................................................................................................................................
Administration 692
Managem ent
............................................................................................................................................................................ 695
User....................................................................................................................................................................
Management 695
Role....................................................................................................................................................................
Management 708
Reports
............................................................................................................................................................................ 709
Reports
.................................................................................................................................................................... 709
Deleted
....................................................................................................................................................................
Entries 714
Settings
............................................................................................................................................................................ 717
Root....................................................................................................................................................................
(Settings) 717
System
....................................................................................................................................................................
Settings 718
System
....................................................................................................................................................................
Permissions 733
Security
....................................................................................................................................................................
Providers 738
Clean up
............................................................................................................................................................................ 744
Clean
....................................................................................................................................................................
Up Deleted History 744
Clean
....................................................................................................................................................................
Up Entry History 746
Clean
....................................................................................................................................................................
Up Activity Logs 748
Pack....................................................................................................................................................................
Data Source (Optimize) 750
............................................................................................................................................................................................
8 Tools 751
Generators
............................................................................................................................................................................ 753
Passw
....................................................................................................................................................................
ord Generator 753
SSH ....................................................................................................................................................................
Key Generator 761
Certificate
....................................................................................................................................................................
Generator 763
Port....................................................................................................................................................................
Generator 766
Tools
............................................................................................................................................................................ 768
Passw
....................................................................................................................................................................
ord Analyzer 768
Key ....................................................................................................................................................................
Agent Manager 771
Pow ....................................................................................................................................................................
erShell (RDM CmdLet) 777
Wayk....................................................................................................................................................................
Now 778
More....................................................................................................................................................................
Tools 779
9 ............................................................................................................................................................................................
Help 801
Support
............................................................................................................................................................................ 803
Application
....................................................................................................................................................................
Log 803
Diagnostic
.................................................................................................................................................................... 806
Profiler
.................................................................................................................................................................... 810
Record
.................................................................................................................................................................... 813
2 ............................................................................................................................................................................................
Installation 816
Chrom e
............................................................................................................................................................................ 816
Firefox
............................................................................................................................................................................ 818
Microsoft Edge Beta
............................................................................................................................................................................ 819
Opera
............................................................................................................................................................................ 823
3 ............................................................................................................................................................................................
First Login 824
Passw ord Hub
............................................................................................................................................................................ 824
Multiple
....................................................................................................................................................................
Passw ord Hub 828
Passw ord Server
............................................................................................................................................................................ 834
Rem ote Desktop Manager
............................................................................................................................................................................ 837
4 ............................................................................................................................................................................................
Exploring Devolutions Web Login 839
Menu
............................................................................................................................................................................ 839
Settings
.................................................................................................................................................................... 839
Retrieve Credentials
............................................................................................................................................................................ 844
Remote
....................................................................................................................................................................
Desktop Manager 845
Secure Devolutions Web Login
............................................................................................................................................................................ 846
Keyboard Shortcuts
............................................................................................................................................................................ 848
2 ............................................................................................................................................................................................
Scenarios 863
Sim............................................................................................................................................................................
plified Security 863
Advanced Security
............................................................................................................................................................................ 872
3 ............................................................................................................................................................................................
Legacy Information 885
Sm............................................................................................................................................................................
all to Medium Enterprise 885
7
8| Remote Desktop Manager
2 ............................................................................................................................................................................................
PowerShell Samples 901
Creating an entry
............................................................................................................................................................................ 901
Creating Group Folder Structure from CSV file
............................................................................................................................................................................ 902
3 ............................................................................................................................................................................................
Batch Actions Samples 903
2............................................................................................................................................................................................
Command Line Arguments 1004
3............................................................................................................................................................................................
Lexicon 1007
4............................................................................................................................................................................................
Follow Us 1008
5............................................................................................................................................................................................
Add-on Documentation 1009
Bom gar Representative Console Add-on
............................................................................................................................................................................ 1009
DbVisualizer Add-on
............................................................................................................................................................................ 1012
NoMachine Add-on
............................................................................................................................................................................ 1014
PenguiNet SSH Client Add-on
............................................................................................................................................................................ 1015
SAP Frontend Server (SAP GUI) Add-on
............................................................................................................................................................................ 1018
Shutdow n Application Tool Add-on
............................................................................................................................................................................ 1020
SQL Server Managem ent Studio Add-On
............................................................................................................................................................................ 1021
VPN Add-ons
............................................................................................................................................................................ 1024
Cisco
....................................................................................................................................................................
AnyConnect 1024
Generic
....................................................................................................................................................................
VPN 1025
OpenVPN
.................................................................................................................................................................... 1026
6............................................................................................................................................................................................
Best Practices 1027
Data Backups
............................................................................................................................................................................ 1028
Credential Managem ent For Team s
............................................................................................................................................................................ 1031
Use Credential Entries
............................................................................................................................................................................ 1035
Use VPN Entries
............................................................................................................................................................................ 1035
7............................................................................................................................................................................................
How-To 1035
How to Add a Web Link in Macros/Scripts/Tools Session
............................................................................................................................................................................ 1035
How to apply policies
............................................................................................................................................................................ 1040
How to Backup Rem ote Desktop Manager
............................................................................................................................................................................ 1048
How to Configure Passw ord Manager Pro in Rem ote Desktop Manager
............................................................................................................................................................................ 1049
How to Configure ConnectWise (ScreenConnect) 5 in Rem ote Desktop Manager
............................................................................................................................................................................ 1054
How to Configure the Google Authenticator 2-Factor Authentication
............................................................................................................................................................................ 1059
How to Configure the Yubikey 2-Factor Authentication
............................................................................................................................................................................ 1061
How to Disable Rem ote Desktop Manager Auto Update
............................................................................................................................................................................ 1063
How to Dow nload the Keepass Plugin
............................................................................................................................................................................ 1064
How to Register Licenses in Older Version
............................................................................................................................................................................ 1066
How to Reinstall Rem ote Desktop Manager
............................................................................................................................................................................ 1067
How to Send an Error Report
............................................................................................................................................................................ 1068
How to Send a File Securely
............................................................................................................................................................................ 1070
How to Send the Application Logs Report
............................................................................................................................................................................ 1071
How to Send your Configuration File
............................................................................................................................................................................ 1073
How to Setup a SSH Tunnel
............................................................................................................................................................................ 1073
How
....................................................................................................................................................................
to Broadcast Action in SSH 1080
How to Setup Rem ote Desktop Manager to Receive New Update
............................................................................................................................................................................ 1081
How to Setup the Usage of the Session Credentials to Launch a Tool
............................................................................................................................................................................ 1082
How to Subscribe to the Announcem ents Forum s
............................................................................................................................................................................ 1083
How to Use a Typing Macro to Perform Authentication
............................................................................................................................................................................ 1085
How to use the Them e system
............................................................................................................................................................................ 1088
Image
....................................................................................................................................................................
List 1089
Pow erShell
............................................................................................................................................................................ 1105
Extract
....................................................................................................................................................................
TeamView er ID 1106
Custom
....................................................................................................................................................................
Export to CSV 1106
Remote
....................................................................................................................................................................
Management 1107
Script
....................................................................................................................................................................
Execution Policy 1107
Change
....................................................................................................................................................................
your Synchronizer source 1108
8............................................................................................................................................................................................
Tips And Tricks 1111
Allow Open Multiple Connections
............................................................................................................................................................................ 1111
Autom ating Rem ote Microsoft Managem ent Console (MMC)
............................................................................................................................................................................ 1112
9
10 | Remote Desktop Manager
Logoff
....................................................................................................................................................................
Issue 1224
Memory
....................................................................................................................................................................
and Performance issues 1225
Missing
....................................................................................................................................................................
mapped drives 1227
Printer
....................................................................................................................................................................
Redirection 1229
Protocol
....................................................................................................................................................................
Error 1230
RDP
....................................................................................................................................................................
Session Credentials 1231
Remote
....................................................................................................................................................................
Computer Requires Authentication to be Enabled Error 1233
Reconnect
.................................................................................................................................................................... 1234
RD....................................................................................................................................................................
Gatew ay Credentials Prompt When Trying To Reconnect 1235
RDM
....................................................................................................................................................................
Hangs w hen logging off RDP sessions 1236
Sessions
....................................................................................................................................................................
w ork using mstsc.exe but not in RDM 1238
Netw ork Devices
............................................................................................................................................................................ 1239
Non-Adm in Users Cannot View Passw ords
............................................................................................................................................................................ 1240
Passw ord Manager Pro
............................................................................................................................................................................ 1241
Perform ance
............................................................................................................................................................................ 1245
Data
....................................................................................................................................................................
sources 1245
Diagnostic
.................................................................................................................................................................... 1246
Startup
.................................................................................................................................................................... 1249
Pow ershell
............................................................................................................................................................................ 1250
Putty
............................................................................................................................................................................ 1253
Rem ote Desktop Manager
............................................................................................................................................................................ 1254
Caching
.................................................................................................................................................................... 1255
Debugging
.................................................................................................................................................................... 1256
High
....................................................................................................................................................................
CPU Usage 1258
HDPI
....................................................................................................................................................................
Scaling Issues 1259
Hung
....................................................................................................................................................................
Remote Desktop Manager 1262
Large
....................................................................................................................................................................
Memory Aw are Application 1264
Missing
....................................................................................................................................................................
Navigation Pane 1266
Missing
....................................................................................................................................................................
Sessions 1267
Offline
....................................................................................................................................................................
Mode 1268
Profiler
.................................................................................................................................................................... 1269
Red
....................................................................................................................................................................
X in Navigation Pane or Credential List 1269
Root
....................................................................................................................................................................
Is Empty Error 1270
Session
....................................................................................................................................................................
Focus Issue 1271
SQL
....................................................................................................................................................................
Server Data Source Connection Refused 1272
Startup
....................................................................................................................................................................
performance 1273
Unable
....................................................................................................................................................................
to install or upgrade 1276
Unable
....................................................................................................................................................................
to Uninstall 1276
Upgrade
.................................................................................................................................................................... 1277
User
....................................................................................................................................................................
Interface 1277
Unable
....................................................................................................................................................................
to communicate w ith Passw ord Vault Manager 1279
Proxy
....................................................................................................................................................................
Authentication Required Error 1280
RPC
............................................................................................................................................................................ 1281
Secret Server
............................................................................................................................................................................ 1281
Secure Note
............................................................................................................................................................................ 1283
Session Tools
............................................................................................................................................................................ 1284
SSH
............................................................................................................................................................................ 1285
Synchronizers
............................................................................................................................................................................ 1286
Active
....................................................................................................................................................................
Directory Synchronizer 1286
VMWare
............................................................................................................................................................................ 1286
Advanced
....................................................................................................................................................................
Troubleshooting of the Pow erCLI 1291
VPN
............................................................................................................................................................................ 1293
Missing
....................................................................................................................................................................
Opened VPN from List 1293
FortiClient
.................................................................................................................................................................... 1294
11
12 | Remote Desktop Manager
Sonicw
....................................................................................................................................................................
all Global VPN Client 1294
Microsoft
....................................................................................................................................................................
VPN 1295
Cisco
....................................................................................................................................................................
AnyConnect 1296
Web Brow sers
............................................................................................................................................................................ 1297
Internet
....................................................................................................................................................................
Explorer 1297
Google
....................................................................................................................................................................
Chrome 1301
Firefox
.................................................................................................................................................................... 1302
Web
....................................................................................................................................................................
Authentication 1303
WebDav
............................................................................................................................................................................ 1307
Web traffic
............................................................................................................................................................................ 1308
Welcom e Page
............................................................................................................................................................................ 1309
WMI
............................................................................................................................................................................ 1312
11............................................................................................................................................................................................
Tutorials 1313
Overview
............................................................................................................................................................................ 1314
Getting Started
............................................................................................................................................................................ 1315
Spotlight On...
............................................................................................................................................................................ 1316
1 Ov erv iew
Purchasing an Enterprise license grants the right to use ALL the various client
applications.
You must use a desktop application to create a team data source. This
explains why the mobile applications are free. They do allow for simple usage
by an individual much like the Free Edition, but they can only use, not manage,
a Team data source.
Windows
macOS
iOS
(Free App)
Android
(Free App)
1.2 Security
All passwords stored in the data sources are encrypted using a strong encryption algorithm, to
the extent that if a user attempts to access the data directly in the database, it will be considered
unreadable.
If you choose to store passwords locally, Remote Desktop Manager will use the same
mechanism used by mstsc.exe (Remote Desktop Manager client), which stores the passwords
in the Windows Credential Manager. It must be noted that the password will not be able to be
viewed due to being encrypted by Windows. For obvious reasons, this choice also means that
credentials stored in this fashion are not shared. Please refer to Windows Credential Manager
for more information.
This cipher is proven to be very secure. AES/Rijndael became effective as a U.S. Federal
government standard and is approved by the National Security Agency (NSA) for top secret
information.
TIPS
The encryption key is built-in the application and is therefore the same for all
copies of the software in circulation. It is imperative that you follow our
recommended steps and apply a Security Provider to encrypt not only the
passwords, but also all connection data stored in the data source. This will
provide protection over your data at rest, using a key under your exclusive
control.
· Use an Advanced Data Source and grant user access by assigning permissions.
· Use the Data Source Settings (System Settings) to control settings impacting security.
· Use the Security Provider to encrypt entries completely instead of just the password.
· If using the offline mode, add your own password to add an additional layer of protection to
the local cache. Go to File – Options – Security.
· Require a password to launch the application, and even better: require two factor
authentication. File – Options – Security.
· If your data source supports it, choose not to save password in the data source, which will
prompt for the credentials on the first connection.
· Use our policies to enforce some of these settings at the system level.
MINIMUM REQUIREMENTS
Windows Desktop:
· Windows 10
· 8.1
· 7 SP1
Windows Server:
· 2016
· 2012 R2
· 2012
· 2008 R2 SP1
512MB RAM
64-BIT SUPPORT
Remote Desktop Manager can be installed on Remote Desktop Services and thin client.
MANUAL/PORTABLE DEPLOYMENT
Deploying manually using our zip file is documented as being a Portable (USB) deployment. In
this case, the prerequisites will need to be handled manually as well. Please consult Prerequisite
Software for details.
1.3.1 Prerequisite Software
Specific prerequisite software need to be installed on your computer prior to running Remote
Desktop Manager.
These are managed automatically by our installers. The only situations where
one would perform a manual installation of the prerequisite software is when the
zip archive is used for deployment or if there is no internet connection.
SETTINGS
The following package must be installed prior to proceeding with the Remote Desktop Manager
installation:
· Microsoft .NET Framework 4.7.2.
Our platform offers multiple products to help in managing all of aspects of an IT infrastructure.
The flagship product is Remote Desktop Manager, the strongest edition admittedly being for the
Windows operating system.
The Remote Desktop Manager Agent can run commands on remote hosts, but what is really
useful is that it can send commands to multiple hosts at the same time. Since Remote Desktop
Manager uses a secure RDP channel to communicate with the Remote Desktop Manager
Agent, it can only operate against Windows-based hosts.
It supports both environment and Remote Desktop Manager variables. Remote Desktop
Manager variables (i.e. $HOST$, basically all the ones surrounded by dollar signs) are resolved
on the client against the running session, while environment variables (i.e. %windir%, basically
all the ones surrounded by percent signs) will be resolved on the remote host at execution time.
You can use Remote Desktop Manager variables while running file based scripts (.ps1) within
the command. The file based script variables (.ps1) will be resolved prior to sending the script to
the destination host.
RDM Agent
SCENARIOS
The Remote Desktop Manager Agent can be used to run scripts from another Remote Desktop
Manager installation. Since it uses an RDP channel for communication, it saves you from remote
management headaches such as opening various ports in your firewall. This requires the
lightweight installation model of just the agent package (Methods 2-4 below).
It is also used by Remote Desktop Manager Jump for supporting many technologies. However, it
does require a full Remote Desktop Manager installation on the remote host for those features.
INSTALLATION
Installing Remote Desktop Manager Agent on a remote host can be achieved in 4 different
ways:
1. Install Remote Desktop Manager and select Tools – More Tools – RDM Agent. It will launch
and auto-register the Agent to automatically start with Windows.
Many new users using this technology wonder why a full installation of Remote Desktop Manager
is required. There are three factors that make this a good solution:
· Remote Desktop Manager on the remote host does not require a data source, it’s an empty
shell.
Remote Desktop Manager Jump connects to a remote host, often called a Jump Box, Service
Host, or a Bastion Server, which in turn connects to other hosts.
This can be compared to RD Gateway from Microsoft and to some extent SSH port forwarding.
The Jump is performed through Remote Desktop Manager Agent. The Agent
needs to be CURRENTLY EXECUTING in a Windows Session on the remote
host, or set to automatically start upon login. We have decided NOT to have this
available through a service at this time.
Remote Desktop Manager must be installed on the jump host for the agent to
be able to run commands. The application does not have to connect to any data
source, as Remote Desktop Manager only serves as a shell for the agent to run
commands.
Both instances of Remote Desktop Manager Jump or Remote Desktop Manager and RDM
Agent running on the Jump Host communicate through an RDP channel. Commands are sent
securely over the RDP channel and are then executed on the Service Host. Commands include
running a script or opening a remote session of any type. It can even launch a VPN client on the
Service Host prior to running the remote session.
USAGE SCENARIOS
This allows you to have a strict firewall policy that allows connections only from a specific IP
address. This configuration only grants you access to hosts that are accessible from the Jump
Box. Let's imagine you have the following infrastructure:
You need to access the remote hosts, but you want to limit risks and expose only the jump host
to the internet traffic. This allows you to create strict firewall rules and to open only a single port.
Therefore, it forces you to connect to the jump host before hopping to a remote host.
Remote Desktop Manager Jump helps achieve that goal simply and efficiently.
These limitations make it impossible to use multiple VPN clients concurrently on the same
workstation. In this case, you can have multiple virtual machines, each running a single VPN
client. Using these virtual machines as jump boxes allows you to connect to the virtual machine,
launch the VPN client, then launch the remote session.
2 Getting Started
DESCRIPTION
Remote Desktop Manager is highly flexible and can work for both individuals and teams. Please
follow the checklist that applies to your environment:
· Checklist for Individuals: For individuals but also for teams of three users or less that do not
want to implement security.
· Checklist for Teams: For a team environment that wishes to implement security.
Please follow these simple steps to get started with Remote Desktop Manager for individuals
or for teams of three users or less that do not want to implement security.
Remote Desktop Manager Enterprise Edition grants you a 30 day trial. Refer to the procedure in the Registration
Enterprise Edition topic to register your license key. If you decide not to register by the end of the 30 day trial,
your data will not be altered or erased, and you will have full access to it once you provide a license key. Please
consult our Free Edition or Enterprise Edition topic to register.
When choosing any data source type that is not on-premises, you need to
think about the safety of the data at rest and during transport. We strongly
recommend that you further encrypt your data by applying a master key for file-
based solutions, or a Security Provider for Advanced Data Sources. This
ensures only you can read the data.
Upon first launch, Remote Desktop Manager uses an SQLite data source. The data sources are elaborated further
in the Data Sources overview topic. Consult Choosing your data source (Individuals) for help selecting a data
source.
The Online Backup allows you to securely backup your information for the following data sources: Devolutions
Online Drive, SQLite, XML and Microsoft Access. The backup is automatically executed 30 seconds
after any modifications made to the data source content. It is best practice to always back up your data source. If
using another type of data source, please consult our Backup Best Practices topic to use the best solution for
your chosen data source.
In File - Templates - Default Settings, you will be able to create, edit or reset your default settings when a new
entry is created. Each entry type is supported and can have a default template defined to fit your requirements.
The final step is to Import all of your data into Remote Desktop Manager. You can import your sessions, logins
and contacts in a few easy steps.
This topic is for individuals or for teams of three users or less that do not want to implement
security.
To help you select a data source, here is a set of concerns and the list of data sources that can
serve in such context. If you have multiple concerns, simply create the intersection of all sets to
isolate a list of choices.
When choosing any data source type that is not on-premises, you need to
think about the safety of the data at rest and during transport. We strongly
recommend that you further encrypt your data by applying a master key for file-
based solutions, or a Security Provider for Advanced Data Sources. This
ensures only you can read the data.
SHARED
BETWEE
SELF- CLOUD WORKS MULTI-
DATA SOURCE LOCAL N YOUR
HOSTED BASED OFFLINE USER
COMPUT
ERS
SQLite X X
XML X X
Devolutions X X X
Online Drive
Devolutions X X X 3 users
Online
Database -
Basic
NOTES
NOTE 1
There is no protection in the case of data contention issues. The last one saving the file will win!
This is for single users with multiple computers, not for multiple users using the data
concurrently.
NOTE 2
The master XML is maintained by a single user and synchronized to a web site that is hosted as
per your requirements. Accessing the data through a URL ensures it is read-only for other users.
2.3 Checklist for Teams
Here's a checklist to help you get started with Remote Desktop Manager when working in a
team environment.
When choosing any data source type that is not on-premises, you need to
think about the safety of the data at rest and during transport. We strongly
recommend that you further encrypt your data by applying a master key for file-
based solutions, or a Security Provider for Advanced Data Sources. This
ensures only you can read the data.
Upon first launch, Remote Desktop Manager uses a local SQLite data source. Learn more about adding your own
Data Source.
For help selecting a data source tailored to your needs, please see Choosing your data source (Teams).
Select your Security Provider before importing or creating any data in your database so nobody can read your
entry configuration data, even when people have a direct access to your database.
Top level folders are at the foundation of a solid security structure. Your folder structure (Folder entries) should
represent your company structure. For example, you can create a folder for your Production team, one for your
Staging team and one for your Testing team.
In File - Options you can set options for Remote Desktop Manager and create default settings Templates. Each
entry type is supported and can have a default template defined to fit your requirements. After you configure the
options, use the Custom Installer to share the pre-configured version with your team.
CREATE USERS
Remote Desktop Manager supports advanced User Management. User accounts must be created manually by an
administrator of the database.
CREATE ROLES
Create Roles to easily manage your security system. You can then assign users to Roles, making it easy to grant
permissions to a set of users instead of having to manage permissions individually.
CREATE ENTRIES
An Entry is how you save information about your sessions (e.g. RDP, SSH connections), credentials, websites,
VPNs, Synchronizers and documents.
GRANT PERMISSIONS
Once your users are created you can then grant Permissions for role-based access control. The permissions
granted on the folder can be inherited by each entry set under that folder.
The final step is to Import all of your data into Remote Desktop Manager. You can import your sessions, logins
and contacts in a few easy steps.
This topic is for teams that need the functionality offered by our Enterprise Edition.
When choosing any data source type that is not on-premises, you need to
think about the safety of the data both at rest and during transport. We
strongly recommend that you further encrypt your data by applying a master key
for file-based solutions, or a Security Provider for Advanced Data Sources.
This ensures only you can read the data.
To help you select a data source, here is a set of concerns and the list of data sources that can
serve in such context. If you have multiple concerns, simply create the intersection of all sets to
isolate a list of choices.
Devolutio MYSQL/
ns SQL SQL DODB DODB
CONCERN MARIAD
Passwor SERVER AZURE PRO ENT
d Server B
AD accounts X X
used for
authentication
AD group X
membership
used to assign
permissions
The data is X X X
stored on-
premises
Activity Logs X X X X X
Optional local X X X X X X
cache of
connections
NOTES
NOTE 1
The administrators can create accounts for end users without divulging the passwords. A locked
data source definition is imported for each end user. This obviously requires a lot of manual
operations by the administrator.
NOTE 2
Integrated Security is the name of a Microsoft technology that does not sends credentials to get
access to a SQL Server instance, but rather the token resulting from authentication in your
Windows computer. This therefore allows the users to connect directly to the database using
other tools. It should not be used if you need to prevent direct access to the database.
Our SQL Server data source offers a third option, namely the Custom (Devolutions) user type. It
allows for the user to be impersonated and therefore not be made aware of the credentials used
to connect to the database. Please consult User Management for details.
NOTE 3
You should not expose a Devolutions Password Server instance to the Internet without being
able to protect it from DDoS attacks. Strong passwords must be used as well as obscure
account names that are not easily inferred using social data mining.
NOTE 4
You can indeed expose a database to the Internet, but you must use SSL/TLS to encrypt traffic,
you must ALSO protect against DDoS attacks. Cloud services, like Azure or Amazon Web
Services, have that concern in the forefront. The default settings of the firewall should be to block
everything, you will then open only the most limited set of ports, while filtering on a short list of
acceptable origins for requests.
2.3.2 Set up a team folder for default settings
You must create a team folder on a server drive to store your default settings templates in order
to share them with your team.
SETTINGS
1. Start by accessing your server drive (such as \\servercommon) and create a new team folder
to hold all your team default settings templates.
2. Go to File - Options - Path and enter the path of your newly created folder stored on your
server drive. All your default templates will then automatically be saved in that folder.
3. If you have remote workers, ensure they have access to the shared server in offline mode.
Map your network drive and then follow the instructions here for the offline mode access when
using Windows 10.
When getting started with Remote Desktop Manager, you must configure your entries. There are
many types of entries; you should know what third party or technology you will use in order to
choose the appropriate entry type(s) that you plan on configuring.
On the main application window, simply right-click on the name of the data source and select
Add from the menu. To initialize a new session, you can specify either the type of session, or a
template. You will be prompted to customize your settings in the entry properties window.
You can also create a session by dragging and dropping an .rdp file in the main application
window. By doing so, Remote Desktop Manager will ask you whether to import the content and
create a new session, or create a session linked to the .rdp file. It is also possible to drag and
drop the LogMeIn desktop shortcut to create a LogMeIn session.
It is possible that drag and drop will not work because of your security settings.
They may prevent applications running in different contexts from interacting. For
example, if Remote Desktop Manager is running in an elevated context
(administrator mode) and Internet Explorer is running in default mode, Windows
will not allow you to drag a URL link in the application.
You can also import entries by using the Import Computer Wizard, or by importing its
configuration directly from any compatible applications supported by our import tools. You can
learn more in the Import section.
Depending on your organization's security policies, there are multiple ways of handling
credentials. We can manage a wide range of scenarios, the most popular are listed below. It is
critical to understand that these are the credentials used to connect to remote hosts, not the
ones you use to launching Remote Desktop Manager.
Most of these selections do not exist in the Free edition of Remote Desktop
Manager as they depend on features offered by an Advanced Data Source.
A few key points that the admin of the solution must be aware of:
Credentials set Our folders can have credentials defined. This is useful because in the
on folders great majority of cases, one reuses the same credentials for a whole
branch of the network infrastructure. To make use of credentials defined
in a folder, the child sessions must be adjusted to use Inherited
Credentials.
Entry location When storing entries in the tree view, users with the View permissions
on that entry (or folder by inheritance) will be able to make use of them.
This is how you would share credentials with other members of your
team. A Private Vault exists for users to store private information that
should be seen by no one else. Credentials stored this way can still be
accessed in the Public area of the system by referencing them or
through the User Specific Settings feature described below.
User Specific User Specific Settings are partial overrides for settings of your entries,
Settings most notably the Credentials. When applying such an override, one can
choose the type in the credentials directly in the override or one can
choose to instead link to credentials stored elsewhere, such as the
Private Vault.
Here are the most common scenarios and how to address them. In the majority of cases, we
prefer to have sessions using Inherited credentials, meaning it climbs up the tree until it has
access to a set of credentials, be it defined, linked, or overridden in an entry.
SCENARIO STRATEGY
One set of credentials is used by all of Set the credentials on the Vault Settings. All
the staff, be it for the whole system or children use Inherited Credentials.
for a branch in your tree view
(Customer, Department, etc).
Each user has its own credentials for Make use of the User Specific Settings on each
many different branches (often branch. All children use Inherited Credentials.
corresponds to
customers/departments, etc).
Each user has its own credentials This solution involves a little more work. The
managed by an administrator. admin must create a folder for each user, then
grant permissions ONLY to that user. The user will
then use User Specific Settings to specify that
the credentials stored in that folder is used to
override what is defined in the entries.
Each team uses the same credentials. Much like directly above, but all the members of
the team have access to the folder. All of them
must use the User Specific Settings.
Each user uses their domain account. Have the sessions configured to use My personal
credentials. Each user will be prompted to define
them once per workstation that they use.
3 Installation
3.1 Client
Remote Desktop Manager can be downloaded as setup files, or as a binary compressed (zip)
file.
INSTALLATION
Depending on the downloaded media, either run the setup, or extract the files from the archive in
any folder and launch the executable. If you wish to use a portable device, or run multiple
independent copies of the application, please consult Portable (USB).
LICENSE
Remote Desktop Manager Enterprise Edition comes with a 30 day-trial. If you possess a
purchased license of the Enterprise Edition, please follow the instructions at Register Enterprise
Edition. To register the Free Edition, please refer to the Register Free Edition.
DATA SOURCE
By default, a local data source is created using the SQLite format. You can add as many data
sources as needed. Please consult Data Source Overview for more information.
To use a SQL Server or SQL Azure data source, refer to the Configure SQL
Server topic.
EXTERNAL APPLICATIONS
Configure your installation path for all external applications you intend to utilize such as
RealVNC, Putty, Filezilla, etc. Set the paths in File – Options – Path.
DESCRIPTION
Remote Desktop Manager generates ancillary files on your workstation. The table below lists out
an example of ancillary files and their locations.
As described in Configuration File Location, the default path for most of these files are
customizable. For this reason, we use the [CONFIG] token in this documentation to denote
when a file is stored in a configuration folder that can be relocated, or the [PROFILE] token to
indicate that they are stored in the local profile. By default, these point to the same exact folder.
The only method to separate them is by using a customized configuration.
Since you can also deploy on a portable device, sometimes known as using the XCOPY
deployment model, we will use the [INSTALLDIR] token to indicate that the file is in the same
location as Remote Desktop Manager.
The Override Source column indicates if an available mechanism can relocate the files of that
category elsewhere.
SUMMARY
Offline and local play list options can be accessed by navigating to File - Options - Advanced.
Options - Advanced
DEFAULT LOCATION
You can retrieve the installation folder of Remote Desktop Manager by clicking
File – Options – Advanced. A hyperlink displays the installation folder.
Options - Advanced
The configuration file can be located in different folders depending on certain conditions:
Having the configuration file in the installation folder allows you to run multiple
versions of the application side-by-side.
There are two ways to change the folder where the configuration file is stored:
1. Create a file named "Override.cfg" in the application folder. Remote Desktop Manager
opens this file and reads the first line. It should contain the desired installation folder (without the
file name). If you wish to use the current installation path, put a period in the file. Here are a few
examples:
EXAMPLES
DESCRIPTION
The Custom Installer Service, offered through our Devolutions Customer Portal services,
replicates the configuration from a Remote Desktop Manager instance. This configuration is
used to create an installer file (*.rdi), which will be used to create the installation package
intended for distribution. The configuration can contain the license serial, data sources,
credentials, database templates and more. It is best practice to have a Remote Desktop
Manager installation used specifically to create the installation package.
The Custom Installer Service uploads a configuration file to our online services.
You should not use the service to redistribute passwords for data sources or an
Online Database account.
Please note that you MUST create an installer file using Remote Desktop
Manager before creating the installer on the Web portal. This is described here in
the Installer File Generator topic.
The Custom Installer Service can be found in with the Devolutions Account tools, located in File
– Devolutions Account – Tools. You must be signed in to access it.
The following topics will help you get started to set up your customized installers with Remote
Desktop Manager.
DESCRIPTION
When creating an installation package with the Custom Installer Manager, an installer file is
necessary to determine what to include in the installation configuration. It is risky to create an
installer file for each new version since you have to repeat the process manually every time.
Instead, it is possible to create the configuration once, save the resulting file (*.rdi), and reuse it
as many times as needed.
2. Select which data sources to include. You can also include the name and serial key for the
registration.
This file can be used in the Custom Installer Manager when creating an installation package.
For more information on how to create a custom installer package, please consult our Custom
Installer Manager topic.
3.1.3.1.1 Option Selection Dialog
DESCRIPTION
When generating the installer file, you must decide what to include in the configuration. This
process will replicate the configuration of the Remote Desktop Manager instance currently used,
and will generate an installer file (*.rdi). Once it has been generated, the installer file can be used
as many times as needed to create custom installers. For security reasons, some settings that
may contain credentials, such as Saved Templates, are disabled by default. Enable these at
your own risk.
The same dialog is used for the Custom Installer Service and for exporting the
Remote Desktop Manager configuration file. Some options must NOT be used
for the Custom Installer Service to prevent sharing credentials that must stay
confidential. Please read the documentation carefully.
SETTINGS
You can open the Installer File Generator from File – Devolutions Account – Installer File
Generator.
REGISTRATION INFORMATION
OPTION DESCRIPTION
OPTION DESCRIPTION
MISCELLANEOUS
All Local templates will be included. If any contain credentials, it may cause a
security risk. Ensure you are sharing only what is needed.
The data sources you decide to redistribute should NOT contain identifiable
credentials. Use of integrated security is highly recommended. You can also use
environment variables for the username.
OPTION DESCRIPTION
Saved installation Preserves your installation paths configured for external third party
paths applications. Use this only when all of the user's machines use the
same paths.
Saved templates Includes your local templates in the custom installer. Database
templates are stored in the data source and may be a better option
in you need to share them.
OPTION DESCRIPTION
Include data Includes the credentials for all selected data sources below. Please,
source consult security warning above.
credentials
DATA SOURCES
Select the data sources that must be included in the configuration. In the description column you
will see details about each data sources. You should ONLY share data sources that are either
using Integrated Security, or that are using an environment variable for the username.
Passwords for accessing a data source should NEVER be shared.
3.1.3.2 Custom Installer Manager
DESCRIPTION
For stability reasons, in large installation bases, the latest official release is not
available to the Custom Installer Service for an undetermined period while we
ensure that no major issues are present. We recommend using this time with your
organization to perform integration tests on a few workstations before upgrading
your entire team.
Please ensure you have read and understood the content of Custom Installer
Service Overview prior to subscribing to the service.
2. Click on Custom Installer Manager to create a new custom installer with specific settings.
4. Select the application version, enter a name for your package and click on Create. You can
either create a new configuration or use an existing Remote Desktop Manager Installer (*.rdi)
file. For more information, please consult our Installer File Generator topic.
When choosing to create a new configuration, select what to include in the custom installer, then
click on Generate.
5. Once the installation package has been created, the request is submitted to our online
service. A confirmation dialog window appears if successful.
6. The Custom Installer Manager will display an hourglass icon indicating that the package is
being processed. When the package has been successfully generated, the Custom Installer
Manager will display a green check mark . Note that this process can take a while.
setup.exe is in fact what is called a bootstrapper, it will ensure the installer runs
with the required privileges. Use the msi only if you are sure the installer will run
with all rights and process elevation.
From here, there are two ways of downloading the package. You can download it directly from
the Custom Installer Manager, or you can log in to the Devolutions Account you created the
installer with.
From the Custom Installer Manager, click on Download EXE or Download MSI.
From the Devolutions Customer Portal you created the custom installer with, navigate to the
Custom Installer section. Click on .msi or .exe to download the custom installer on your
computer.
DESCRIPTION
Remote Desktop Manager's current installation package does require to install with elevated
privileges, as well as making the application available to all users of the computer where you are
installing. That being said, feedback has shown that it does complete successfully across a wide
spectrum of our community's environments. Follow this procedure to reduce deployment issues
in the future.
PROCEDURE
This procedure registers all file types associations, this mean that rdp files will
from now on be opened with Remote Desktop Manager. If you wish to avoid
this, install manually using the Custom mode, and choose every option but that
rdp association.
1. Copy the installer to a folder available for all users of the workstation. e.g. c:\Deploy
2. Open an Elevated Command prompt (right click on the shortcut and select Run as
administrator).
3. Run the following command, adapted for the version that you are installing
msiexec /i Setup.{APPNAME}.{VERSION}.msi /Quiet /Passive INSTALLMODE=Complete
We also recommend disabling the auto-update check as all further installations or upgrades
should be performed by an administrator AND using elevated privileges.
If you wish to proceed with upgrades from within Remote Desktop Manager, it must have been
started using Run as administrator.
NOTES
The Microsoft installer technology copies the installer package under a new randomized name
as well as register it in a database. Our experience shows that this copy has a way of
disappearing and that the database becomes corrupted. We often have to direct our community
to use https://support.microsoft.com/en-us/mats/program_install_and_uninstall
The Quiet and Passive parameters are just to ensure that you do not have to make a choice during the installation.
We found that this reduces the risk of errors.
DESCRIPTION
Remote Desktop Manager can be used as a portable application. Here are the steps required
to ensure that it runs correctly:
The portable installation mode allows you to run multiple versions of Remote
Desktop Manager, using various license serials and configurations.
This procedure is not recommended for running Remote Desktop Manager from
a network shared by multiple users. This would prevent identifying individual users
and there would be conflicts with user preferences.
Remote Desktop Manager stores the offline cache in your Windows profile by
default. If you are using an Advanced Data Source and plan to use the offline
mode, use the Options in the Advanced category to have the offline cached
stored in the application folder instead.
The following steps ensures true portability and ease of maintenance. It can easily
be adapted to your liking.
PROCEDURE
3.3. A tools folder (optional, only if you intend to use external tools like Filezilla).
5. Create a text file named override.cfg in the installation folder. Set the content of the file to .
\config
6. Open Remote Desktop Manager and display the data sources window using File – Data
sources.
7. Create a new data source of a type that can be stored on your portable device. i.e. SQLite,
XML, etc.
8. Configure the data source using a relative path so it is stored on the portable device: .
\Data\Connections.db
10. Configure your portable applications (FileZilla, UltraVNC, etc.) in the same manner (relative
to the installation folder). Click on Configure Installation Path to select your preferred portable
application.
11.You can now delete the pre-existing Local data source that had been created automatically.
DESCRIPTION
Sometimes you may need an older version installer package. If the version wasn't an official
release or had been replaced by an ulterior build, you may not always see it on your download
page.
PROCEDURE
All our builds are available and it's easy to recreate the download link by simply changing the
version number from other download links.
For example, downloading Remote Desktop Manager 11.0.12.0 can be done using this
hyperlink: http://cdn.devolutions.net/download/Setup.RemoteDesktopManager.11.0.12.0.exe
You can simply copy the link to your address bar, and replace the version number by the one you
are looking for. Ex:
http://cdn.devolutions.net/download/Setup.RemoteDesktopManager.11.0.8.0.exe
You can download the needed version from one of the links in the sections below as well.
3.1.7 Registration
DESCRIPTION
Please refer to the Enterprise Edition topic to properly register your version. If you decide not to
register at the end of the 30 days trial, your data will not be altered or erased, and you will have
full access to it once you provide a valid license serial.
REQUEST A TRIAL
It is possible to request a 30 days trial to try Remote Desktop Manager - Enterprise Edition with
all its features. Form more information, please consult the Trial Request Topic.
Remote Desktop Manager Free Edition is similar to the Enterprise edition. Remote Desktop
Manager Free Edition must be registered following the 30 days trial period to ensure continued
use. Registration is free, please refer to the Free Edition topic.
Consult Create Devolutions Password Server Instance to register a new Devolutions Password
Server instance.
If you want to activate your renewal license key, consult How To Activate Your Renewal
Subscription for Devolutions Password Server.
Please consult Online Database Registration to register a new Devolutions Online Database.
DESCRIPTION
Remote Desktop Manager can be registered by manually providing a license serial or with a
license serial stored in a data source.
MANUAL REGISTRATION
To register your Remote Desktop Manager - Enterprise Edition, open Help – Register
Product.
License serials are delivered by email. Locate the email containing the Remote Desktop
Manager license serial.
Enter the username, email, and serial number, then click OK.
When the license serial is stored in the Data Source Settings (System Settings) of an Advanced
Data Source, there is no need to register Remote Desktop Manager as the license serial is
retrieved directly from it. When launching the application for the first time, simply add the data
source containing the serial.
FOR ADMINISTRATORS
Administration - Licenses
In Licenses, click on Add License. Enter the license serial and click OK.
DESCRIPTION
Remote Desktop Manager Free Edition requires a free registration after 30 days to be able to
continue the use of the application.
The Register the Application window will display at each Remote Desktop Manager launch
until you have registered the product license. It shows the number of remaining days and your
registration choice.
Every owner of a Devolutions Account is assigned a free license serial for Remote Desktop
Manager in their Customer Portal.
To get a Devolutions Account, click on Create a Free Account in the register window.
2. Click Ok.
In the event that you need to register the application without an internet connection, the
information must be entered manually. You will need the license serial from your Customer
Portal.
Copy the license serial for the Free Remote Desktop Manager Edition.
Paste the license serial, enter an email address and press Ok.
Register Manually
DESCRIPTION
It is possible to register the product with a license serial stored in a Devolutions Customer
Portal.
When creating a Devolutions Account a free license serial is provided for the free edition of
Remote Desktop Manager. License serials purchased for the enterprise edition can be stored in
the My Serials section of the Devolutions Customer Portal.
Register product
2. In the Select your Application Edition window, select Use registration from Devolutions
Account.
DESCRIPTION
When launching Remote Desktop Manager for the first time, the application registration window
is displayed. If you are not ready to buy Remote Desktop Manager, you must request a trial to
use the application. The trial is valid for 30 days, after which the application cannot be used
unless a valid Enterprise Edition license serial is provided.
Navigate to Help – Register Product, click on Request Trial, and fill in the form.
When the trial has been requested, an email containing the trial license serial is sent to the
address provided in the form above.
DESCRIPTION
Remote Desktop Manager has an excellent support for running under a Remote Desktop
Services environment. A master configuration file can be created to distribute settings for all new
users of the system or even to update existing user's configuration.
https://docs.microsoft.com/en-us/windows-server/administration/performance-
tuning/role/remote-desktop/session-hosts
Each user must have a unique application data folder (Roaming profiles or similar
technologies). Remote Desktop Manager saves some user preferences to the
local configuration file. The folder can be wiped out whenever the user logs out of
the Windows Session, but it must be accessible for the duration of Remote
Desktop Manager execution.
The Devolutions Web Login (DWL) was created for a normal desktop
environment. It uses Inter-process communication (IPC) with the client
application. Using it on a remote desktop server introduces a level of risk that
may be unacceptable for corporate users.
If you insist on using it, it is critical that each user is assigned a distinct port and
that port be kept secret. An application key must be set as well. The first client
application that starts will be able to use the port exclusively. ALL Devolutions
Web Login calling on that port will get the responses, unless an application
key is set.
PROCEDURE
1. Install by following the procedure For All Users. This ensures that the Microsoft Installer
Database does contain all of the needed information for all user profiles of the host.
2. After installing Remote Desktop Manager, configure your preferences. We recommend going
through all the configuration options to find the set of options that you wish to distribute. The
data sources deserve special interest since it is much better when they are configured by an
administrator. You may even take the opportunity to lock the data sources to protect against
any modification by the users. Please refer to Lock Data Source for more information.
When using Advanced Data Sources, for effective logging methods, proper
session security and user-based features, it is CRITICAL that each user has their
own account to authenticate against the data source.
Redistributing a data source registration should follow one of the patterns below:
o The data source is configured to always ask the username and password;
o You use environment variables for the username, and require the password.
(we recommend %USERDOMAIN%\%USERNAME% or %USERDNSDOMAIN%\%USERNAME
%)
3. When Remote Desktop Manager is configured to your liking, use File – Options – Export
Options. This will allow you to choose exactly the data sources to include, as well as the
various categories of settings. Please refer to Export Options for further details. Save the file
with the name default.cfg
4. Move that file in the installation folder of Remote Desktop Manager, if you have used the
default installation settings, it is under %ProgramFiles(x86)%
\Devolutions\RemoteDesktopManager.
WORKFLOW
NEW USERS
Whenever a new user creates a profile on the system, Remote Desktop Manager detects the
presence of the default.cfg file and uses it as a template to create the user's configuration file.
EXISTING USERS
If the user chooses to ignore the new configuration file when presented with the
dialog below, he will not be presented with the choice until the date/time of the
default.cfg file has changed.
If the main concern is deploying a new license key, and you are using of of the
Advanced Data Sources, you should rather use the Data source settings
(System Settings) - Serial feature.
Whenever Remote Desktop Manager is started and it detects a new default.cfg file, the
following dialog will appear:
By selecting Use New Configuration (Lose Mine), the user's configuration is simply
overwritten. If you only wish to update the Remote Desktop Manager license key after a renewal,
choose Retrieve New Registration Only.
DESCRIPTION
This topic applies to installations with data sources that are using a database as their data
store.
Some Remote Desktop Manager releases must alter the database structure. These are
performed automatically for you but it is best practice to perform a backup of your data source
beforehand. Additionally, If you are in a team environment you must be the sole user
connected to the database during the upgrade.
The user performing the update must have administrative privileges on the
underlying database. (SYSDBA or DB_OWNER).
Perform a database backup and ensure that you can quickly perform a restore
if required.
If your organization allows for a read/write offline cache, ensure that all of your
users have merged their offline edits.
STEPS
1. Ensure you are the sole user of the database during the upgrade process. If you
environment allows for offline use, have your team switch to the offline mode; or have them
switch to another data source.
3. Install the desired version of Remote Desktop Manager, using the Portable (USB)
deployment model may be desirable if you are doing this on your personal workstation.
4. Open Remote Desktop Manager while logged on as a user with administrative rights. You
must also be SYSDBA or DB_OWNER.
5. You may be prompted with an upgrade message when your data source is accessed. If
so accept the upgrade.
or
Using File – Data sources, locate your data source to upgrade and open its property
window. Switch to the Upgrade tab, then click on Update Database
8. Ensure your Remote Desktop Manager application is currently using that data source.
10. Validate the content and perform a check of the technologies that are critical in your
environment.
INSTRUCTIONS
Remote Desktop Manager doesn't install anything in the Windows System directory. The only
registry settings created are for the auto-run functionality and the installation path. As a result,
Remote Desktop Manager can be uninstalled easily.
You can run the uninstaller if it was installed with the default setup file or delete the installation
folder directly if it was installed from the binaries.
Please note that if you are using a local data source like SQLite or XML, your
data source may be saved in the configuration folder. Perform a backup of the
data source prior to the deletion of the folder.
3.4 Update
The Update feature prompts the user to update to a newer version of the application and
displays the release notes. The user's choice for the previous update is shown as selected.
Update
OPTION DESCRIPTION
Remind me later Remind to update the next time the application is opened.
Skip this version Do not update the application with this version.
Download this version Download the version and wait for the application to be
and install when the closed before installing.
application is closed
Download installer using Download the installer externally using your default web
your default browser browser.
Download this version Immediately download the new version and install it.
and install now
4 User Interface
Illustrated below is the default Remote Desktop Manager main screen. Go to File – Options –
User Interface to change the current style. We have various settings for you to customize your
experience, such as different themes, shortcuts and more!
With the Menu user interface style, the Ribbon is been replaced by a standard menu, and the
Quick Access toolbar is not present. This setting can be found in File – Options – User
Interface – Ribbon Interface.
4.2 Style
Remote Desktop Manager supports different User Interface Styles (sometimes known as skins).
These greatly influence the visual aspect of the User Interface as well as its mode of operation.
Three styles currently exist:
· Ribbon
· Menu
CONFIGURATION
To select the User Interface style you must go in File – Options – User Interface and modify
the Ribbon interface.
EXISTING STYLES
RIBBON
The latest style sports a ribbon. Icons and text makes it easy to explore features.
MENU
CUSTOMIZING YOUR UI
Customizable styles (Default Ribbon and Default Menu) have dockable areas that can be
rearranged to your liking. Simply left-clicking then dragging the sub-components will result in
drop zones appearing. This allows you to drop the sub component where you choose, even
outside of the main form if you'd like.
4.3 Theme
The themes will modify the color and shade of Remote Desktop Manager.
OPTION DESCRIPTION
Default - Light Use the default theme, which is the Light theme.
Legacy Use the old look of Remote Desktop Manager (version 7 of RDM)
Light Use a clear theme with tones of white, gray, and blue.
The Top Pane contains the Quick Access Toolbar and the Ribbon / Menu.
If you end up confused by your modified settings and would like to reset it to its original layout,
navigate to the Windows tab and select Reset Layout.
The Quick Access Toolbar, which is found at the top of the application, It is composed of
multiple parts:
· Favorite commands.
· Lock command.
Quick Access Toolbar buttons are flagged locally on the current machine by
the current user. These local buttons are saved in a file named
RemoteDesktopManager.qtb. By default, this file is located in % localappdata
% \Devolutions\RemoteDesktopManager.
FAVORITE COMMANDS
Commands contained in the ribbon can be added in the quick access toolbar. These are the
favorite commands. To add a command to the quick access toolbar, right-click any icon in the
ribbon the select Add.
Favorite Commands
COMM DESCRIPTION
AND
Right-Click on any command to display the contextual menu. To remove an item from the quick
access toolbar, right-click on the item and select Remove. To add an item to the quick access
toolbar, right-click an item in the ribbon and select Add. Use this to customize your workspace
with your preferences.
This command will minimize the application. When you attempt to restore it you will be prompted
for the password. Applies only to data sources protected by a password.
DESCRIPTION
The Navigation Pane is one of the main components of Remote Desktop Manager user
interface. It lists all the available entries in the current data source, and allows to switch to
another data source or Vault.
Navigation Pane
ELEMENT DESCRIPTION
ELEMENT DESCRIPTION
Entry list Displays the content of the current data source, depending on the
selected tab. It allows to select entries and perform action on them.
Vault selector Allows to switch to another configured Vault in the data source.
Tabs Allows to switch to different views of the entry list, such as the
Favorite entries or the Opened sessions.
COLUMN CHOOSER
Choose the columns to display in the tree view. Right-clicking on the column name in the
Navigation Pane and select Column Chooser.
For more information on each tab, please consult the following topics:
· Vault
· Private Vault
· Opened Sessions
· Favorite Entries
· Most Recently Used Entries
DESCRIPTION
The Opened Sessions tab shows currently running sessions by type, and for the local machine
only. You can give the focus to an opened session by double-clicking it from the list. All of the
embedded sessions are listed, and the external sessions will appear if Remote Desktop
Manager is able to discover the specific type of session.
LOCAL SESSIONS
GLOBAL SESSIONS
With the SQL Server and Devolutions Online Database data sources, you can monitor currently
running sessions, provided that they have been opened within Remote Desktop Manager.
For many reasons beyond our control, it's possible for a session to be terminated without
Remote Desktop Manager knowing that this has taken place. This can happen, for example, if
Remote Desktop Manager isn't running when another application ends. As a result, any
terminated session will remain listed in the log. You may manually mark it as closed via the
contextual menu by selecting Flag as Closed.
HIDDEN SESSIONS
Some sessions, like SSH Port Forward, can be hidden from the dashboard when the
connection is established. When these sessions are hidden, they are not displayed in the Local
Sessions. Select Hidden Sessions from the combo box above the entry list to display hidden
sessions only.
VPN GROUPS
Sessions can be configured to use a VPN Group. When multiple session are using the same
VPN group, it will appear in this section with the count of opened connections using this VPN
group.
VPN Groups
NOTES
· Remote Desktop Manager tries to detect opened sessions even if they weren't launched from
the application. It uses the name of the process to accomplish this task.
DESCRIPTION
The Favorites tab contains entries flagged as favorite by the current user. Favorites are not
shared and they roam with the user profile.
This is useful when the number of managed entries becomes too great or when a strict directory
structure must be maintained.
The favorites feature has been completely reorganized in beta version 12.9.0.0.
To revert to the legacy interface, navigate to File – Options – User Interface –
Favorites, then enable the Use legacy favorite UI option.
When using the legacy favorite interface, the favorites view can be personalized the same way
as the Vault. Click on to select a preferred View.
The same command is located in the ribbon Home tab in the Miscellaneous section.
Favorites does not necessarily replicate the folder structure of the Vault. Add folders in the
favorite view to organize your favorite entries, or enable the legacy favorite interface.
ICON OVERLAY
If desired, an icon overlay can be displayed in the Vault over favorite entries. To display the
icon overlay, navigate to File – Options – User Interface – Favorites, then enable the Show
favorite icon in connection list option.
DESCRIPTION
This tab show the most recently used sessions on the local computer.
The most recently used entries view can be personalized the same way as the tree view. Click
on the button to select your preferred view.
To delete the most recently used entries history, select Clear Most Recently Used Entries...
By default, 10 items will be kept in the most recently used entries history. This setting can be
changed in File - Options - General - Recent.
4.6 Content Area
DESCRIPTION
The content area contains the various dashboards to manage RDM, as well as embedded
sessions. There is a single dashboard active at a time, depending on the currently selected
node in the Navigation Pane.
· Sessions.
· Information Entries.
· Folders.
· Credentials.
· Macros/Scripts/Tools.
DESCRIPTION
The Embedded (tabbed) display mode allows you to open multiple sessions as tabs withing
Remote Desktop Manager, similar to the tabs in your standard web browser. Embedded
sessions are one of the 3 available display modes, the other 2 being External and Undocked.
SPLIT WINDOWS
Within a Remote Desktop Manager embedded session is the option to display multiple tabbed
windows simultaneously. As illustrated below, select and hold down on a tab and drag it towards
the center of the screen to access the four-sided directional control. Aim the directional control to
anchor the tab to the top, bottom, left or right of the adjacent tab.
4.6.2 Dashboard
DESCRIPTION
The Dashboard displays commands and information related to the selected entry. The
dashboard contents depend on the type of the selected entry.
The tabs can be hidden if they are not necessary for a user.
Simply right-click any tab, then select an item to toggle the visibility of its
relative tab.
4.6.3 Wake-on-LAN
DESCRIPTION
Wake-on-LAN is supported in the Enterprise edition of Remote Desktop Manager. Plus, the
destination motherboard must support it, and it must be enabled. The computer must also be in
the local area network (LAN) and not connected in a VPN.
An important thing to note is that Wake-on-LAN operates below the IP level. This means that the
sending machine needs to be on the LAN, so we cannot send them over remote IP-based
connections, such as over SSH or VPN. WOL broadcasts packets to the target computer over
UDP. You can configure which port it uses, the default is 9. If you want to wake up a machine on
a different subnet, your router must forward UDP port 9, or whatever you change the port
assignment to. Most users do not have to configure their router or worry about this.
ENABLING WAKE-ON-LAN
The first step is to check that your computer supports Wake-on-LAN. There’s a few things to
check:
You must add a valid MAC address (Media Access Control address) in the session's
configuration. The input field can be found in the Information tab and in the Computer child tab.
The field name is MAC.
You can use the Discover button to automatically determine the MAC address. If this is
unsuccessful, you will need to enter it manually.
The discovery process will initially attempt using the ARP protocol. This is fast and does not
require authentication, but there are requirements on the network aspect that may not be met. If
ARP was not successful, another attempt is made using WMI. This is slower and requires
authentication. RDM will use the credentials as configured in entry properties, or the credentials
entered in the session tools tab (custom credentials or Credential repository).
USE WAKE-ON-LAN
If the settings are correctly configured, you can invoke the Wake-on-LAN from the session's
context menu, which can be found in the Macros/Scripts/Tools - Wake-on-LAN menu.
DESCRIPTION
Although the panes are by default in the footer, most tabbed windows can be moved around and
docked to your liking. That applies to the Default (Ribbon) or Default (Menu) styles.
Use the View – Footer commands from the ribbon to control the visibility of individual panes.
Footer Area
DOCKED FOOTER
Upon first use, the footer panes are undocked by default. You can dock them to a single panel
with a simple drag & drop. Just drag a pane into another one, then drop the it in the center of the
directional control.
Here, we drop the Details pane to make it tabbed with the Description pane.
You can use the same directional control to dock the footer panes into the main window.
4.7.1 Attachments
DESCRIPTION
Files are attached to an entry and are stored directly in the database.
To enable the attachment pane, navigate to View – Footer in the ribbon, then select
Attachments.
For architectural reasons, the documents stored in our Advanced Data Sources
are NOT protected from deletion. Once they are deleted, they cannot be
restored. Please keep a safe copy of all documents in another storage device.
Support for this feature will be added in a coming update to our products.
Attachment list
The attachment type and size are limited only by your bandwidth and the data source. You can
also view a saved attachment from:
· the session context menu;
· the session properties; or
· directly on the dashboard.
The refresh button allows you to update directly the selected document. Use it to save your local
modifications after an edit.
ACTIONS
Use the toolbar above the attachment list to manage the selected attachment.
Attachment toolbar
OPTION DESCRIPTION
The status bar rests at the bottom of the application. It is composed of multiple parts
· Search / Filter.
Status bar
SEARCH / FILTER
This feature is indicated by the green globe between the version label and the Grab input toggle.
Clicking it will change your connection between offline and online (for RDM only). You can tell
which connection state you are currently using by the color of the globe. Green is online and
orange is offline.
It is possible to apply a filter in the Navigation Pane tree view by typing some characters in the
filter box. The filter is applied using the specified settings in the application File – Options –
User Interface – Filter.
ELLIPSIS BUTTON
Ellipsis button
The filter expression is matched against fields as selected in the filter options such as:
It's possible to exclude results by choosing to display entries that match certain criteria:
In Navigation options, you can limit the search parameters to specific entry types. Such as
Sessions, Data Entries, etc.
Search Types
The Search Options offers the chance to customize your search, such as including shortcuts or
favorites, making it case sensitive, and more!
Search Options
KEYBOARD SHORTCUT
Use the keyboard shortcut CTRL+F to quickly have access to the Search / Filter control. This
can be disabled in File - Options - User Interface - Keyboard.
You can set the focus back on the Navigation Pane by using the keyboard shortcut Ctrl+L, this
also can be disabled in the options.
BOOLEAN FILTER
· Evaluated left-to-right
· No parentheses matching
· Double-quotes (") are not required or removed, they are part of the text filter, do not use them
unless you are looking for a double-quote.
· Boise&&Laptop
- Will work but filter for the string "Baton Rouge" and not the string Baton Rouge
- Will work but filter for Laptop and the string (Baton Rouge || Boise)
4.8.2 Grab Input
DESCRIPTION
The grab keyboard input is used to capture the keyboard shortcuts when a session is running.
It can be disabled momentarily to ensure that the shortcut is sent to the running session.
Ctrl+F is a shortcut that often interferes. It is used to focus Remote Desktop Manager's
search/filter toolbar. However, it is almost always present in applications in the remote session
and when you use the shortcut, Remote Desktop Manager sets the focus in the search/filter
toolbar instead. This conflict can be avoided by disabling the feature.
DESCRIPTION
Remote Desktop Manager allows the user to control the application from the Windows system
tray. You can also customize its content.
Right-click on the Windows tray menu bar to access the context menu. You can launch sessions,
change data source, use the Quick Connect feature, and more.
OPTION DESCRIPTION
Sessions List Displays the sessions from the current data source. Sessions are listed by default. It is
possible to show only those marked as favorites.
OPTION DESCRIPTION
Refreshes the data source.
Refresh
Lists all the currently open sessions.
Opened
Sessions
Recent Lists the Most Recently Used Entries.
Play List Allows the user to launch a Play List from the tray icon.
Data Sources Lists the available Data sources and allows the user to switch from one to another. This
section appears only if enabled and more than one data source is configured.
Prompts for the Quick Connect dialog to open an add-hoc connection with a specific
Quick type, or a selected template.
Connect
The application options contain many settings that allows for customizing the system tray icon
preferences. To change these, Navigate to File – Options – User Interface –
Trayicon/Taskbar.
5 Data Sources
DESCRIPTION
The data sources are at the heart of Remote Desktop Manager, they are the container that holds
entries.
SETTINGS
A data source can be a local file or a database (either local or shared). Multiple data sources
can be managed at the same time as seen below.
Data Source
Please consult our Create a new data source topic for more information.
Multiple data sources can be configured, but there is only one active at a time.
Switch from one data source to another by using the data source drop down list.
You may assign a data source to open automatically when Remote Desktop Manager starts.
OPTION DESCRIPTION
Use default data Select the data source to connect to when the application starts.
source
Prompt for data Prompt the user to for a data source to connect to.
source
Advanced Data Sources can manage a lot more settings related to the database and security.
Those settings are saved directly in the database. For more information, please consult the Data
Source Settings (System Settings) topic.
DESCRIPTION
This feature is only available for the following data sources: Devolutions
Password Server, MariaDB, Microsoft Access, Microsoft SQL Azure, Microsoft
SQL Server, MySQL and SQLite.
Two-factor authentication identifies users by two different components: something that the user
knows (often a password) and something that the user possesses (e.g. a validation code sent to
a mobile device).
If one of the components is missing or supplied incorrectly, the user's identity is not established
with sufficient certainty and then access to the data source will remain blocked.
Remote Desktop Manager supports Google Authenticator, Yubikey, Duo and AuthAnvil.
SETTINGS
1. Two factor authentication is set in the Data Source Configuration. You can set 2FA when
creating a new data source or edit an existing data source. To edit your data source, click File –
Data Sources. Click the pencil to edit the data source.
4. Once you have selected your 2FA click Save to start the configuration.
To configure the 2FA you use, please see the topic about supported 2FA types:
· Google Authenticator
· Yubikey
· Duo
· AuthAnvil
DESCRIPTION
Remote Desktop Manager allows you to use Google Authenticator to provide an additional
security layer when opening a data source.
SETTINGS
Before you start the configuration, make sure you have installed the Google
Authenticator application on a supported device.
2. Once you have installed the application, scan the QR code on your screen with the Google
Authenticator application to setup Remote Desktop Manager in Google Authenticator. When
Remote Desktop Manager is configured in Google Authenticator, enter the Validation code
provided by Google Authenticator in Remote Desktop Manager. Enter the Validation code and
then click on Validate.
3. Relaunch Remote Desktop Manager and select the protected data source to be prompted for
the Google Authenticator code.
5.1.2 Yubikey
DESCRIPTION
Remote Desktop Manager allows you to use a Yubikey to provide an additional security layer
when opening a data source.
SETTINGS
Before you start the configuration, make sure you have a Yubikey in your
possession.
Yubik ey Configuration
2. Insert the Yubikey into a USB port of your computer and hold the gold button on the Yubikey to
have the code filled in the field, then click on Save.
Yubik ey Authentication
3. Relaunch Remote Desktop Manager and select your protected data source to be prompted
for a Yubikey code.
5.1.3 Duo
DESCRIPTION
Remote Desktop Manager allows you to configure a Duo Authentication to provide an additional
security layer when opening a data source.
SETTINGS
Before you start the configuration, make sure you have created yourself a Duo
account and also have installed the Duo application on your compatible device.
There is three methods to use with Duo: by land line, by text message or by using their
application.
1. In your Duo account you will need to protect the application Web SDK.
2. In Remote Desktop Manager select Duo as your Two factor authentication and click on Duo –
General Settings.
2-Factor Configuration
3. All the information necessary to fill in the Duo Settings fields will be generated by your Duo
account.
4. Copy and paste all the information and click on Check to validate the information.
Duo Settings
5. Click on Save to authenticate yourself with your Duo account that has just been activated.
6. If you have more than one device connected to your Duo account, select the device you wish
to use for your 2-Factor authentication.
7. Select the method by which you would like to receive your Duo Passcode.
· Send SMS: You will receive the code by SMS on your registered phone number.
· Phone: You will receive a phone call and a computer generated voice will dictate the code
to you.
Duo Setup
Once you have completed all the steps, you will be prompted with the Duo Authentication every
time you connect to your secured data source.
5.1.4 AuthAnvil
DESCRIPTION
Remote Desktop Manager allows you to use AuthAnvil Authenticator to provide an additional
security layer when opening a data source.
SETTINGS
Before you start the configuration in Remote Desktop Manager, make sure you
have created and configured your AuthAnvil account. For more information please
consult https://authanvil.com/features/two-factor-authentication.
1. Select AuthAnvil in Remote Desktop Manager as your 2-Factor Authentication and click on
Save.
AuthAnvil Configuration
2. Enter the information of your AuthAnvil account and click on Check to validate the entered
information.
AuthAnvil Settings
5.2 Caching
DESCRIPTION
The caching mode will determine how the client will refresh the content of the data source when
changes are detected. On large data sources caching is essential as it increases performance
significantly.
SETTINGS
The Caching mode option can be access via the File – Data Sources – Edit Data Source –
Advanced tab of an Advanced Data Source.
Caching Mode
OPTION DESCRIPTION
Intelligen Intelligent cache has the ability to handle many more sessions without
t experiencing performance degradation.
OPTION DESCRIPTION
When first opening the data source Remote Desktop Manager will loaded the
session from the offline file then refresh to get the up-to date information.
LOCATION
If using a version of Remote Desktop Manager prior to 11.2, the default engine will be the
SQLite, in that case the database is encrypted using a non-portable computed key hash.
If using version 11.2 or newer of Remote Desktop Manager the default cache engine will be the
Microsoft Compound Document Format (MCDF) files.
You can enhance the security of the offline file by setting the Enhanced security in
File – Options – Security – Offline Security.
Depending on the configuration of the Caching mode & the Offline mode the
offline file may still exist since the file servers as a dual purpose caching & offline
line support.
SETTINGS
1. Open the Data Source Configuration window by clicking the ellipsis button at the top of
the Navigation Pane.
4. Configure the connection settings. To validate the information, click the Test Server or Test
Connection (depending on the type of data source being creating).
5. Once created, select the new data source by selecting it from the data source drop down list
at the top of the Navigation Pane.
DESCRIPTION
Remote Desktop Manager supports multiple types of data source. To start, decide which data
source you’ll be using.
Upon initial installation, you will be running from a local data source which is a
SQLite database.
· No security management.
· Reliable.
Cons
· Installation required.
Cons:
· No security management.
Cons:
· Reliable.
Cons:
· Secure.
Cons:
Cons:
· Reliable.
Cons:
· No security management.
· No security management.
Cons:
· No possibility of sharing.
· No security management.
DESCRIPTION
Advanced Data Sources are highly configurable data sources, typically running on an
advanced management system, such as a database management system or our own online
services.
Advanced Data Sources greatly increase the set of managing features available to
administrators, such as:
· Document uploads and Entry Attachments.
· Auditing and logging.
· Advanced security with User management and Role-based security system.
· Offline mode.
· Multi-Factor Authentication
For architectural reasons, the documents stored in our Advanced Data Sources
are NOT protected from deletions. Once they are deleted, they cannot be
restored. Please keep a safe copy of all documents in another storage device.
Support for this feature will be added in a coming update to our products.
DESCRIPTION
SETTINGS
GENERAL
OPTION DESCRIPTION
Always ask password Always ask password when connecting to the data source.
Database Name of the data base created online. You must use the ellipsis
button to select it from the list of online data sources available to
the name.
OPTION DESCRIPTION
Two factor Enable the 2-Factor Authentication to access your data source.
Test Credentials Test the credentials that you have configured to connect on
Remote Desktop Manager Online.
PRIVATE VAULT
VPN
Open a VPN to access your data prior to connecting to your Devolutions Online Database.
ADVANCED
OPTION DESCRIPTION
Caching mode Determine how the entries will be loaded from the data source.
See Caching topic for more information.
Ping online method Indicate the prefer ping online. Select between:
· None
· Web request
Prompt for offline Every time you will connect to your data source, you will be
mode on startup prompted to use the data source in offline mode.
OPTION DESCRIPTION
Auto go offline If the ping online method doesn't work it will automatically go
offline.
Disable lock Disable the option to lock the data source directly. The
application still can be locked but the user is not prompted for
the data source password when unlocking the application.
DESCRIPTION
HIGHLIGHTS
Enter a name of the data source and the URL for the Host. Ensure you use the correct protocol if
SSL is required by the server (https).
Export the data source, then import the file in your client workstations as described Import/Export
Data Source.
SETTINGS
GENERAL
OPTION DESCRIPTION
Example: http://<hostname or IP
address>/<instance name>
Use Windows Use the same credentials are your current Windows user.
authentication
Use Office365 Use the same credentials as your current Office365 user.
authentication
Always prompt for Always ask for the username and password when connecting to
credentials the data source.
Always ask Always ask for the password when connecting to the data source.
password
Test Connection Test the connection with Devolutions Password Server to validate
the credentials.
SETTINGS
OPTION DESCRIPTION
Remote tools Select whether the Remote Tools will be accessed locally or
access mode through the host.
Manage Cache Manage the data source cache. On large data sources caching is
a must and will increase performance significantly. For more
information, please consult the Manage Cache topic.
PRIVATE VAULT
OPTION DESCRIPTION
VPN
Open a VPN to access your data prior to connecting to your Devolutions Password Server.
ADVANCED
OPTION DESCRIPTION
Caching mode Determines how the entries will be reloaded in the data
source. For more information, please consult the Caching
topic.
Ping online method Indicate the preferred ping online method. Select between:
· None
· Web request
· Only Administrator(s)
OPTION DESCRIPTION
· Disabled
Prompt for offline mode Ask to use the data source in offline mode when the user
on startup connects to the data source.
Auto go offline Use the data source in offline mode when the ping method
does not respond.
Disable lock Disable the option to lock the data source directly. The
application still can be locked but the user is not prompted for
the data source password when unlocking the application.
5.4.1.3 MariaDB
DESCRIPTION
For added security, you can enable SSL Encryption to communicate with your
instance of MariaDB Server.
HIGHLIGHTS
· The data can be shared on a MariaDB database installed on any Operating System
MySQL supports.
SETTINGS
GENERAL
MariaDB - General
OPTION DESCRIPTION
Host Name of the host (server name) where the data source will be stored.
OPTION DESCRIPTION
Always Always prompts for the user to input a password when connecting to the data
ask source.
password
Allow Allows the user to change the username. This specific setting will save the
change currently type username (unlike similar features such as "Always prompt for
username credentials").
Two factor Enable the 2-Factor Authentication to access your data source.
Test Host Test the connection with the host (server name) to validate if the proper
information has been provided.
Test Test the connection with the schema to validate if the proper information has
Schema been provided.
PRIVATE VAULT
Connect your MariaDB to a Private Vault stored in a Devolutions Online Drive file (.dod),
thus creating your own Private Vault containing entries and credentials that no one else has
access to.
UPGRADE
OPTION DESCRIPTION
Test Host Test the connection with the Host (server name) to validate if the
proper information has been provided.
Create Schema Create the schema (database) on the MariaDB server to use Remote
Desktop Manager.
Update Schema Update the schema (database) on the MariaDB server, if required, to
use Remote Desktop Manager.
Test Schema Test the connection with the schema (database) to validate if the
proper information has been provided.
OPTION DESCRIPTION
Email Schema Send your schema (database) to the Devolutions Support team.
to Support
View Upgrade Prompts a window to provide information about the Upgrade Script.
Script
VPN
MariaDB - VPN
ADVANCED
MariaDB - Advanced
OPTION DESCRIPTION
Caching Determine how the entries will be reloaded in the data source. See
mode Caching topic for more information.
· Port Scan
OPTION DESCRIPTION
Prompt for Every time you will connect to your data source, you will be prompted to
offline mode use the data source in offline mode.
on startup
Auto go If the ping online method doesn’t work it will automatically go offline.
offline
Disable lock Disable the option to lock the data source directly. You can still lock the
application but you won't be prompted for the database password if this
option is disabled.
DESCRIPTION
With the Microsoft SQL Azure data source, Remote Desktop Manager uses the
Microsoft cloud platform to save and manage entries.
· Clustering
· Log shipping
· Database mirroring
Microsoft SQL Azure offers different service tier in their purchase model for DTUS.
HIGHLIGHTS
· Used to create an online database. Get more information on Microsoft SQL Azure.
For Azure AD authentication, download and install the “Microsoft Active Directory
Authentication Library for Microsoft SQL Server“.
CONFIGURATION
Consult the Configure SQL Azure topic for more information on the configuration.
SETTINGS
GENERAL
OPTION DESCRIPTION
· Custom login
Always ask Prompt for the password when a user connects to the data source.
password
Allow change Allow the username to be edited when connecting to the data
username source.
Test Database Test the connection with the database to validate if the proper
information has been provided.
SETTINGS
OPTION DESCRIPTION
Root filter Enter the name of a root level folder to display only the entries
contained in that folder.
Ping online Indicate the preferred ping online method. Select between:
method · None
· Ping
· Port Scan
Auto go offline Use the data source in offline mode when the ping method does not
respond.
Disable lock Disable the option to lock the data source directly. You can still lock
the application but you won't be prompted for the data source
password if this option is disabled.
PRIVATE VAULT
OPTION DESCRIPTION
UPGRADE
OPTION DESCRIPTION
Create Database Create the database on the SQL server to use Remote Desktop
Manager.
Update Update the database on the SQL server, if required to use Remote
Database Desktop Manager.
Test Database Test the connection with the database to validate if the proper
information has been provided.
OPTION DESCRIPTION
View Upgrade Prompts a window to provide information about the Upgrade Script.
Script
VPN
Open a VPN to access your data prior to connecting to your Microsoft SQL Azure database.
ADVANCED
OPTION DESCRIPTION
Caching mode Determines how the entries will be reloaded in the data source. For
more information, please consult the Caching topic.
Prompt for Ask to use the data source in offline mode when a user connects to
offline mode on the data source.
OPTION DESCRIPTION
startup
Allow beta Allow beta upgrade of the database (when using a beta version of
database Remote Desktop Manager).
upgrade
Manage Cache Manage the data source cache. On large data sources caching is a
must and will increase performance significantly. For more
information, please consult the Manage Cache topic.
DESCRIPTION
1. Make sure that you have a valid Microsoft SQL Azure subscription to be able to create your
database.
2. Follow the steps in the Create a data source topic. On Step 4, before testing server or
otherwise verifying the connection, continue with the steps below.
3. Select the Upgrade tab and click the Create Database button. If the database is already
created on the Microsoft SQL Azure Server, click the Update Database button to add the
appropriate tables to the database.
Upgrade Tab
4. Once the database is created, create an administrator account for the database via the
Administration - User Management menu.
5. Connect on the Microsoft SQL Azure database with the Remote Desktop Manager
administrator account. To do so, edit the data source used to create the database and change
the login information for the administrator account that you have created.
DESCRIPTION
For Azure AD authentication, download and install the “Microsoft Active Directory
Authentication Library for Microsoft SQL Server“.
From the Ribbon, navigate to Administration – Users, and add a new user.
Note: When creating SQL Active Directory users, you must be logged in with an Azure Active
Directory user. Otherwise it will fail and you will be notified of the error.
Use the servers defined Azure AD Admin to create your other users (to start). Once you've
created other admin users, you can use them to create more users.
Azure AD Portal
5.4.1.4.3 Configure Active Directory Interactive (w ith MFA Support)
DESCRIPTION
Active Directory Interactive (with MFA Support) allow you to authenticate on your Microsoft
SQL Azure data source using your Office365 account + MFA.
SETTINGS
1. Select Active Directory Interactive (with MFA Support) from the Login mode dropdown
menu.
2. If you have several Microsoft SQL Azure data sources, you would need to decide if you want
to authenticate on each of them at the first connection or only once for all of them.
OPTION DESCRIPTION
Shared Prompt to authenticate on the first data source and will use
the same login on the other data sources. Easier to switch
from one data source to another if you have several of them.
App Registration
DESCRIPTION
To be able to use the Active Directory Interactive (with MFA Support) authentication method
in Remote Desktop Manager, a new app needs to be registered in the Microsoft SQL Azure
console (Active Directory admin) with the appropriate API permissions.
SETTINGS
2. In the Azure Active Directory section, select App registrations and then, New
registration.
App Registration
3. Configure the Name, Supported account types and Redirect URL as indicated below.
4. Optional step: Click on the Authentication section and switch to Yes, if you desire the
Integrated Windows Authentification (IWA) option.
Authentication
API Permissions
6. Select Azure Active Directory Graph – Delegated Permissions – User – User.Read and
click on Add Permissions.
User.Read
7. We would need to add a second permission. To do so, select APIs my organization uses,
then type Azure and select Azure SQL Database.
user_impersonation
Application (client) ID
12.Paste the Application ID inside Remote Desktop Manager, in the App Registration
section.
App Registration
DESCRIPTION
With the Microsoft SQL Server data source, Remote Desktop Manager uses the
power of Microsoft SQL Server to save and manage entries.
· Clustering.
· Log Shipping.
· Database mirroring.
HIGHLIGHTS
CONFIGURATION
Consult the Configure SQL Server topic for more information on the configuration.
SETTINGS
GENERAL
OPTION DESCRIPTION
· Custom Login
OPTION DESCRIPTION
Always Prompt for the password when a user connects to the data source.
ask
password
Allow Allow the username to be edited when connecting to the data source.
change
username (Only with Always ask password enabled)
Test Test the connection with the server to validate if the proper information has
Server been provided.
Test Test the connection with the database to validate if the proper information
Database has been provided.
SETTINGS
OPTION DESCRIPTION
Root filter Enter the name of a root level folder to display only the entries
contained in that folder.
Ping online Indicate the preferred ping online method. Select between:
method
· None
· Ping
· Port Scan
Auto go offline Use the data source in offline mode when the ping method does not
respond.
Disable lock Disable the option to lock the data source directly. You can still lock
the application but you won't be prompted for the data source
password if this option is disabled.
PRIVATE VAULT
OPTION DESCRIPTION
UPGRADE
OPTION DESCRIPTION
Test Server Test the connection with the server to validate if the proper information
has been provided.
Test Database Test the connection with the database to validate if the proper
information has been provided.
OPTION DESCRIPTION
VPN
Open a VPN to access your data prior to connecting to your Microsoft SQL Server.
ADVANCED
OPTION DESCRIPTION
Caching mode Determines how the entries will be reloaded in the data source. For
more information, please consult the Caching topic.
Prompt for Ask to use the data source in offline mode when the user connects to
offline mode on the data source.
OPTION DESCRIPTION
startup
Allow beta Allow beta upgrade of the database (when using a beta version of
database Remote Desktop Manager).
upgrade
Manage Cache Manage the data source cache. On large data sources caching is a
must and will increase performance significantly. For more
information, please consult the Manage Cache topic.
DESCRIPTION
For added security, you can enable SSL Encryption to communicate with your
instance of SQL Server. However, due to a framework limitation, this is not
compatible with our iOS and Android versions of Remote Desktop Manager.
2. Follow the steps in the Create a data source topic. On Step 4, before testing server or
otherwise verifying the connection, continue with the steps below.
3. Select the Upgrade tab and click the Create Database button. If the database is already
created on the Microsoft SQL Server, click the Update Database button to add the appropriate
tables to the database.
Upgrade Tab
4. Once the database is created, create an administrator account for the database via the
Administration - Users menu.
5. Connect to the Microsoft SQL Server database with the Remote Desktop Manager
administrator account. To do so, edit the data source used to create the database and change
the login information for the administrator account created with Remote Desktop Manager.
DESCRIPTION
Microsoft SQL Server backup and restore operations occur within the context of the recovery
model of the database. Recovery models are designed to control transaction log maintenance.
A recovery model is a database property that controls how transactions are logged, whether the
transaction log requires (and allows) backing up, and what kinds of restore operations are
available. Three recovery models exist: simple, full, and bulk-logged. Typically, a database
uses the full recovery model or simple recovery model. A database can be switched to another
recovery model at any time.
If the Recovery Model is set to Full, it is critical that regular backups of BOTH
the database and the transaction log are performed. Not performing these
backups will result in the database files to increase in size at an alarming rate.
This will severely impact the performance in the long run.
DESCRIPTION
To ensure that the communication between Remote Desktop Manager and the Microsoft SQL
Server database is encrypted, an extensive procedure must be followed on the Microsoft SQL
Server instance.
Please consult this Microsoft technet article that provides detailed instructions: Encrypting
Connections to SQL Server (technet).
After it has been properly configured, the only modification to perform in Remote Desktop
Manager is to set a property in the More Settings of the data source.
PROCEDURE
1. Create or edit an Microsoft SQL Server data source, access the Advanced tab and click the
More Settings button.
5.4.1.6 MySQL
DESCRIPTION
Remote Desktop Manager uses a MySQL database to store the session data. It is
only supported in the Enterprise edition.
For added security, you can enable SSL Encryption to communicate with your
instance of MySQL Server.
· https://dev.mysql.com/doc/connector-net/en/connector-net-tutorials-ssl.html
· https://dev.mysql.com/doc/connector-net/en/connector-net-6-10-connection-
options.html
HIGHLIGHTS
· The data can be shared on a MySQL database installed on any Operating System MySQL
supports.
SETTINGS
GENERAL
OPTION DESCRIPTION
Host Name of the server where the data source will be store.
Port If not using the default port, enter your Port number.
Integrated When enabling the Integrated Security, the user and password field will be
Security disabled because the operating system will provide a cached copy
automatically. Please see Integrated Security for more information.
OPTION DESCRIPTION
Always ask Prompt for the password when a user connects to the data source.
password
Allow Allow the username to be edited when connecting to the data source.
change
username (Only with Always ask password enabled)
Schema Name of the schema on the MySQL server for the utilization of Remote
Desktop Manager.
Two factor Enable the 2-Factor Authentication to access your data source.
Test Host Test the connection with the Host (server) to validate if the proper
information has been provided.
Test Test the connection with the schema to validate if the proper information
Schema has been provided
PRIVATE VAULT
OPTION DESCRIPTION
UPGRADE
OPTION DESCRIPTION
Test Host Test the connection with the host (server) to validate if the proper
information has been provided.
Create Schema Create the schema on the MySQL server to use Remote Desktop
Manager.
Update Schema Update the schema on the MySQL server, if required, to use Remote
Desktop Manager.
Test Schema Test the connection with the schema to validate if the proper
information has been provided.
OPTION DESCRIPTION
VPN
Open a VPN to access your data prior to connecting to your MySQL database.
ADVANCED
OPTION DESCRIPTION
Caching mode Determine how the entries will be reload in the data source. See
Caching topic for more information.
Ping online Indicate the preferred ping online method. Select between:
method
· None
· Ping
· Port Scan
OPTION DESCRIPTION
Prompt for Every time you will connect to your data source, you will be prompted
offline mode on to use the data source in offline mode.
startup
Auto go offline If the ping online method doesn’t work it will automatically go offline.
Disable lock Disable the option to lock the data source directly. You can still lock
the application but you won't be prompted for the database password
if this option is disabled.
TROUBLESHOOTING
DESCRIPTION
The Private Vault allows you to connect a personal Vault stored in a Devolutions Online
Drive file directly to your Advanced Data Source, thus allowing you to store information that
only you can have access to. For more information about the Private Vault please follow this link.
1. In the Private Vault tab of your Advanced Data Source, select Online Drive in the Type.
2. Click on the ellipsis next to the Filename field. A list containing your pre-existing Devolutions
Online Drive files will prompt. You may choose to use an existing file (.dod) or if you wish you can
enter a name in the New data source field and click on Create to automatically create a new
Devolutions Online Drive file.
5.4.2 DropBox
DESCRIPTION
Remote Desktop Manager uses the Dropbox API to retrieve a XML file from the
configured repository. There is no need to install the Dropbox client on the machine
to open the data source. It is also possible to configure more than one Dropbox
account on the same machine.
HIGHLIGHTS
· This data source can be shared over the Internet between multiple locations.
· To avoid data corruption, the session list should be modified in one location at a time.
· No need to have the Dropbox client installed to use the Dropbox data source.
SETTINGS
GENERAL
OPTION DESCRIPTION
Mode Select the mode that is preferred to configure the data source. Select
between:
· Account
OPTION DESCRIPTION
· Local
Local path Contains the local path where the Dropbox files are accessible.
(Local Mode)
Email (Accout Contains the email address associated with the Dropbox account.
Mode)
Validate with Button to validate the email address with the Dropbox account.
Dropbox
(Account
Mode)
Master key Add an additional layer of security to your data source by using master
key.
Always ask Connecting to the data source will always prompt for the master key.
master key
Dropbox Indicate the folder in Dropbox. It should not contains any drive since it's
directory stored online. Leave it empty to use the default Dropbox root.
Filename Indicate the filename used to store the data on the data source.
Compress Activate this option if you wish to compress your database file.
database file
VPN
ADVANCED
OPTION DESCRIPTION
Auto refresh Set the interval to use between each automatic refresh.
Use current Dropbox This option will use the Dropbox account who has been
session if available already validated without any other validation.
Always ask for Always ask for confirmation when connecting to the data
confirmation source.
Disable reveal password Disable the reveal password feature when a user access
this data source.
Allow offline mode Allow the data source to be used in Offline mode.
DESCRIPTION
Remote Desktop Manager downloads and uploads the session settings directly
from file located on an FTP site.
GENERAL
OPTION DESCRIPTION
OPTION DESCRIPTION
Always Always ask for the password when connecting to the data source.
ask
password
Account Indicated if the account has been validated with Google Drive. Credentials
status must be validated before using the data source.
Validate This contextual button attempts validates the credentials currently in use (or
Google removes currently validated credentials).
Drive
Master Enter the master key of the data source (If enabled).
key
Always Enabling this option will prompt for a master key whenever you are
ask connecting to the data source.
master
key
Filename Enter the Google Drive path of the data source's file.
VPN
Open a VPN to access your data prior to connecting to your Google Drive.
DESCRIPTION
The Devolutions Online Drive stores and synchronizes your remote connections and credentials
data in our Cloud services. You can access your sessions from anywhere via an Internet
connection.
It is an online file storage service dedicated to a single file type, Remote Desktop Manager’s
connection list. Devolutions Online Drive is completely free and has no limitations as to how
many sessions you might have, it is for single users as it cannot share files.
Please consult the Online Drive topic for information on this service.
Since this service is hosted in the cloud, we strongly recommend that you
further encrypt your data by applying a Master key. This will ensure that the file
will be unreadable by no one but you.
Even though this is a cloud service, you MUST use our Online Backup service
to keep history of your data. Devolutions offers a free backup service, and we
do not maintain multiple versions of the Online Drive content. This makes it
critical that you enable the backup feature. This service will keep multiple
versions of your file and is the best option.
SETTINGS
GENERAL
OPTION DESCRIPTION
OPTION DESCRIPTION
Always ask password Prompts for the password every time a connection to the
Devolutions Online Drive is attempted.
Test Connection Test the connection with Devolutions Online Drive to validate
the provided credentials.
Always ask master key Ask for the master key every time a connection to the
Devolutions Online Drive is attempted.
BACKUP
Please consult the Online Backup topic for information on this service.
OPTION DESCRIPTION
VPN
Open a VPN to access your data prior to connecting to your Devolutions Online Drive.
ADVANCED
OPTION DESCRIPTION
Auto refresh Set the interval to use between each automatic refresh.
Disable reveal Disable the reveal password feature when a user access the data
password source.
Clear Offline Clear the offline cache on the local computer. This can be very helpful
Cache when encountering offline issues.
5.4.5 SQLite
DESCRIPTION
Remote Desktop Manager's SQLite data source is ideal for single user and stand-
alone situations. More powerful and more flexible than the XML file format, it also
supports a few of the Advanced Data Source options like Logs and Attachments.
HIGHLIGHTS
All passwords are encrypted by default by Remote Desktop Manager. You can
specify a custom password to fully encrypt the content of the SQLite database.
Password recovery is not possible, the data will be unrecoverable if you cannot
authenticate. Please ensure you backup the password in a safe place.
SQLite supports an unlimited number of simultaneous readers, but will only allow
one writer at any instant in time. For this reason Remote Desktop Manager does
not support sharing a SQLite data source between several users by storing it on a
network drive. If you want to share your data and work in a team environment with
your colleagues, please use one of the Advanced Data Sources. Please consult
SQLite.org for more information.
PASSWORD MANAGEMENT
You can specify a password to further encrypt your data. Specify it at creation time. If the data
source already exists you can modify the password by using the File – Manage Password
dialog.
SETTINGS
GENERAL
OPTION DESCRIPTION
Always ask Always ask for the password when connecting to the data source.
password
Test Test the current database path and password for conneciton.
Connection
OPTION DESCRIPTION
Two factor Enable the 2-Factor Authentication to access your data source.
BACKUP
OPTION DESCRIPTION
· File backup: Your backup will be saved to a chosen file but will not
automatically do backup every 30 seconds.
VPN
ADVANCED
OPTION DESCRIPTION
Disable reveal Disable the reveal password feature when a user access this data
password source.
Disable caching Entries will be reloaded in Simple mode in the data source. See
Caching topic for more information.
5.4.6 WebDAV
DESCRIPTION
With the WebDAV data source, Remote Desktop Manager downloads and
uploads the session settings directly from a file located on a WebDAV site.
SETTINGS
GENERAL
OPTION DESCRIPTION
Always Always ask password input when connecting to the data source.
ask
password
Master Add an additional security layer by encrypting your data source with a master
key key.
Always Always prompt for the master key when connecting to the data source.
ask
master
key
Filename Enter the file name. If it does not exists, it will be created automatically.
VPN
ADVANCED
OPTION DESCRIPTION
5.4.7 XML
DESCRIPTION
Remote Desktop Manager saves the settings directly in an XML file format.
HIGHLIGHTS
· This is a very simple data source and it can be modified or generated by an external tool.
All passwords are encrypted by default. You can specify a custom password
(master key) to fully encrypt the content of the file. It is impossible to recover the
data if the master key is lost. Please make sure to remember or backup the
master key in a safe place.
SETTINGS
GENERAL
OPTION DESCRIPTION
Filenam Specify the full path of the XML file used to save the data. Relative paths and
e environment variables can be used as well.
Master Add an additional layer of security by encrypting your data source with a master
key key.
Always Always prompts for the master key when connecting to the data source.
ask
master
key
BACKUP
OPTION DESCRIPTION
· File backup: Your backup will be saved to a chosen file but will not
automatically do backup every 30 seconds.
Backup name Specify the backup name that will allow you to automatically save your
sessions in a safe online storage space and restore them in the event
of problems.
VPN
ADVANCED
OPTION DESCRIPTION
Auto refresh on Indicate if the application monitor the file changes to automatically
file change refresh the data source.
Disable reveal Disable the reveal password feature when a user accesses this data
password source.
Allow custom This will enable the loading of any custom images in the tree view.
images
Read-only Set the data source in read only. No new entry can be created and the
existing data cannot be edit.
DESCRIPTION
To simplify deployment for multiple users, it is possible to export and import data source
configurations. The generated .rdd file contains all the information to recreate the configuration.
Please note that the .rdd file does not include the database content. Only the configuration is
exported. Use the entries's Export functionality to backup or copy the database's content.
Whether or not users can Read/Write in Offline mode is first decided at the data
source's Caching mode level. This cannot be changed remotely. If you wish to
prevent or allow remote users the Read/Write offline feature, you should do so
before exporting your data source.
A locked data source can be exported and imported, but the content will be
locked unless a password is entered when the data source is selected. See Lock
Data Source for more information.
To protect sensitive data in your data source configuration (e.g. server URL or credentials), you
may wish to lock the data source configuration before you deploy it to your users. You can do it
by using the Lock/Unlock button from the toolbar.
SETTINGS
The locked data source will require a password. The password must be specify when the lock is
applied. Use the same password to unlock it or to modify the data source configuration.
There is NO way of unlocking the data source if the password is lost or forgotten.
In such an event, you will need to configure a new data source. However the
content of the database will not be lost.
DESCRIPTION
The offline mode connects to a local copy of the data source when you are not connected to the
data source. This is useful when working from a remote location and the network is unreachable
or if there is any kind of connectivity issue.
The read/write offline mode adds to users the possibility to manipulate entries while
disconnected from the data source. This is useful for off-site personnel or when working in
environments that have sporadic network availability.
This feature is not available for all data sources, please consult the help topic of
the respective data source to know if it supports offline mode.
The offline cache is first encrypted using our own private key mixed with some
information taken from the local computer. This makes it impossible for a copy on
another machine to be readable. By default it is also encrypted with Windows
NTFS encryption, in which case there is no key saved anywhere.
For added security, offline files are set to expire after a delay. The default expiry is set to 7 days
but can be modified via the Data Source Settings (System Settings).
Remote Desktop Manager will prompt for offline mode when the application is unable to reach
the data source but the offline mode can be toggled manually with File – Go Offline.
AVAILABILITY
The lowest setting (in terms of security) prevails over the others, which may prevent you from
using the offline mode. If the Go Offline button is not available, please consult your
administrator.
The Data Source Information displays the size of the offline cache file along with the effective
modes (disabled, read-only or read/write).
CACHING MODE
The caching mode must be set to Intelligent to enable the offline mode.
This step cannot be modified remotely once you have exported your data source
settings. You should take a moment and think about the needs of your data
source and select what is appropriate before moving on to exporting.
OPTION DESCRIPTION
Some features of Remote Desktop Manager are unavailable while offline. Even
with read/write access mode, you may not be able to perform all actions, such as
adding attachments or managing users since these features are not cached
locally. On the other hand, note that the Private Vault is still available in offline
mode.
GRANT/DENY OFFLINE
OPTION DESCRIPTION
Read-only Allow to view and use entries only. The content of the data source cannot be
modified.
Read/Write Allow to view, use, and edit entries. Conflicts caused by offline modifications
are managed when back online.
Beyond the group policies, the Offline mode is controlled at four levels:
· User permissions.
· Data source settings (System Settings) (server configuration).
· In a Vault's configuration.
A user must be granted Read/Write at all three levels to allow read/write privileges.
Allow offline
Read/write Read/write Read/write
enabled
You want to know the current effective Offline mode while connected? See My
Data Source Information.
DESCRIPTION
The Read/Write offline mode allows the user to add, edit and delete entries while the data
source is offline. Those changes are saved locally and synchronized with the data source once it
is back online.
Some functionalities are not available while offline and you may not be able to
perform all actions. Note that the Private Vault is still available in offline mode.
Once offline, the users security settings still applies. Add/Edit/Delete privileges granted by the
administrator are still in effect. See User Management.
When an entry is edited by an online user while another user is offline, the local version of the
entry stored in the offline cache becomes different from the online version. This causes a conflict
when the offline user gets back online.
Offline Edits
You can use the Compare action to have a side by side comparison of your changes with the
current live entry.
When multiple users edit the same entry offline simultaneously, a conflict occurs when the
second user is back online.
When the first user returns online, the Offline Edits window is displayed. Changes are accepted
by default.
When a second user returns online, a conflict occurs and the Offline Edits window is displayed.
When the conflict occurs, the user must decide to accept or reject the changes. The different
versions of the entry can be compared to view which changes has been made.
Click the Compare button to compare the versions of a conflicted entry. Analyze the XML
structure of the entry to decide to Accept or Reject the changes.
The content on the left represents the entry retrieved online, and the content on the right
represents the local version of the entry, edited in Offline mode.
DESCRIPTION
This option allows you to manage your cache which decides how the client will re-load entries
when changes are detected. On large data sources caching is a must and will increase
performance significantly.
This feature is only available when the offline engine is set to use SQLite. We
are phasing out this engine because of multiple issues reported by customers.
We recommend you use MCDFv2.
The Manage Cache options should usually only be used upon request from our
Support Team when experiencing cache issue.
SETTINGS
The Manage Cache options will only be available when using an SQLite cache.
Manage Cache
OPTION DESCRIPTION
Analyze Analyze will generate a report of everything that is contained in the cache. It
will read the offline data and perform a read/write test to verify if the offline file
is valid.
OPTION DESCRIPTION
Vacuum This will run an SQLite command to reduce your cache size. The Vacuum
should only be used after trying to execute a Repair of your cache. If the
repair hasn't solved your issue running a Vacuum will usually solve issues
when dealing with a corrupted cache.
Repair The repair will run four different SQLite commands to repair a corrupted
cache:
§ PRAGMA integrigy_check
§ REINDEX DatabaseInfo
§ REINDEX Connections
§ REINDEX Properties
DESCRIPTION
The Private Vault is a user specific Vault for entries of any type. It allows each user to create
entries that only them can access. Not even administrators can access a user's Private Vault.
A NOTE ON CREDENTIALS
These restrictions can easily be understood when you keep in mind that the Private Vault is in
fact contained in the user area of the database. It must be used from within the Private Vault, or
by using our extension mechanism that is user specific.
5.9.1 Private Vault Search
The Private Vault Search links a Private Vault credential entry to a session by providing the
name of the credential entry. Once the credential is found, it will automatically be used to open
your remote session.
SETTINGS
Private Vault
2. Set the Global Availability property of the Private Vault credential to Available.
Global Availability
OPTION DESCRIPTION
Available Make the credential entry available for Private Vault search.
Default Use the setting defined in File - Options - Types - Credentials - Global
Availability.
Unavailable Ignore the credential entry when using the Private Vault search.
3. In the remote session, set the Credentials property to Private Vault search and enter the
exact name of the Private Vault credential. The search is not case sensitive, if more than one
entry has the same name or if no entry matches the searched name, you will be prompted
with a list of all available Private Vault credentials. Variables are supported as well.
4. Open the session as you would normally proceed. Once the credential is found it will
automatically be used to open the remote session.
The Private Vault is linked to the database user. Another user will never be able
to see your Private Vault credentials even when the Global Availability is set to
Available.
6 Entries
Every item you see in the Navigation Pane is an Entry. Create a new Entry from the ribbon by
using the New Entry button in the Edit tab or by right clicking in the Navigation Pane and
clicking on New Entry.
New Entry
Entries come in various types and are described in the following sections:
· Session
· Information
· Contact
· Credential Entry
· Document
· Folder
· Synchronizer
· VPN
· Macros/Scripts/Tools
Entry Types
Some settings are common to most entry types, meaning that they are almost the same for every
entry. These options are on the side menu of the properties of entries.
Common Settings
6.1.1 General
DESCRIPTION
The General side menu contains general information about your entry.
SETTINGS
DESCRIPTION
Name Enter the name of the session that will be displayed in your treeview. This will be
copied to the host field as it's initial value as often the computer name is entered
here and can be used directly.
Folder Used to organize the session in different folders, either in the tray icon context
menu or in the tree view. Learn more here.
6.1.2 More
DESCRIPTION
More
DESCRIPTION
· Text
· RTF
· URL
The description is displayed in a tooltip when hovering the described entry with the mouse in the
tree view.
TAGS
ALTERNATE HOST
Alternate Host handles changes in network topology. For example when having a laptop that is
being used at home and at the office you may need to connect differently for each location, in
those circumstances you can let the system detect how to connect.
EXPIRATION
Enter a date to automatically change your entry Status to Expired and to get it listed in the
Expired Session Report.
6.1.3 Permissions
DESCRIPTION
Security Groups have been deprecated, but are still available for reference
purposes. Do not use security groups and role-based access control at the
same time.
PERMISSIONS
POSSIBLE VALUES
There are four possible values that define how permissions are granted:
· Inherited: Inherit the permission from parent folders.
· Custom: Specify which users/roles that have permission. Click Select roles or users to
define who has permissions.
· Everyone: Grant the permission to every user.
· Never: Block the permission for every user, except administrators.
For examples on using permissions, please consult the Role Based Access Control topics.
Permissions - General
SECURITY GROUPS
Security groups were used to protect sessions from a subset of system users. Assign your entry
to a security group then control who has access to it and how much control they have on the
entry.
6.1.4 Security Settings
DESCRIPTION
The Security Settings section is used to manage various settings regarding the edited entry.
OPTION DESCRIPTION
Checkout mode The Checkout system locks an entry while it is being used or
modified. It prevents users from using or editing an entry at the same
time. For more information, please consult the Checkout system topic.
OPTION DESCRIPTION
· True
· False
· Inherited
Time Based The Time-based usage allows to limit the usage of resources to
Usage specific times. This feature is useful to prevent unattended use of
entries. Works with Advanced Data Sources.
Allow password Enable this setting for the $PASSWORD$ variable to be available
in variable with the command line.
DESCRIPTION
The Checkout system locks an entry while it is being used or modified. It prevents users from
using or editing an entry at the same time.
The checkout system can be enabled for sessions, documents, credentials, and
information entries.
You can set the check out mode at the root, folder or entry level.
This feature is only available when using SQL Server or Devolutions Password
Server data sources.
Learn more about check out modes and setting check out on the root and folders
SETTINGS
To access the check out system, edit an entry that supports checkout, and navigate to the
Security section.
CHECKOUT MODE
Checkout mode enables or disables the checkout system. It also decides how the checkout
mode functions.
OPTION DESCRIPTION
Root Inherits the checkout mode setting from the root folder.
Automatic Checks out an entry automatically when the entry is opened and
automatically checks the entry in when the entry is closed. User can
edit properties without checking out the entry.
Manual Users need to check out the entry manually prior to opening or editing
the entry. No action can be performed without checking out the entry.
Inherited Inherits the check out mode from the parent folder.
Optional Offers the option to check out an entry manually or use (open and edit)
the entry without checking it out.
CHECKOUT PROMPT
Checkout prompt sets if a user must enter a comment when they check out the entry.
Administrators can monitor the comments through the logs available on the entry or Activity
Logs.
OPTION DESCRIPTION
Root Uses the checkout prompt setting from the root folder.
True Prompts the user for comment when they checkout an entry.
VAULT SETTING
The checkout system Vault refer to the settings in the vault root folder.
The session recording feature records videos of opened sessions for auditing purpose.
This feature generates two files when recording a session. A video file and an information file.
OPTION DESCRIPTION
Mode Select how the feature is applied to the session. Select between:
· Default: inherits the values from the vault settings.
6.1.6 VPN/SSH/Gateway
DESCRIPTION
Although you can configure a VPN details in session properties, it is best practice to link a
session entry to a separate VPN entry. Please see, Configure a VPN for multiple sessions to
learn more.
GENERAL
Each VPN type has its own set of properties to configure and you must know them in order to
properly configure them. For more information about settings see the VPN entry topic
VPN GROUP
VPN TYPE
Select which type of VPN you wish to configure inside your session. There are multiple natively
supported VPN connection types and many more are available through add-ons. Please consult
VPN Add-ons for more information.
INSTALLATION PATH
You can manually configure your VPN installation path. To use the default installation path, leave
the field empty.
Installation Path
SETTINGS
Define the VPN settings in this tab. Enter the VPN name and credentials to properly connect to
your VPN.
VPN Settings
You can configure a Phone book with a VPN for a RDP Entry. This VPN entry can use the
default Phone book, a specific Phone book, an embedded Phone book or a reference to a type
of Phone book document.
DESCRIPTION
This section controls how your entry is displayed and what information is contained in it.
CONTENT
· Tab page
· Color
· Other
TAB PAGE
TAB GROUP
Click on a tab group to filter the opened sessions and display only sessions from that group.
Much like the Folder feature, a hierarchical structure can be defined by entering a backslash to
indicate a sub-level.
You can also use left click to drag out the tap groups as a separate window.
Indicate a tab title to display instead of the name of the session. You can use a variable to add a
prefix or a suffix.
VISIBILITY
This setting is useful for VPN connections and entries that don't necessarily need interaction
when opened. If the value is set to False, the session's tab is hidden when the session is
opened.
Visibility
To view hidden sessions in the Navigation Pane, select the view Opened Sessions tab and
then select Hidden Sessions.
Hidden Session
Enable this setting to keep the tab page opened when the application detects a closed
connection. For more information, please consult Keep Tabs Opened for more information.
This setting can be changed in multiple sessions at the same time using the Batch Edit feature.
COLOR
It is possible to change the default color of the tab page to easily identify it.
OPTION DESCRIPTION
Fore color Set the foreground color of the name of the entry in the Navigation
Pane.
The application colors the border of the embedded window along with the tab.
OTHER
Other
OPTION DESCRIPTION
Sort priority Set the number to a higher number to increase the sorting priority in
the Navigation Pane.
Show in trayicon Allow access to the entry from the tray icon.
6.1.8 Information
DESCRIPTION
The Information side menu contains general information regarding your computer, software,
hardware, expiration warranty, etc...
The various sections of this feature are mostly for you to input information regarding the entry's
specifics (usually the target host). The sections are divided as follows:
· General: Enter specific information regarding the computer, such as operating system, MAC
address and hardware description. This will also enable certain actions within the dashboard,
for example the Wake-on-LAN.
· Software: Here you can input a list all software installed on the remote computer as well as
indicate the server roles.
· Hardware: Specify the hardware information of the remote computer.
· Contact: Enter contact information or link to a contact entry. It can be useful when managing a
third party server.
· Purchase: Enter information related to the invoice or the purchase of the equipment.
· Custom Fields: Define custom properties and values that can then be access via variables
($CUSTOM_FIELD1$, $CUSTOM_FIELD2$, etc.) in child connections or
Macros/Scripts/Tools. You must be an administrator or have additional privileges to reveal
password in order to view the protected values.
· Statistics: View who created or update the entry, as well as the date.
DESCRIPTION
Indicates if the entry is a Jump Host. Please consult our Jump Online Help for more details on
Remote Desktop Manager Jump.
6.1.10 Events
DESCRIPTION
Remote Desktop Manager gives you the flexibility to automatically run operations before or after
establishing a connection.
These operations are defined via the Events section of a session's properties. Define a script
or a command line which executes at the appropriate time with the provided parameters, such
as the session ID or username. For example, events can be used to execute an external batch file or
application that prompts the user for more information, or to update a log on a remote server.
SETTINGS
The Events section is composed of four tabs. All of them can execute the same events. but at
specific times, such as before the connection is established or after its interruption.
OPTION DESCRIPTION
Script Select a script file to execute The VBScript (*.vbs) file is the only
supported format.
OPTION DESCRIPTION
The Miscellaneous section of the Before Connect tab allows to power on the remote device
before trying to establish the connection.
OPTION DESCRIPTION
Wait timeout Enter the delay before retrying the to wake the remote device.
Retry count Enter the number of time to try to wake the remote device.
OPTION DESCRIPTION
Typing macro Enter the typing macro to execute. For more information, please consult
the Typing Macro topic.
Delay time Enter the delay time for the {DELAY} instruction.
DESCRIPTION
The Typing Macro automatically executes once a connection has been established.
SETTINGS
TYPING MACRO
Keyboard keys are represented by predefined tags between braces. To specify a single
keyboard character, use the character itself without braces. For example, represent the letter A
by typing the "A" character in the typing macro. To represent more than one character, such as
Hello, append each additional character to the preceding one: "Hello".
SPECIAL KEYS
To specify characters that aren't displayed when you press a key, such as ENTER or TAB, as
well as the keys that represents actions rather than characters, refer to the codes in the following
table.
KEY CODE
BREAK {BREAK}
KEY CODE
END {END}
ENTER {ENTER}
ESC {ESC}
HELP {HELP}
HOME {HOME}
PAGE UP {PGUP}
TAB {TAB}
KEY CODE
UP ARROW {UP}
F1 {F1}
F2 {F2}
F3 {F3}
F4 {F4}
F5 {F5}
F6 {F6}
F7 {F7}
F8 {F8}
F9 {F9}
F10 {F10}
F11 {F11}
F12 {F12}
F13 {F13}
F14 {F14}
F15 {F15}
F16 {F16}
KEY CODE
To specify keys combined with any combination of the SHIFT, CTRL, and ALT keys, precede the
key code with one or more of the following signs.
KEY CODE
SHIFT +
CTRL ^
ALT %
To specify that any combination of SHIFT, CTRL, and ALT should be held down while several
other keys are pressed, enclose the code for those keys in parentheses. For example, to specify
to hold down SHIFT while E and C are pressed use "+(EC)". To specify to hold down SHIFT
while E is pressed, followed by C, without SHIFT, use "+EC".
SPECIAL COMMANDS
COMMANDS DESCRIPTION
{DELAY} This command introduces a delay of 300 ms (default value) before the
next command.
{WINDOW:???} This command focus a window containing the specified name after the
semi colon.
COMMANDS DESCRIPTION
{PREV-WINDOW} Select the previous window before executing the remaining commands.
MACRO PASSWORD
You can define a password to be use within the typing macro exclusively. Use the variable
$MACRO_PASSWORD$ to access the password.
6.1.11 Logs
DESCRIPTION
It also has a feature to warn you if you attempt to open a session, from the same data source, as
another user. The application uses the logs to detect an open connection. Note that applications
closed while being Offline will not register in the logs as closed, and must be manually closed
with a right click.
There are also options to prompt for a comment, optional or required, when a session is opened
or closed. Prompt for comment on open will also prompt for comments when a password is
viewed or copied.
Both prompt for comments are supported in embedded and external display
mode.
SETTINGS
SETTINGS
OPTION DESCRIPTION
Warn if already Monitors all users of the current data source to verify if the
opened session is already opened. This prevents "stealing" sessions
from other users.
Prompt for comment Prompt the user for a comment when launching the session and
on open when viewing or copying the password. These comments are
logged in the entry's logs.
Prompt for comment Prompt the user for a comment when closing the session. Close
on close comments are logged in the entry's logs.
Right click on the log entry to display the contextual menu to show the log details. You can export
the log or view more information about users.
The View Details window has three tabs: General, Details and Comments.
GENERAL TAB
The General tab displays session information to identify the entry and also displays the session
running time. Notes can be entered using the contextual menu in the log entry grid.
DETAILS TAB
The Details tab display information on the user and computer from which the session was
started and on the destination host. It also displays information if the session was forcibly closed
using the Close menu.
COMMENTS TAB
The Comments tab displays the On Open comment and On Close comment.
DESCRIPTION
The Management Tools tab allows you to configure different settings used by the
Macros/Scripts/Tools including credentials when the remote credentials are required. It contains
all of the authentication settings related to the session tools (e.g. Services, Wake-on-LAN, Shutdown Remote
Computer, etc.) available in the application. For example it is used to execute a remote WMI query or a
remote PowerShell script.
· ControlUp
· IntelAMT
· Remote Management
· Home Page
· Remote Tools
· Spiceworks
· Wake-on-LAN
SETTINGS
CREDENTIALS
OPTION DESCRIPTION
Use default Use the default credentials. Please note that the application does not
credentials set anything and assume that the current Windows user has all the
privileges required to execute the tool.
Use session Use the same credentials defined in the session directly or in the
credentials linked credential entry.
OPTION DESCRIPTION
My personal Use one set of credentials to replace or emulate the ones from your
credentials Windows session. See My Personal Credentials topic.
SETTINGS
OPTION DESCRIPTION
Open VPN before Specifies that the session defined VPN should be activated prior to
execution running the Macros/Scripts/Tools. The application will open it if it's
not already opened.
6.1.12.1 Wake-on-LAN
DESCRIPTION
Wake-on-LAN is supported in the Enterprise edition of Remote Desktop Manager. Plus, the
destination motherboard must support it, and it must be enabled. The computer must also be in
the local area network (LAN) and not connected in a VPN.
An important thing to note is that Wake-on-LAN operates below the IP level. This means that the
sending machine needs to be on the LAN, so we cannot send them over remote IP-based
connections, such as over SSH or VPN. WOL broadcasts packets to the target computer over
UDP. You can configure which port it uses, the default is 9. If you want to wake up a machine on
a different subnet, your router must forward UDP port 9, or whatever you change the port
assignment to. Most users do not have to configure their router or worry about this.
ENABLING WAKE-ON-LAN
The first step is to verify that your computer supports Wake-on-LAN. There’s a few things to look
out for:
You must add a valid MAC address (Media Access Control address) in the session's
configuration. The input field can be found in the Information tab and in the General child tab.
The field name is MAC.
You can use the Ellipsis button to automatically determine the MAC address. If this is
unsuccessful, you will need to enter it manually.
The discovery process will initially attempt to use the ARP protocol. This is fast and does not
require authentication, but there are requirements on the network aspect that may not be met. If
ARP was not successful, another attempt is made using WMI. This is slower and requires
authentication. RDM will use the credentials as configured in the entry's properties or the
credentials entered in the Management Tools tab.
USE WAKE-ON-LAN
If the settings are correctly configured, you can invoke the Wake-on-LAN from the session's
context menu, which can be found in the Macros/Scripts/Tools - Wake-on-LAN menu.
6.1.13 Advanced
DESCRIPTION
The Advanced tab contains settings such as the internal data source ID and session ID. These values can be
used to invoke Remote Desktop Manager from a command line or even a web protocol handler.
SETTINGS
MISCELLANEOUS
OPTION DESCRIPTION
Override domain Allow you to override the domain when the credential are sent to
the remote session. Select between:
Default: Use the domain from the domain field in the session.
OPTION DESCRIPTION
Use Host Name: Use the host name (computer name) as the
domain.
Custom Domain: Use the domain in the Domain field from the
Information section (in entry overview).
Allow open multiple When a connection is already open and you reopen it, create a
connections new instance instead of focusing on the other session.
Custom host port With this you can input a customizable port for the host.
Automatically close Check if you want your session to automatically close after a
session after given number of minutes.
OPTION DESCRIPTION
Data Source ID Internal RDM data source ID. Used as a Command Line
Arguments or when using RDM PowerShell module.
Command line Fully defined command line to start this session via a
command line. Hit the copy button to copy the entire command
line.
Create web URL Automatically create a web URL. Requires that the protocol
handler has been registered by our installer.
Creation source The creation source is used when deleting and moving entries
using the Synchronizer.
6.2 Sessions
DESCRIPTION
Remote Desktop Manager separates the connection types in four different categories:
· General
· Remote connections
· Virtualization
· File Browser
· Other
GENERAL
This category contains the more popular and frequently used sessions.
REMOTE CONNECTIONS
This category contains all of the remote connections types that are used to connect to remote
systems, including computers, switches, VPNs, printers, etc.
VIRTUALIZATION
This category contains all of the virtualization connections, including the local virtual machines
tools and server tools. Remote Desktop Manager supports tools from Microsoft, VMware,
Oracle and more.
FILE BROWSER
This category contains all the cloud file browser integrated in Remote Desktop Manager.
OTHER
This category contains many useful session types that are not directly supported, or those
that are neither a virtualization nor a remote connection. For example we find the Command
Line (External Application), the Inventory Report and the Play List session types in this group.
6.2.1 Open a Remote Connection
Depending on the method, Remote Desktop Manager can use a completely different application
or library. For example, the external mode for Remote Desktop uses the Microsoft Remote
Desktop's client (mstsc.exe), and the embedded mode uses the Remote Desktop ActiveX
control.
CONFIGURED CONNECTION
All entry types have a default action associated with them (e.g. Open, Navigate URL). These
actions are executed when you use any means described above. The default action is often
"Open", but you can modify it for certain entry types.
· External
· Embedded (tabbed)
· Undocked
Please note that not all sessions support the three modes. It depends on the integration and the
availability of the third party application.
Display mode
EXTERNAL MODE
With the External mode, the session is opened as an external process with no direct link to
Remote Desktop Manager.
This display mode usually launches the native application. For example the native application for
RDP is mstsc.exe. The external mode will automatically run on the Primary monitor. Depending
on the type of session, an external mode session view will be updated if Remote Desktop
Manager can detect that its running.
An embedded session runs within Remote Desktop Manager window and displays tabs at the
top of the Dashboard. This mode centralizes the opened session in the application which makes
it easy to switch from one to another.
There are several session-specific actions available by right clicking (Contextual Menu) on a tab
title.
UNDOCKED
While the embedded mode is useful in some cases, you may prefer to move the content in an
external window. If so, this can be easily done using the contextual menu. Remote Desktop
Manager will create a new window to contain the tabbed session allowing you to move it
anywhere else (i.e. on another screen).
To dock the content back to its original place, use the context menu by right clicking on the
window icon.
You may specify different connection options when opening an entry. Click the arrow below
Open Session on the Home tab or use the right-click context menu.
DESCRIPTION
This category contains all of the connection types that are used to connect to a remote system,
including computers, switches, VPNs, printers, etc.
We support a very wide range of connections, ranging from Apple Remote Desktop, Web
Browser (http/https), LogMeIn and much more. Explore to your heart's content!.
6.2.2.1 Apple Remote Desktop
DESCRIPTION
This entry is used to define and configure an Apple Remote Desktop session.
Apple Remote Desktop is our integration of the remote connection protocol created by Apple.
This session allows to remotely control or monitor macOS devices.
SETTINGS
GENERAL
OPTION DESCRIPTION
Ellipsis button Provides the list of computers discovered on your network. This can
take a few moments to generate.
OPTION DESCRIPTION
Port Enter the port to access the remote computer. Set the value to 0 to
use the default port.
SETTINGS
OPTION DESCRIPTION
Screen Select the screen where you want to display the remote connection.
Select between:
View only (input Connect in view only mode. This option disables the keyboard and
ignored) mouse while in session.
OPTION DESCRIPTION
Request shared The remote user will be prompted with a request to share his
session session.
Authentication Select the authentication mode for the connection. Select between:
type
· ARD
ADVANCED
OPTION DESCRIPTION
Mouse cursor Select the way the mouse cursor is handled. Select between:
OPTION DESCRIPTION
Emulate 3 buttons (with Emulate mouse button 3 when clicking on both button 1 and
2-button click) button 2.
Apply Windows key Select where the key combinations are sent. Select between:
combinations
· On the local computer
· Azerty
· Qwerty
Preferred encoding Change the encoding to use less bandwidth. From the least to
the most bandwidth used, select between:
· Default (color)
OPTION DESCRIPTION
Custom compression Available only with the Preferred encoding - Zlib encoding.
level
DESCRIPTION
SETTINGS
OPTION DESCRIPTION
Application Enter the Application API key. Consult the section How to obtain the
API key Application API key below to retrieve the Application Key.
Connect on BeyondInsight, go in the Password Safe section and then go in Application API
Registration.
BeyondInsight
6.2.2.3 FTP
DESCRIPTION
Remote Desktop Manager includes built-in FTP and SFTP entries. We also support Filezilla and
WinSCP.
To set the default application for FTP (Third Party), go to File – Options – FTP. The choices
are Windows Explorer, Filezilla or WinSCP.
6.2.2.4 Host
DESCRIPTION
This entry is used to define and configure a generic host session that could be used as the
parent for others. You can define a subset of templates to apply at the execution.
This entry is used to define and configure a Host session. It supports the following:
Since no session can be established with simply a Host entry, this is mostly useful to either apply
templates, or to serve as a parent for sub-connections. Please see Templates for more details.
SETTINGS
GENERAL
Host - General
OPTION DESCRIPTION
Use host from Use the template host (if using a template).
template
Elipsis button Provides the list of computers discovered on your network. This can
take a few moments to generate.
Always prompt Prompt you every time for the hostname or IP address.
for host
OPTION DESCRIPTION
ADVANCED
The template selected is the one executed when either pressing enter, double-clicking or by
using the Open Session command.
Host - Advanced
OPTION DESCRIPTION
Template Will display a dialog allowing you to choose which template to apply.
Select You can filter the list of templates by using this command. Using click
templates and ctrl-click to make your selection.
6.2.2.5 LogMeIn
DESCRIPTION
LogMeIn remote access products use a proprietary remote desktop protocol that is transmitted
via SSL. An SSL certificate is created for each remote desktop, and is used to cryptographically
secure communications between the remote desktop and the accessing computer. You can find
more information here.
This entry is used to define and configure a LogMein session. It supports the
following:
Users access remote desktops using an Internet-based web portal and, optionally, the LogMeIn
Ignition stand-alone application. The portal also provides status information for the remote
computers and, optionally, remote computer management functions.
AUTOMATIC LOGIN
You have two modes available to achieve the Auto Login in embedded view.
· LogMeIn portal with auto login (works with any LogMeIn account)
SETTINGS
GENERAL
LogMeIn - General
OPTION DESCRIPTION
Hide script errors Hide script errors that can be present in some websites.
LOGIN
LogMeIn - Login
OPTION DESCRIPTION
Portal Login - Use the various credential features provided by RDM to set your
Credentials credentials.
DESCRIPTION
Note: as stated on the LogMeIn web site (LogMeIn) Desktop Shortcut is a Pro Edition feature.
DESCRIPTION
This connection method can be used with all versions of LogMeIn. This method
requires the session to run Embedded and the use of Internet Explorer.
If you are using Internet Explorer 11, you need to change the IE emulation mode to
Internet Explorer 10.
Please consult the LogMeIn troubleshooting topic for more information on how to
proceed.
SETTINGS
2. Right-Click the URL shortcut of the computer and use the copy command.
4. In the Login tab populate both Portal Login and Host Login information
DESCRIPTION
This entry is used to define and configure a Microsoft Remote Desktop (RDP)
session.
SETTINGS
GENERAL
OPTION DESCRIPTION
Ellipsis button Provides the list of computers discovered on your network. This
can take a few moments to generate.
Port Click on the link to modify the port number. Set the port to 0 to use
the default port.
· Normal
· Azure
OPTION DESCRIPTION
Always ask Always ask password when connecting to the remote computer.
password
· The Credential Manager will hold only one entry per host,
therefore if you have multiple sessions towards the same host,
the last saved entry will overwrite whatever was stored.
· The one host limitation ignores the port, therefore multiple sessions towards
the same host, but with different ports, will conflict as well. Last saved entry
overrides whatever was stored.
DISPLAY
OPTION DESCRIPTION
Screen sizing mode Scale the client window display of the desktop
when resizing between:
· Scrollbar.
Remote Desktop Size Select the screen size for the remote computer.
Custom width Specify a custom width number for the screen size.
OPTION DESCRIPTION
Custom height Specify a custom height number for the screen size.
Display the connection bar when Display the connection bar at the top of your screen
in full screen mode in full screen size mode.
Connection bar pinned (full Fix the connection bar at the top of the screen.
screen)
LOCAL RESOURCES
OPTION DESCRIPTION
Remote computer Indicate what to do with the sound on the remote computer.
sound Select between:
· Do not play
Remote audio Indicate what to do with the audio recording on the remote
recording computer. Select between:
· Do not record
Local devices and Select the devices and resources that you wish to use on the
resources remote computer. Select between:
· Printers
· Serial Ports
· Hard drives
· Clipboard
OPTION DESCRIPTION
· Smart cards
All drives Select this option if you want all of your drives to be present on
the remote computer.
Specific drives Select one or more specific drive that you want to be present
on the remote computer.
PROGRAMS
OPTION DESCRIPTION
Start the following program Enable to specify a program to launch on the remote
on connection (alternate computer when the connection is established.
shell)
OPTION DESCRIPTION
Program path and filename Specify the program path and filename to start when the
connection is established.
Start in the following folder Specify the working folder used by the program in the
previous step.
EXPERIENCE
OPTION DESCRIPTION
Choose the connection speed to Specify the connection speed to use to optimize the
optimize performance remote session performance. Select between:
· Default
OPTION DESCRIPTION
· Desktop background
· Font smoothing
· Desktop composition
· Visual styles
· Redirect DirectX
Cache Select the type of cache that will be used for the
remote session:
OPTION DESCRIPTION
Keep alive Data will be sent to the remote computer to keep the
session alive. You can determinate the time
between that and when the data is send. This option
is only available in embedded mode.
CONNECTION
OPTION DESCRIPTION
Server authentication verifies If the actual verification does not meet minimum
that you are connecting to the policy requirements, select what needs to be done
intended remote computer by the remote computer between the following:
OPTION DESCRIPTION
· Do not connect
· Warn me
Use these RD Gateway server Indicate the specific settings to connect on the RD
settings Gateway server.
· Smart card
Gateway access token Provide the access token if the Logon method is
set to Use a gateway access token.
Open gateway only when unable Establish a connection with the RD Gateway server
to ping host only when it is not possible to ping the remote
computer.
OPTION DESCRIPTION
Bypass RD Gateway server for Bypass the RD Gateway server when connecting on
local addresses a remote computer who has a local IP address.
Do not use RD Gateway server Don't use any RD Gateway server to connect on the
remote computer.
OPTION DESCRIPTION
Use custom Use a specific username, domain and store the password on
credentials the local computer or store the password in the database.
Store password on the This will use the Windows Credential Manager. It is not the best
local computer option because it has the following limitations:
· The Credential Manager will hold only one entry per host,
therefore if you have multiple sessions towards the same
host, the last saved entry will overwrite whatever was stored.
OPTION DESCRIPTION
Use Private Vault Use the Search string to search for credential entries in the
search Private Vault.
ADVANCED
OPTION DESCRIPTION
Enable CredSSP support RDP will use the Credential Security Support Provider
(CredSSP) for the authentication on the remote
computer. Select between:
· Default
· Automatic
· RDM Agent
· Macro
Automatically logoff when Automatically log off your RDP session when
disconnecting disconnecting.
OPTION DESCRIPTION
· Default
· Full
· Smart reconnect
· Legacy
Minimal input send interval Set the minimum time in milliseconds between the
input is send to the remote computer.
Background input The remote computer can accept input even when the
focus is not on the session.
Enable super pan Enabling super pan will take the entirety of your screen
for the RDM session.
Prompt for credentials on Always prompt for credentials when launching client.
client
Use redirection server Redirect a remote computer to the RDP session host.
OPTION DESCRIPTION
Load balance info Indicate the load balance info when the load balancing
feature is enable on the RD Connection Broker.
NOTE 1
As per knowledge base article 947723, since rdp 6.1 (Windows 2008), using the admin mode is
not necessary except when the server itself is a RD Session Host.
6.2.2.6.1 Azure RDP
OVERVIEW
Azure RDP is a Windows Remote Desktop session directly into an Azure role instance without
having to use the Azure Management Console (https://azure.microsoft.com/en-us/).
SETTINGS
2. Open the Azure Portal (https://portal.azure.com) and select the deployment you would like to
connect to. You'll need the DNS name (Computer), Role Name & Role IDs.
Azure Portal
RDP Azure
6.2.2.6.2 Hyper-V RDP
DESCRIPTION
You can connect to a Hyper-V instance using RDP through the Hyper-V server. There is no
need to enable RDP on the Hyper-V instance, because Remote Desktop Manager features two
levels of authentication.
The credentials provided are for the Hyper-V server (not the instance).
SETTINGS
Create a new RDP session on the Hyper-V server. Input your login credentials prior to selecting
the Hyper-V instance.
The Hyper-V session support the Hyper-V v2 with a Windows Server 2012 R2
destination.
Enhanced session mode allows redirection of local devices and resources from computers
running Virtual Machine Connection.
You don’t need a network connection to the Virtual Machine session like you would with RDP.
TROUBLESHOOTING
DESCRIPTION
SETTINGS
GENERAL
OPTION DESCRIPTION
· Computer name
· Connection uri
· VM name
· VM Id
Ellipsis button Provides the list of computers discovered on your network. This can
take a few moments to generate.
OPTION DESCRIPTION
Port Enter the port to access the remote computer. Set the port to 0 to
use the default port.
RUN AS
OPTION DESCRIPTION
Current session Use the credential provided under the General tab.
Credential Select an existing credential entry with the combo box or the ellipsis
repository button.
ADVANCED
OPTION DESCRIPTION
· Version 2
6.2.2.8 ScreenConnect
DESCRIPTION
ScreenConnect offers lightning-fast remote support and remote access to connect and solve
problems faster.
To use version 2.3 of the ScreenConnect extension, you must have Remote
Desktop Manager version 13.5.5.0 or above.
SETTINGS
GENERAL
Screenconnect - General
OPTION DESCRIPTION
OPTION DESCRIPTION
Session name Select or enter the machine name or session name to connect.
Always prompt for With this option the system will ask you which session you wish to
session name start each time you open the session.
Use session name Use the session name as a filter to reduce choices.
as filter
· Guest
· Host
Auto create If the sessions doesn't exist it will be created with these settings.
· User Sessions
· Meetings
· Published
· Secure Code
· On invitation only
Secure code Specify the secure code to use. Only available when the Session
Code session type is selected.
INVITATION EMAILS
OPTION DESCRIPTION
Invitation An invitation email will be sent at the session opening for each email in
Emails the list. One email per line needs to be enter.
ADVANCED
Screenconnect - Advanced
OPTION DESCRIPTION
Version Select the version of ScreenConnect that you want to use in the
application.
· Default: Use the default version of ScreenConnect that you have set
in File - Options- Types - ScreenConnect.
User display With this setting you can decide whether you want to display your
name windows username or data source username.
DESCRIPTION
This entry is used to define and configure a Spiceworks session. At this time, it is
simply a wrapper to open the dashboard, submit your credentials, and optionally
focus to a group or a device.
SETTINGS
OPTION DESCRIPTION
Spiceworks host Enter the URL of the Spiceworks server. Ensure that the protocol and
port are specified. i.e. http://spiceworks:9675
OPTION DESCRIPTION
· Dashboard
· Group
· Help Desk
USAGE
Specify the server URL and enter valid credentials. By default, the dashboard view will be shown
after the credentials have been submitted and accepted.
You can elect to show directly a specific group by choosing the group option, then using the
ellipsis to select the specific group to display.
You must have the required permissions to view groups to use the group link
feature.
You can alternatively elect to display a specific device by choosing the device option, then using
the ellipsis to select the specific device to display.
You must have the required permissions to view the devices to use the device
link feature.
6.2.2.10 Telnet
DESCRIPTION
SETTINGS
GENERAL
Telnet - General
OPTION DESCRIPTION
OPTION DESCRIPTION
POST LOGIN
OPTION DESCRIPTION
PROXY
Telnet - Proxy
OPTION DESCRIPTION
· None
· Socks4
· Socks5
· HTTP
· Telnet
· Local
Credential Use the Credential repository of RDM for your proxy connection.
repository
Excluded hosts The Excluded hosts box may contain more than one exclusion
range, separated by commas. Enter hosts that would automatically
be excluded.
Consider proxying Connections to the local host are never proxied, even if the proxy
local host exclude list does not explicitly contain them. It is very unlikely that
connections this behaviour would ever cause problems, but if it does you can
change it by enabling this option Consider proxying local host
connections.
DNS name lookup If you are using a proxy to access a private network, it can make a
at proxy end difference whether DNS name resolution is performed by WinSCP
OPTION DESCRIPTION
· No: WinSCP will always do its own DNS, and will always pass
an IP address to the proxy.
· Yes: WinSCP will always pass host names straight to the proxy
without trying to look them up first.
Telnet/local proxy If you are using the Telnet proxy type, the usual command required
command by the firewall’s Telnet server is connect, followed by a host name
and a port number. If your proxy needs a different command, you
can enter an alternative here.
ADVANCED
Telnet - Advanced
OPTION DESCRIPTION
Internet protocol This option allows the user to select between the old and new
Internet protocols and addressing schemes, choose between:
· Default (WinSCP)
· IPv4
· IPv6
Initial keypad mode This option sets the initial status of the keypad
· Default
· Application
· Normal
6.2.2.11 VNC
DESCRIPTION
Only Ultra VNC and our Default VNC is supported in Embedded mode. All other
VNC applications supported by Remote Desktop Manager are available only in
External mode.
SETTINGS
Embedded UltraVNC is the recommended mode for maximum compatibility. It also supports
chats and files transfer while connected.
GENERAL
VNC - General
OPTION DESCRIPTION
VNC Select your VNC application. The drop-down menu will have different
application option depending if you wish to run your session in Embedded or
External mode.
Embedded mode:
· Default
· VNC
External mode:
· RealVNC
· TightVNC
· UltraVNC
Custom By selecting Custom configuration you will have to enter all required
configuration information regarding the remote computer in the Settings and
Advanced tabs. The screen size, color depth and the encryption level
OPTION DESCRIPTION
Host The host supports a distinct syntax to specify the port and display
number. They must be set as the server requires. This syntax has been
proven to work: {HOSTNAME}::{PORT}:{DISPLAY}.
i.e. $HOST$::5902:2
Port Enter the port number if not using the default port.
Arguments Fully define a command line argument to start the session with.
SETTINGS
VNC - Settings
OPTION DESCRIPTION
Windows NTLM Enter your NTLM credentials (username, password and domain) to
authentication be authenticated.
OPTION DESCRIPTION
Color depth Select the display color depth for the remote computer between:
· True color
· 256 colors
· 64 colors
· 8 colors
· 8 bit color
Scaled The remote display is automatically scaled to fit the size of the
window.
Request shared Allows several clients to share the same VNC session. If this option
session isn't set, only one client can be connected to the same Server. If a
new "non-shared" client is connected, existing clients are
disconnected, or new connection is dropped, depending on the
server's configuration.
OPTION DESCRIPTION
View only (input Disable the session's input. No keyboard or mouse events are sent
ignored) from the viewer to the server.
Disable clipboard Disable the clipboard synchronization (used for the copy-paste).
transfer
ADVANCED
VNC - Advanced
OPTION DESCRIPTION
Emulate 3 buttons Emulate mouse button 3 when clicking on both button 1 and
(with 2-button click) button 2.
Preferred encoding Change the encoding to use less bandwidth. From the least to
the most bandwidth, select between:
· Default
· Auto
· CoRRE
· Hextile
· Raw
· RRE
· Tight
· Ultra
· Zlib
· ZlibHEX
OPTION DESCRIPTION
· ZRLE
Custom compression Option available only when choosing the Preferred encoding
level Zlib.
DSM filename If you choose to use a DSM plug-in for your connection, you can
choose between:
· MSRC4 plugin
· SecureVNCPlugin
· SecureVNCPluginARC4
Proxy If using a proxy server enter the host and port to connect.
Wayk Now allows to take control of a remote computer to offer assistance. For more
information about this product, please consult the Wayk Now Online Help.
A brief demonstration of how to use Devolutions remote access protocol, Wayk Now.
To use Wayk Now from Remote Desktop Manager, Wayk Now must be installed
on the remote computer.
SETTINGS
GENERAL
OPTION DESCRIPTION
· Cloud
· Local
OPTION DESCRIPTION
Username Enter the username of the remote computer. Only when using the
secure remote delegation authentication mode.
Password history Click on the icon to display the password history for this session.
Friendly name Enter a custom name for the remote user to recognize you in the
chat window.
ADVANCED
OPTION DESCRIPTION
· Low
· Medium
· High
For more information about available settings during an active session, please see the Wayk
Now online help.
6.2.3 Virtualization
DESCRIPTION
This category contains all of the virtualization session types that are used to connect to a virtual
remote system.
Virtualization Entries
DESCRIPTION
The Amazon Web Services (AWS) Dashboard allows you to perform operations
against the different AWS services.
PREREQUISITES
Existing AWS account for the services supported by the console and currently valid access keys.
WORKFLOW
GENERAL
OPTION DESCRIPTION
Access key ID This is the User used to authenticate the access to AWS.
OPTION DESCRIPTION
Secret access key This is the Password used to authenticate the access to AWS.
CREDENTIALS
This tab supports a variety of RDM's credential feature to best suit your needs.
6.2.3.2 Microsoft Hyper-V Dashboard
DESCRIPTION
SETTINGS
The Microsoft Hyper-V Dashboard is illustrated below, and provides a platform to configure your
Hyper-V session.
Hyper-V Console
GENERAL
The following connection type uses vmconnect.exe. Please refer to Hyper-V RDP for further
details.
We recommend using a Hyper-V RDP for a built-in and embedded view support.
ADVANCED
The Resources monitoring tab is only available in the console mode. The costly columns will
appear only when the corresponding option is selected.
OPTION DESCRIPTION
DESCRIPTION
This entry is used to define and configure a VMware Dashboard session. The
VMWare Console allows for basic administrative tasks of a VMWare host.
Some operations are not allowed on the Free edition of VMware Esxi.
SETTINGS
Simply enter the host name or IP, the username and the password of a user with administrative
rights on the host.
SETTING DESCRIPTION
SETTING DESCRIPTION
Always ask Select to force entry of the password upon every use. Disables the
password Password entry control.
ACTIONS
ACTION DESCRIPTION
Shut down Shuts down the virtual machine. Only available when the VMware guest
guest tools are running.
Restart Restarts the virtual machine. Only available when the VMware guest tools
guest are running.
ACTION DESCRIPTION
Connect Connect with the technology specified in the Console Connection mode
setting of the console
DESCRIPTION
This category contains all of the File Browser session types that are used to connect to cloud
remote system.
SETTINGS
To configure an OneDrive for Business session, please consult the OneDrive for
Business topic.
SETTINGS
GENERAL
OPTION DESCRIPTION
Microsoft Account Enter the email of the Microsoft Account used to access OneDrive.
Always ask Always prompt for the password when the session is launched.
password
OPTION DESCRIPTION
· Business
Account Status This label will tell you whether or not the entry is validated and
ready for use.
Validate OneDrive You can use this toggle on and off the validation of the entry.
Auto accept API Automatically accept the API permission. If not enabled you will
permissions have to accept the API permission manually when asked to.
Show files in tree Display the storage files in the session tree view (display using
view hierarchy).
ADVANCED
OPTION DESCRIPTION
Show local files Show local files in the left pane of the session.
OPTION DESCRIPTION
Local path Enter the default local file path to open in the local file pane.
DESCRIPTION
In the properties of a OneDrive Explorer session, select Business as the OneDrive type.
GENERAL
OPTION DESCRIPTION
Secret key To obtain your Secret ID follow Microsoft OneDrive for Business
instructions.
To authenticate with OneDrive in Remote Desktop Manager, the application must be registered
with the Microsoft Azure Management Portal.
1. In the Azure Active Directory section, select App registrations, then click on New
application registration.
2. Name the application, specify that it is a Web application, and also enter
https://login.live.com/oauth20_desktop.srf as the Sign-on URL (Reply URL) as
below.
The only important URL is the Sign-on URL. Other URLs will not be used by
Remote Desktop Manager.
3. Two alphanumeric keys must be retrieved from the Azure Portal to authenticate Remote
Desktop Manager.
3.1. The Application ID. Find it in the properties of the registered application.
3.2. The Secret key. Find it in the Keys blade of the registered application settings. Note
that this key is visible only at the time it is generated. Leaving the blade will hide the key
indefinitely.
You will need to specify permissions for Office 365 SharePoint Online that Remote Desktop
Manager requires. In your permissions to other applications select the Delegated
Permission drop down list of your Office 365 SharePoint Online and add the Read and write
user files and Read user files.
6.2.4.2 WinSCP
WinSCP is an open source free SSH client for Windows with the focus on secure file transfer.
Change the default shell with the Other parameters settings in the general tab.
6.2.5 Others
DESCRIPTION
This category contains other kind of session types that can be used.
DESCRIPTION
This entry is used to define and configure a Data Report session. A Data Report is
composed of a database connection string and a database query to be executed.
The result is displayed in a read only grid with export capabilities. It is useful to
quickly integrate data into the application.
WORKFLOW
You must configure your connection string and your SQL query. You will also need to know how
to write an SQL statement as this is database dependent.
SETTINGS
GENERAL
OPTION DESCRIPTION
OPTION DESCRIPTION
· Inherited: Navigate down the inheritance graph of the object to find the
connection string.
· Prompt: At open connection time, the system will prompt the user to
select the desired Connection String from credential entry list.
Data source Contains the data source type like ODBC, OLEDB or native. This value is
read only and is automatically extracted from the connection string.
Data Specify the provider used for the database access. This value is read only
provider and is automatically extracted from the connection string.
Connection This value contains the database connection string and can be
string hidden/encrypted for a better security.
Host Contains the connection server name. This value is read only and is
automatically extracted from the connection string.
Username Contains the username used to access the database. This value is read
only and is automatically extracted from the connection string. If using
Windows Authentication the field will be empty.
Password Contains the username used to access the database. This value is read
only and is automatically extracted from the connection string. If using
Windows Authentication the field will be empty.
When the source is set to Prompt you will see a dialog box prior to opening the
connection.
Only the Connection String credential entries from your data source are listed.
Select the entry to use and the report will be executed.
PARAMETERS
Using parameters is quite simple. Write your query with parameter place holders (@Param1
or ? depending of the data provider you use). On the Parameters tab define the parameter type
and default value. When opening the session, you will be prompted for the parameter values.
.NET Framework Data Provider for SQL Server: Uses named parameters in
the format @parametername
.NET Framework Data Provider for OLE DB: Uses positional parameter
markers indicated by a question mark (?).
.NET Framework Data Provider for Oracle: Uses named parameters in the
format: parmname
OPTION DESCRIPTION
· Unused
· Text
· Secured
· Integer
· Numeric
· Date
· DateTime
· GUID
Exec Query Once your have set the default value of your parameter you can
execute your query fields.
Show parameters in Show the parameter name in the report header. You can change
report header the parameter name by clicking on Parameter.
QUERY
Enter the query in the Query tab, which features an SQL syntax-highlighted text box with line
numbers which must be compatible with the data provider.
This supports multiple queries in the statement and will display the results in
different tab pages. Most native drivers support it. For ODBC, you must locate an
advanced setting named MultipleActiveResultSets or MARS_Connection and
turn it on. If you do not see such a property, then it is not supported by your driver.
TROUBLESHOOTING
While setting up the connection use the Test Connection button of the Connection Properties Window
to ensure the connection is configured properly.
Use the Exec Query button on the Parameters tab to preview the query result.
More information is available in the Tips and Tricks Data Report topic.
DESCRIPTION
SETTINGS
GENERAL
OPTION DESCRIPTION
· Default
· Command
· Encoded command
OPTION DESCRIPTION
· Version 2
Load RDM CmdLet Load RDM CmdLet Snap-in in the PowerShell session.
OPTION DESCRIPTION
RUN AS
OPTION DESCRIPTION
DESCRIPTION
This entry is used to define and configure a SNMP Report session. SNMP Reports
will provide you information from devices on your network such as routers, switches,
servers, workstations, printers and more.
Remote Desktop Manager uses a specific tool (NET-SNMP) for the SNMP
Report. You will be prompted to download the tool if it wasn't already installed on
your computer.
You can use the following SNMP versions to run your SNMP reports entries
· SNMP Version 1
· SNMP Version 2c
· SNMP Version 3
SETTINGS
GENERAL
OPTION DESCRIPTION
· SNMP Version 1
· SNMP Version 2c
· SNMP Version 3
OPTION DESCRIPTION
OIDs Object identifier for an object in the MIB. This help you reduce the
items in the report.
Prompt for Options to change the command or to specify an OIDs before the
options report execution.
OIDS EXAMPLES
· sysDescr.0
· sysObjectID.0
· sysUpTimeInstance
· sysContact.0
· sysName.0
V3 SPECIFIC
If your network uses the SNMP V3, you will also need to enter information in the
V3 Specific tab.
OPTION DESCRIPTION
· MD5
· SHA
Security engine Enter your security engine ID which is part of the target host
ID configuration
OPTION DESCRIPTION
Security name Enter your security name which is part of the target host configuration
· Boots
· Time
FUNCTIONS
EXECUTION LOGS
When a SNMP Report is open, at any time you can look at the bottom in the execution log
window to see if the report has encountered a problem.
SAVE
You can save the report or the execution log in a Text document to keep your information or to
print it.
Save button
REFRESH
The refresh button can be used to refresh your report or to generate a different report from the
current one. You can change the Command and/or specify some OIDs.
Refresh window
DESCRIPTION
This entry is used to define and configure a SQL Server Management Studio
session.
· Support Logging
If you are sending a command line from a computer that is not on the domain to
a computer that is on the domain, check Net Only when using Run As
different user.]
SETTINGS
OPTION DESCRIPTION
Host Enter the full Host name. If a default instance has been used, you
could just enter the server name.
Database Enter the SQL database you wish to connect upon login (optional).
OPTION DESCRIPTION
Run as different If using Integrated security you have the option of running your
user (Active session as a different user.
Directory only)
Net Only (Active If you are sending a command line from a computer that is not on the
Directory only) domain to a computer that is on the domain, enable the Net Only
setting for credentials of the Running As.
Default query file Specify the file to be opened in the editor. Please see Add-On
documentation for more information.
Show splash Enable SQL Server Management Studio to display its splash screen.
screen
If choosing Run as different user you will have to specify which credentials to use when starting
with Run As.
Run as options
OPTION DESCRIPTION
Current session Use the same credentials as the ones defined in the session
6.3 Information
Information entries are used to store information that is meant to be shared with other users of
the data source, such as websites, alarm codes, serial numbers, etc.
WEBSITES
The Website entry is for online accounts. It can store a website url address and a set of
credentials. The website can be opened in Remote Desktop Manager or externally.
The entry can be linked with our Devolutions Web Login browser extension. When opening a
website externally our browser extension Devolutions Web Login fills the username and
password for you.
Example of Devolutions Web Login injecting a password for an online log-in form
6.4 Contact
DESCRIPTION
Contact entry types are used to manage your contacts in Remote Desktop Manager.
SETTINGS
Contact Entry
GENERAL
Use this subsection to enter basic information about the contact, such as their name, gender and
job title.
ADDRESS
Use the middle-left subsection to enter information about the contact's company and address.
Use the View Map button to open Google Maps with your default web browser.
COMMUNICATION
Use the middle-right subsection to enter the contact's communication information, such as their
email address or phone number.
Click on the Email Contact button to send an email to the specified email address with your
default email application.
Click on the Call (Skype) button to call the specified number with Skype. A Skype username
can also be specified in the Skype field.
Click on the Open Website button to navigate to the specified website with your default web
browser.
6.5 Credentials
DESCRIPTION
Credential entries store account information, such as usernames, passwords, domains, etc.
Credentials entries are grouped in a Credential repository, a collection of all the credentials
stored in the data source.
· Set multiple sessions to use a specific credential entry in the data source. Choose Credential
repository from the Credentials list in the entry properties. One benefit is you only need to
change information in one entry, when required. See Credential repository below.
· Use Dynamic Credential Linking and Credential Redirection with third-party password
managers.
· Configure User Specific Settings or a Private Vault Search in entry properties to link
credentials stored in a Private Vault with entries in shared Vaults.
To create a credential entry, use the New Entry button and select the Credentials section.
Credential entries
By default, credentials are stored in the same list as other entries are. This behavior can be
changed so credentials are stored in a separated list.
To separate credentials from other entries, navigate to File – Options – User Interface – Tree
View. Under UI Options, disable the Merge credential list with sessions option. You must
also disable this option in the Data Source Settings (System Settings) – Applications –
Type Settings.
The Credential repository is the collection of all the credentials stored in the data source. The
Credential repository allows you to use the same credential entry for multiple session.
The Credential repository is available almost anywhere in RDM, including Folders, Sessions,
Synchronizers, VPN and Website entry types.
When configuring a session select Credential repository from the Credential drop down list,
then select the desired credential entry from the credentials list.
To configure the Credential repository to prompt you to select a set of credentials, which allows
for using multiple credentials for the same host, select Prompt on connection from the
credential list.
We support a multitude of credential entry types, both integrated and external! Explore to your
heart's content.
6.5.1 Credential Redirection
DESCRIPTION
Some tools do not provide an Application Programming Interface (API) or support command line
parameters to interact with them. 1Password, Firefox Password Manager, Google Password
Manager and LastPass are such tools.
In order to leave the credentials in the external tool, and be able to use these credentials with
Remote Desktop Manager, we have implemented a mechanism to request the credentials from
the tool, then redirect them to a chosen resource.
This is achieved by running a local-access only applicative web server, then displaying a page
that will allow you to store the credentials in your Credential repository. Remote Desktop
Manager redirects the credentials from your chosen repository to the remote resource.
PRE-REQUISITES
· The tool must be installed on your computer or used with a web browser as an extension.
· The browser extension for your Credential repository must be installed and enabled. Follow
your repository documentation for details (see below for the URLs that are currently valid.
PROCEDURE
3. Open the session and use your provider to fill in the credentials.
We will use LastPass in our example, but the steps are the same for 1Password.
Your chosen tool may require to be unlocked once or multiple times depending on
your configuration. These steps are not covered by this guide as it may change
for each installation.
4. Enter a Name ID (case sensitive). This must be unique within your LastPass repository. It will
be used to identify the credentials and will be exposed as a subdirectory of the URL used to
intercept the credentials.
LastPass credential
6. Press the Enter Credentials button. This will launch the following sequence of events.
RDM - LastPass
10. Depending on the configuration of your provider, you have to press a keyboard combination,
or press on a button for the tool to save the credentials. Please refer to the documentation of
your tool for more information.
12. Using your password provider, confirm that the credentials are saved.
1. Create a new entry, we will use an RDP session for the example.
3. For Credentials select Credential repository and then your newly created credential entry
Credential repository
Select your session then launch it. This will initiate the following sequence of events:
2. The chosen browser is launched with the URL associated to the session
3. Depending on your configuration, the credentials are entered automatically, or you have to
press a key combination to initiate your tool. Please refer to the documentation of your tool for
more information.
4. In the web browser, press submit. The page will be closed after a delay
SEE ALSO
Lastpass downloads:https://lastpass.com/misc_download2.php
DESCRIPTION
Dynamic credential linking creates a single credential entry for a supported credential manager
and use this credential with any entry type that supports the Credential repository.
Here is the list of all implemented credential managers that support dynamic credential linking:
· 1Password
· Bitwarden
· Dashlane
· KeePass
· Keeper
· LastPass
· PassPortal
· Password List
· Password Safe
· PasswordState
· RoboForm
· Secret Server
· Sticky Password
· TeamPass
· True Key
· Zoho Vault
A dynamic credential link can also be applied to a Folder or a VPN entry type if
desired.
SETTINGS
1Password Settings
2. When creating a entry, select Credential repository from the Credentials drop down list,
then select the credential entry created in the previous step. Notice that a new action appears
just below the credential selection drop down list.
4. The link changes to the name of the credential. To remove linked credential and bring back
automatic list prompt, simply click on the "X".
6.5.3 Types
6.5.3.1 AuthAnvil Passw ord Server
DESCRIPTION
SETTINGS
GENERAL
OPTION DESCRIPTION
Example: https://<ServerHostname>/AAPS/AAPS.svc
OPTION DESCRIPTION
Use "My Account Use the information configured in My Account Settings to connect.
Settings"
Credentials list Indicate the credential list that you want to display. Select between:
mode
· All credentials
ADVANCED
OPTION DESCRIPTION
Always prompt Always prompt with the list of credentials when connecting.
with list
Validate Validate the connection to the server to confirm that the credentials are
working.
CERTIFICATE
The certificate for the AuthAnvil entry can be downloaded from the AuthAnvil server web
interface. Navigate to Admin – External Settings – Third Party Certificates, and download
the SSO certificate.
DESCRIPTION
This entry is used to define and configure a Connection String credential entry.
Connection string credential entries are exactly the same as a Database Folder
with the exception that they are not limited by the inheritance hierarchy of folders
and sessions.
SETTINGS
Connection String
GENERAL
OPTION DESCRIPTION
Data source Contains data source types like ODBC, OLEDB or native. This
value is read only and is extracted from the connection string.
Data provider Specify the provider used for the database access. This value is
read only and is extracted from the connection string.
Connection string This value contains the database connection string and it can be
hidden/encrypted for higher security.
Ellipsis button Displays the standard Windows Connection string builder dialog.
OPTION DESCRIPTION
6.5.3.3 Custom
SETTINGS
GENERAL
OPTION DESCRIPTION
<href=UrlOfYourSite>Text</href>
PARAMETERS
You can use parameters in your PowerShell script, just type $PARAMETER1$ for the first
parameter, $PARAMETER2$ for the second parameter, etc...
6.5.3.4 CyberArk
DESCRIPTION
This entry is used to define and configure a CyberArk credential entry. Retrieve
credentials directly from a CyberArk Vault using their REST APIs.
As per this initial implementation, you must create a credential entry FOR
EACH credential that you want to access from Remote Desktop Manager. A
feature to list accounts is being implemented at this time. You can alternatively
use the PACLI to generate a CSV file that can be paired with a CSV
Synchronizer to have entries generated automatically at a regular frequency.
SETTINGS
To retrieve the information easily, match the numbers from the credential entry picture below in
Remote Desktop Manager with the same numbers from the CyberArk portal.
GENERAL
OPTION DESCRIPTION
Web services URL Enter the Privileged Account Security (PAS) URL. (It
typically is ends by PasswordVault although just the root is
need in this field.) e.g. if accessing the PAS using
https://server.domain.com/PasswordVault, you would
simply specify https://server.domain.com in this field.
Virtual Directory Used to specify when the PAS solution is not deployed at
the root of a web site. It would be the case when there is an
extra folder between the root of the address (.com) and the
PasswordVault string
OPTION DESCRIPTION
Safe name Enter the name of the safe where the entries are stored.
Folder Enter the folder name where the entries have been stored.
Provided by your CyberArk administrator. The default value
is "root"
Keywords Enter the keywords that will help locate the entry.Their API
will perform a partial match in their Name field. Note that if
the keywords match with multiple results, an error will be
displayed.
ADVANCED
OPTION DESCRIPTION
Domain search method Specify how you wish to search for the Domain.
Domain field Specify the field (and possibly content) of the Domain field.
DESCRIPTION
This entry is used to define and configure a CyberArk AAM credential entry. Retrieve
credentials from CyberArk AAM server and improve credentials security.
As per this initial implementation, you must create a credential entry FOR
EACH credential that you want to access from Remote Desktop Manager. A
second phase is planned where the REST API will be used rather then AAM.
SETTINGS
All the needed information's to create a CyberArk credential entry in Remote Desktop Manager
is provided below. To retrieve the information easily, match the numbers from the credential
entry picture below in Remote Desktop Manager with the same numbers from the CyberArk
portal.
OPTION DESCRIPTION
Use "My Account Use the username stored in File – My Account Settings
Settings" – CyberArk AAM.
Application server URL Enter the URL to the CyberArk AAM web server.
Example:
https://<host.domain>/AAMWebService/v1.1/AAM.asmx
Application ID Enter the name of the name of the application ID for the
CyberArk Central Credential Provider web services. This
information will be provided by your CyberArk
administrator.
Safe name Enter the name of the safe where the entries are created.
Folder Enter the folder name where the entries have been
created. Provided by your CyberArk administrator. The
default value is "root"
6.5.3.6 KeePass
DESCRIPTION
This entry is used to define and configure a KeePass credential entry. Use a
KeePass plugin to send the credential to Remote Desktop Manager. The KeePass
application must be running and the database must be opened.
This type has recently been improved to support linking to multiple KeePass
databases simultaneously. Simply add all the paths separated by semi-colons
in the Database control.
SETTINGS
GENERAL
OPTION DESCRIPTION
Set database path manually This option needs to be checked if you wish to
manually indicate the location of your database. If you
wish to use multiple databases at once, simply list
their respective paths separated by semi-colons.
ADVANCED
OPTION DESCRIPTION
OPTION DESCRIPTION
Always prompt with Always prompt with the list of credentials when connecting.
list
See Dynamic Credential topic for more information on Dynamic Credential Linking.
6.5.3.7 LastPass
DESCRIPTION
LastPass offers different features per subscription plans. Remote Desktop Manager supports
certain features of each plan:
Standard 2-Factor Authentication (Google Authenticator) and Secure Notes. The ones
: that contain both a Username and Password are displayed in Remote
Desktop Manager (Server, Email account, Database, Instant Messenger).
Premium: 2-Factor Authentication (YubiKey), please see LastPass, Yubikey and mobile
access section below.
SETTINGS
GENERAL
OPTION DESCRIPTION
· Credential Redirection
· Integrated
OPTION DESCRIPTION
Always prompt with Always prompt with the list of credentials accessible from
list LastPass.
ADVANCED
DESCRIPTION
This entry is used to define and configure a Mateso Password Safe credential
entry. The integration with Mateso Password Safe requires a Mateso Enterprise
Plus subscription.
Make sure web services is installed on the Mateso Password Safe server.
You also need a certificate from a trusted Certification Authority installed in the
Trusted Root Certification Authorities.
SETTINGS
OPTION DESCRIPTION
OPTION DESCRIPTION
Example: mateso.yourcorporatedomain.com
Database Select the database which the passwords are retrieved from.
Password (2) Use the ellipsis button to select a password from the Mateso
database.
Always prompt with Always prompt with a list of available credentials in the Mateso
list database when using the entry. Useful to create a Credential
repository to link with other entries in Remote Desktop Manager.
DESCRIPTION
This entry is used to define and configure a One Time Password credential entry.
The One Time Password credential type is used as a second authentication factor that allows
a user to secure its account with a generated verification code changing over time.
OPTION DESCRIPTION
Key Enter the secret key given by the website or the application.
Time step Enter the amount of time for which the generated verification code
is valid.
Code size Select the amount of digits the generated verification code
contains. Select between:
· 6 Digits
· 8 Digits
Hash algorithm Select the secure hash algorithm used to generate the verification
code. Select between:
· SHA-1
· SHA-256
· SHA-512
To use the multifactor authentication, this feature must be enabled from the user's account of a
service or website that supports multifator authentication. Usually, you can find the multifactor
authentication settings in the security preferences of a user's account. The name of the feature
should be similar to two-factor authentication, two-step verification, or multifactor
authentication.
The website or application could ask if you want to receive verification codes by text messages
or generate them by an application. Choose to generate the codes by an application. This will
generate a secret key to enter in Remote Desktop Manager.
Copy the key to the clipboard and paste its content in the Key field of the One Time Password
entry. If there are spaces in the key, remove them.
Accept the changes in the website or application, and in Remote Desktop Manager.
When connecting to the account, click on the View Password button to display the generated
verification code. Enter the verification code when prompted by the website or application.
SETTINGS
GENERAL
OPTION DESCRIPTION
Folder Choose the folder where then entry will be stored in Remote
Desktop Manager.
Global Availability Accessibility option used when the credentials are from a private
vault. By default they are unavailable and won't show in the prompt
list.
OPTION DESCRIPTION
Always prompt with Check the option to always prompt with the list of credentials when
list connecting.
DESCRIPTION
This entry is used to define and configure a Password List credential entry.
The Password List credential type allows for storing multiple credentials in one entry. These
credentials can then be used in sessions. Each entry within the password list entry contains a
usename, a domain, a password, and a description. An expiration date can also be set on each
credential entry in the password list.
A great advantage of the password list is that it contains multiple credentials in a single entry.
SETTINGS
ACTION DESCRIPTION
ADD CREDENTIALS
OPTION DESCRIPTION
OPTION DESCRIPTION
Custom Tab Here you can add custom information to your Password lists.
Roles Tab You can Assign roles or Users directly to your credentials.
SETTINGS
GENERAL
OPTION DESCRIPTION
Folder Choose the folder name where the entry will be stored in Remote
Desktop Manager.
Global Availability Accessibility option used when the credentials are from a private
vault. By default they are unavailable and won't show in the prompt
list.
OPTION DESCRIPTION
Always prompt with Check the option to always prompt with the list of credentials when
list connecting.
DESCRIPTION
This entry is used to define and configure a Pleasant Password Server credential
entry.
SETTINGS
OPTION DESCRIPTION
Use "My Account Use the username and password configured in My Account
Settings" Settings to connect.
Port Enter the port to connect to Pleasant Password. The default port is
10 001.
Open website Click Open website if you wish to test the connection to Pleasant
Password.
Always prompt with Always prompt with the list of credentials when connecting.
list
DESCRIPTION
This entry is used to define and configure a Secret Server credential entry.
The Secret Server integration requires its Web Services feature to be enabled.
For more information, please refer to the Secret Server documentation.
SETTINGS
GENERAL
OPTION DESCRIPTION
Service URL Enter the URL of the Secret Server web services endpoint. Please
see note below.
Organization Enter the Organization Code. Required by Secret Server when using
the online edition.
Domain Enter the Domain. Required when Secret Server is configured with
domain authentication.
Use "My Account Use the credentials configured in My Account Settings to connect.
Settings"
CREDENTIAL SELECTION
OPTION DESCRIPTION
Look up Select how the secret is retrieve from Secret Server. Select between:
· Default: select from the available secrets.
OPTION DESCRIPTION
Default
OPTION DESCRIPTION
Template Click on the ellipsis button to display a list of available secrets. This
control displays the name of the template for the selected secret.
Test Settings Click to be prompted for the password and validate the credentials.
Name
OPTION DESCRIPTION
Secret name Enter the partial or full name of the secret to use. Variables can be
used, which means you could set up a naming structure for your
secrets that would match the structure you are using for your
sessions.
OPTION DESCRIPTION
Always prompt Select the secret from a list upon every use.
with list
AUTHENTICATION
There is no field to hold the Secret Server password in the entry's properties. When it is required
to connect to Secret Server, the following dialog is prompted.
NOTES
USERNAME
Variables are supported in the username field. If the names are similar across your domain and
Secret Server, you could do one of the following:
· %username%@%userdomain%, this uses windows environment variables that hold your identity.
DESCRIPTION
This entry is used to define and configure a Sticky Password credential entry.
SETTINGS
GENERAL
OPTION DESCRIPTION
OPTION DESCRIPTION
Always ask password Check this option to be prompted for the password upon every
usage of this entry. It also has the effect of preventing the
password from being specified.
Always prompt with list Displays a list of the available credentials when the Sticky
Password entry is used.
CLOUD SYNC
To use Sticky Password in Remote Desktop Manager, the Cloud Sync option must be activated
in Sticky Password. Note that this feature is available only with Sticky Password Premium.
6.6 Documents
DESCRIPTION
Document entry types are used to store any type of document directly in the data source.
For architectural reasons, the documents stored in our Advanced Data Sources
are NOT protected from deletions. Once they are deleted, they cannot be
restored. Please keep a safe copy of all documents in another storage device.
Support for this feature will be added in a coming update to our products.
Entry - Document
DOCUMENT TYPES
In most cases, updating a document saves the new file name. Exceptions are: Email and HTML.
OPTION DESCRIPTION
Link to file Enter the path to a file located on your PC or on your network.
Url Open a file using a URL. You can also use your default Windows
Credentials to open the file.
Stored in Select a file that will be stored in the database. Some data sources do
database not support this mode.
6.7 Folder
DESCRIPTION
Folders are used to organize your entries. You can set permission on folders to limit who can
access the folder and what those users can do.
You can also set properties (e.g. Session Recording or Checkout mode) on the folder and then
set child entries to inherit folder settings.
You can assign a folder type (e.g. Server) or use variables as a folder name (for more
information, please consult the Variables topic).
Entry - Folder
FOLDER PROPERTIES
To decide how to access folder settings through properties or a specific folder properties button,
the Show folder details/description option is available in the dashboard when a folder is
selected.
1. Disable Show folder details/description: Use Folder Properties to edit folder settings
and Properties to modify a selected entry.
2. Enable Show folder details/description: Use Properties to edit folder settings (The
Folder Properties button is unavailable).
If the option Show folder details/description is unchecked (default setting), click Folder
Properties to edit or view folder settings. Click Properties to edit the selected entry settings.
When the option Show folder details/description is checked, the Folder Properties button is
unavailable. Click Properties to edit the selected folder instead of the entry.
FOLDER SETTINGS
Much of the information in folder properties is optional. Only include Credentials, Username or
Password on the folder if you want to protect it. In most cases, leave the information blank (a).
Folder Properties
You can set other settings on the folder. After set the entries within the folder to inherit the
permissions.
Below is an example of a folder where the VPN is set at the folder level. All session entries
within the folder inherit the VPN settings. The folder is also a Server type.
Example of VPN settings in Folder properties and an excerpt of the Navigation Pane to show the folder
structure
Another example is setting Permissions at the folder level to restrict access to sensitive
information.
FOLDER TYPES
Multiple folder types are available. They have special icons to represent the type. You can
access information from special entry types through variables: $FOLDERTYPE_variables$. For
example, $COMPANY_variables$.
· Company
· Customer
· Database
· Device (router, switch firewall)
· Domain
· Folder
· Identity
· Printer
· Server
· Site
· Software
· Workstation
DATABASE FOLDER
The Database folder provides a some of the functionality of the Database session. In properties,
press the ellipsis button to select the data source and data provider. This will generate the
connection string with the information you enter in the dialog.
6.8 Synchronizer
DESCRIPTION
The Synchronizer family is a category of entries that can maintain Remote Desktop Manager in
sync with an external data source. It will create sessions from information obtained from the
source.
You should use security to prevent non-privileged users from using them.
2. Use our "command line" feature and schedule a task to run it at the frequency
of your choice. You can get the proper command line in the advanced
properties of the synchronizer itself.
· Active Directory: Creates session entries for each computer in Active Directory.
· Comma Separated Values (CSV): Create entries for devices. See Import Strategies and File Format for
more information about using the wizard and entry templates.
· Spiceworks
· ConnectWise Control (ScreenConnect)
· Hyper-V: Creates sessions for virtual machines on a Hyper-V server.
· Device (router, switch firewall)
· VMWare
· Entrie s (.RDM, .PVM): Synchronize entries from a Remote Desktop Manager file.
· Amazon EC2: Create session entries for virtual machines on the web service.
· KeePass Xml Synchronizer: Create credential or website entries.
DUPLICATE ENTRIES
If running the synchronizer results in duplicate entries or other things you did not expect with
entries, configure Action on entry mismatch. The option is on the Advanced tab in the
Synchronizer entry properties.
OPTION DESCRIPTION
Action on entry Choose the action to be executed when there is a mismatch between
mismatch the entries:
DESCRIPTION
The Active Directory Synchronizer creates sessions for computers located in your Active
Directory structure.
SETTINGS
GENERAL
OPTION DESCRIPTION
Mode Select the mode that the synchronizer will be use. Choose between:
· Custom
· LDAP
· My Domain
SETTINGS
OPTION DESCRIPTION
Destination Group Select the folder where the sessions will be import in Remote
Desktop Manager.
Level Select the level where the creation of the sub-folders will start.
Session name Select how the session name will be display in Remote
Desktop Manager after the sync. Choose between:
· Common name
Host Select how the Host field will be populate. Choose between:
OPTION DESCRIPTION
· Common name
LOGIN
OPTION DESCRIPTION
Username Enter the username who has access to perform the sync.
FILTERS
OPTION DESCRIPTION
Type Select if all the servers and workstations will be sync or only the
servers. Choose between:
· All
· Server
Other filter Indicate the LDAP query that needed to be use for the filter.
SEARCH
OPTION DESCRIPTION
Search scope Select where the search scope will be done. Choose between:
· Subtree
· One-level
Duplicate check Select when the duplicate check needs to be done. Choose between:
· Root
· Destination group
ADVANCED
OPTION DESCRIPTION
Silent mode When the sync is completed, a sync result window appear to illustrate
the result of the sync and that the sync is now completed. Enable this
option and the confirmation window will not appear.
Action on entry Choose the action to be executed when there is a mismatch between
mismatch the entries:
DESCRIPTION
Some AD structures use Advanced features of the mmc snapin, you must enable
the Advanced Features toggle in the View menu.
SAMPLE STRUCTURE
DESCRIPTION
The Amazon EC2 Synchronizer allows to synchronize virtual machines from the Amazon EC2
web service. The synchronizer creates sessions for each virtual machine instance from EC2.
SETTINGS
GENERAL
OPTION DESCRIPTION
Password Click this icon to display the password (Secret access key) history of
History the entry.
Region Select the region in which the EC2 service hosts the virtual machines.
OPTION DESCRIPTION
Duplicate check Check for already created entries. Select one of the following
location:
IMPORT SETTINGS
The Import Settings section replaces the values of the synchronized entries. The Custom option
allows to use variables.
PROPERTY VARIABLE
Instance Id $InstanceId$
Platform $Platform$
Type $InstanceType$
State $StateName$
Group Id $GroupId$
Public IP $IpAddress$
address DNS
Private IP $PrivateIpAddress$
address
ADVANCED
OPTION DESCRIPTION
Action on entry Select the action to perform when an entry configuration has changed.
mismatch Select between:
· None
· Delete
· Move to
· Make expired
6.9 VPN
DESCRIPTION
VPN Entry is used to configure a VPN. One VPN entry can be linked to multiple sessions. See
Configuring a VPN for multiple sessions to see the step-by-step guide.
Many organizations configure their devices to channel ALL traffic through the
VPN. This may break the connection to your data source. When you are subject
to this constraint, it is best to enable the Offline Mode in Data Source Settings
(System Settings), then configure the VPN options to automatically Go offline
on connection.
For more information on how to manage VPN, please consult VPN Management topic.
SUPPORTED VPNS
There are multiple VPN entries already included in Remote Desktop Manager and many more
are available through add-ons. Please consult VPN Add-ons for more information.
Entry - VPN
OPTIONS
OPTION DESCRIPTION
Go Online on The session goes back online once disconnected from the VPN.
disconnect
Close connection Close the VPN connection after the number of minutes indicated.
after
Detect reachable Automatically close the VPN wait dialog when the host is
host in wait reachable.
You can adjust the time Remote Desktop Manager waits for the VPN to open.
-1 sec is the default time (5 seconds). Change the default time for all VPN entries in File –
Options – Types – VPN – VPN default pause
COMMANDS
In VPN properties – Advanced Tab, you can add commands. With custom commands you can
execute any command after the VPN connects and/or before VPN disconnect.
6.9.1 Microsoft VPN
DESCRIPTION
This entry is used to define and configure a Microsoft VPN session. It integrates
rasdial.exe and rasphone.exe
SETTINGS
GENERAL – DETAIL
OPTION DESCRIPTION
OPTION DESCRIPTION
Show console Display the console errors or messages during the connection. Use
error this setting to diagnose if any connection problem appears. The
application will capture the command line trace and it will display the
result.
Ignore error This will ignore the error code and allow you to continue. It will flag the
code VPN connection as failed.
Use certificate Only the certificate (VPN name) will be used for authentication, the
only username, password or domain will not be requested.
Use rasphone Used to open a VPN created with the Connection Manager
(Connection Administration Kit or when you need to force the rasphone usage.
Manager
Administration
Kit)
Phone book Select a phone book file to use for the connection. Specify a local file
or network file to share it.
OPTION DESCRIPTION
Phonebook Select a Phone Book Document entry from the list populated by the
document application.
GENERAL - ADVANCED
For more information on the Advanced settings, please consult the VPN Management topic.
6.9.1.1 Microsoft VPN Phone-book Management
DESCRIPTION
The Microsoft VPN needs a phone-book file (*.pbk) to be able to establish a connection. This file
contains one or more definitions of "network connections".
When a "pre-shared" key is required by the server, it is not stored in the *.pbk
file, but rather encrypted and managed by Windows. The first connection to the
server will need to be handled manually and the pre-shared key typed in once
per client workstation.
SETTINGS
1. In a working folder on your computer, create a new text file and name it *.pbk (make sure to
change the extension. By default file extensions are not displayed, and the .txt extension will
simply be appended to the new name you type).
To display file extensions, in the View tab of the Windows File Explorer,
enable the File name extensions option.
Phone-book folder
2. Double-click on the new phone-book file to start the configuration, an information dialog is
displayed. click OK
Empty phone-book
Simply double-click the file or use right-click – Open on it. If the phone-book is stored in
Remote Desktop Manager, use the Save Document As feature to save it on the computer
drive during the modifications.
Address to connect
3. The new phone-book is now created. Use the Properties button to adjust the required
settings, such as the type of VPN or security settings.
The documents are stored in Remote Desktop Manager and are not protected
by versioning. Please ensure you keep a copy in a safe place outside of
Remote Desktop Manager.
1. In Remote Desktop Manager, create a Phonebook document. you can choose to simply
create a link to the file, or even better upload it to the data source. Save your document when
done.
2. Create a new VPN entry type Microsoft VPN, and select the document from the previous
step in the phone-book document setting
If the phone-book was already in Remote Desktop Manager, use the Update Document action
in the Dashboard to update to this new version.
6.10 Macros/Scripts/Tools
DESCRIPTION
The session script tools can be either a script, a command line, or a helper applicable to a
selected session. Each can be configured and shared in the data source.
They are listed in the dashboard under the Macros/Scripts/Tools section or in the context
menu under Macros/Scripts/Tools.
Session tools are commonly used to retrieve information, perform an action, change an item, or
change a configuration on the session host. It can also be used to share properties between
groups of sessions using PowerShell, PSExec or keyboard macros.
Macros/Scripts/Tools can be used to run against a host as well as run your macro through the
RDM Agent.
MACROS/SCRIPTS/TOOLS MANAGER
Entry - Macros/Scripts/Tools
GENERAL SETTINGS
OPTION DESCRIPTION
Allow run via agent Allows you to launch a script through an Agent.
Automatically open target Force the opening of a connection before executing the
connection Macros/Scripts/Tools.
Close target connection Automatically close the connection after executing the
after connection Macros/Scripts/Tools.
Allow batch execute Allows you to execute the macro on multiple machines at
the same time.
Prompt for host Automatically prompt for the host on every use.
DESCRIPTION
.\data\New-RDM-Data.ps1
-AddNewOnly
SETTINGS
GENERAL
OPTION DESCRIPTION
Assign file icon to Assign the file icon in the address bar of the session.
session
Arguments Enter your command line argument. For more information please
see Command Line Arguments.
· Default
· Version 2
Wait for application Executes the script while the application waits for completion. Is it
to exit (Remote a synchronous operation therefore it will be unresponsive while the
Desktop Manager script runs.
will be unavailable)
OPTION DESCRIPTION
No exit Leaves the PowerShell window open after the script has
completed.
ADVANCED
OPTION DESCRIPTION
No exit Leaves the PowerShell window open after the script has
completed.
OPTION DESCRIPTION
Wait for application Executes the script while the application waits for completion. Is it
to exit (Remote a synchronous operation therefore it will be unresponsive while the
Desktop Manager script runs.
will be unavailable)
6.10.2 Template
DESCRIPTION
SETTINGS
https://help.remotedesktopmanager.com/tipsandtricks_typesconnections.htm
6.11 Variables
DESCRIPTION
Variables can be used in any entry's configuration or with any templates. The variables will be
replaced by their corresponding values just prior to establishing a connection.
You can select a variable by double clicking on it directly in the dialog. For ease of use there is a
button at the bottom of the edition screen that allows you to select a variable to insert in the
currently focused field.
Variables
SETTINGS
Entry variables
The variables are classify under multiple tabs. Not all contexts are available depending on the
entry being edited, for example the Parent tab is present only when editing a sub connection.
GENERAL
$PASSWORD$: For security reason, this is only available with the command line
session type and some specific types. You must enable it in the Security Settings
of the entry with "Allow password in variable" option.
For an Advanced Data Source, the administrator can disable usage of this
variable for the whole data source in Data Source Settings (System Settings), at
the bottom of the Password Management tab.
ENTRY VARIABLES
OPTION DESCRIPTION
$DYNAMIC_PORT$ Returns the dynamic port used when the entry uses an SSH
VPN with a dynamic port set up.
OPTION DESCRIPTION
OPTION DESCRIPTION
$PORT$ Returns the host port if it's available and when it's not the
default.
$REMOTE_MANAGEM Returns the host part of the Remote Management Server url (if
ENT_SERVER_HOST$ configured).
OPTION DESCRIPTION
GLOBAL VARIABLES
OPTION DESCRIPTION
$DATE_TEXT$ Returns the current date in a text format to use in a file name. Ex:
January 30th 2013 - 20130130.
$DATE_TEXT_ISO$ Returns the current date in a basic ISO 8601 format. EX: January
30th 2013 - 20130130.
OPTION DESCRIPTION
$TIME_TEXT$ Returns the current time in a text format to use in a file name. EX:
8h15 30 - 081530
$TIME_TEXT_ISO$ Returns the text of the current time in the basic ISO 8601 format.
EX: 8h15 30 - 081530
OPTION DESCRIPTION
OPTION DESCRIPTION
ENVIRONMENT VARIABLES
This context allows you to access ANY environment variable defined in your system. The ones
available in the form are the standard ones, but any value enclosed by the percent sign will be
expanded using the Windows environment. You could use this to set a custom security token in
your user profile and use it from within Remote Desktop Manager.
OPTION DESCRIPTION
% ALLUSERSPROFILE C:\ProgramData
%
% APPDATA% C:\Users\{username}\AppData\Roaming
OPTION DESCRIPTION
% COMPUTERNAME% {computername}
% COMSPEC% C:\Windows\System32\cmd.exe
% HOMEDRIVE% C:
% HOMEPATH% \Users\{username}
% LOCALAPPDATA% C:\Users\{username}\AppData\Local
% LOGONSERVER% \\{domain_logon_server}
% PATH% C:\Windows\system32;C:\Windows;C:
\Windows\System32\Wbem;{plus program paths}
% PATHEXT% .com;.exe;.bat;.cmd;.vbs;.vbe;.js;.jse;.wsf;.wsh;.msc
% PROGRAMDATA% %SystemDrive%\ProgramData
% PSModulePath% %SystemRoot%
\system32\WindowsPowerShell\v1.0\Modules\
OPTION DESCRIPTION
% PUBLIC% %SystemDrive%\Users\Public
% SystemDrive% C:
% SystemRoot% %SystemDrive%\Windows
% TEMP% %SystemDrive%\Users\{username}\AppData\Local\Temp
% TMP% %SystemDrive%\Users\{username}\AppData\Local\Temp
% USERDOMAIN% {userdomain}
% USERNAME% {username}
% USERPROFILE% %SystemDrive%\Users\{username}
% WINDIR% C:\Windows
GROUP
PARENT
This context exists only when in a sub-connection. It returns the corresponding value taken from
the parent entry.
OPTION DESCRIPTION
OPTION DESCRIPTION
OPTION DESCRIPTION
DATABASE
The following context will find any Folder Database entry type as long as it is in the hierarchy
above you current entry. If there is multiple matches it will take the entry closest in the hierarchy to
the current entry.
OPTION DESCRIPTION
OPTION DESCRIPTION
DOMAIN
The following context will find any Folder Domain entry type as long as it is in the hierarchy above
you current entry. If there is multiple matches it will take the entry closest in the hierarchy to the
current entry.
OPTION DESCRIPTION
OPTION DESCRIPTION
COMPANY
The following context will find any Folder Company entry type as long as it is in the hierarchy
above you current entry. If there is multiple matches it will take the entry closest in the hierarchy to
the current entry.
OPTION DESCRIPTION
OPTION DESCRIPTION
SOFTWARE
The following context will find any Folder Software entry type as long as it is in the hierarchy
above you current entry. If there is multiple matches it will take the entry closest in the hierarchy to
the current entry.
OPTION DESCRIPTION
OPTION DESCRIPTION
SITE
The following context will find any Folder Site entry type as long as it is in the hierarchy above
you current entry. If there is multiple matches it will take the entry closest in the hierarchy to the
current entry.
OPTION DESCRIPTION
OPTION DESCRIPTION
COMPUTER/HARDWARE
The following context will find any Folder Device, Printer and Workstation entry type as long as it
is in the hierarchy above your current entry. If there is multiple matches it will take the entry
closest in the hierarchy to the current entry.
OPTION DESCRIPTION
OPTION DESCRIPTION
IDENTITY
The following context will find any Folder Identity entry type as long as it is in the hierarchy above
you current entry. If there is multiple matches it will take the entry closest in the hierarchy to the
current entry.
OPTION DESCRIPTION
OPTION DESCRIPTION
CUSTOMER
The following context will find any Folder Customer entry type as long as it is in the hierarchy
above you current entry. If there IS multiple matches it will take the entry closest in the hierarchy
to the current entry.
OPTION DESCRIPTION
OPTION DESCRIPTION
CUSTOM FIELDS
Custom fields can contain any required data and can be accessed using the
*_CUSTOM_FIELD* variables. To access custom fields, select an entry, then click Information in
the entry overview in the dashboard. Finally, choose the Custom Fields tab.
QUICK CONNECT
The $QUICK_CONNECT$ variable will be replaced by the value in the Quick Connect control
as described in Quick Connect. It is only useful when a template connection is selected.
7 Commands
DESCRIPTION
The Context Menu contains several entry-specific actions. The available actions depend on
which type of entry is selected. Right click on an entry to display the context menu.
Context Menu
DESCRIPTION
The Open with Parameters menu all options available to open a session.
OPTION DESCRIPTION
OPTION DESCRIPTION
Open Open the session within the confines of the Remote Desktop
(Embedded/Tabbed) Manager dashboard and display tabs at the top of the window.
Open (Full Screen) Open the session with the full screen display mode.
Open (Select Prompts you with the list of the credentials link to your Data
Credentials)... Source to allow you to chose the one needed to open your
session.
Open in No Open your session normally and prompt your for your
Console/Admin Mode credentials to connect.
(Prompt for
Credentials)
Open Share Folders Open the shared folders of the remote computer.
Open with a Open from a template that you have already created.
Template...
7.1.2 Documentation
DESCRIPTION
The Documentation feature allows for storing information about resources in the data source.
To access an entry's documentation, select an entry in the Navigation Pane, then select the
Documentation tab in the dashboard. Alternatively, right-click an entry in the Navigation Pane,
then select View – Documentation.
Documentation of an entry
7.1.2.1 Editor
DESCRIPTION
The documentation editor is a simple plain text editor. The text is formatted using the Markdown
text formatting syntax. Markdown is a markup language designed to be as easy-to-read and
easy-to-write as possible.
Documentation editor
· Paragraphs
· Emphasis
· Headers
· Lists
· Horizontal rulers
· Links
· Images
· Blockquotes
· Code examples
PARAGRAPHS
A paragraph is one or more consecutive lines. Normal paragraphs should not be indented with
spaces or tabs.
EMPHASIS
*Italic text*
Output:
HEADERS
First and second level can be created by "underlining" the text with equal signs (=) and hyhens
(-).
First level header
==================
More levels of headers can be created by using one to five hash symbol (#) at the beginning of
the line.
# First level header
LISTS
Use asterisks, pluses, and hyphens to create an unordered bulleted list. These three markers
are interchangable.
* Item 1
* Item 2
* Item 3
or
+ Item 1
+ Item 2
+ Item 3
or
- Item 1
- Item 2
- Item 3
Output:
HORIZONTAL RULERS
or
***
or
---
Output:
LINKS
Use square brackets to delimit the text you want to turn into a link.
Use parentheses immediately after the link text for inline-style links:
Navigate to the [Devolutions website](https://devolutions.net).
Output:
For reference-style links, define the links elsewhere in the document, then refer to a link by its
name in another set of square brackets.
Navigate to the [Devolutions website][mainwebsite] or the [Devolutions forum][forumwebsit
The title attribute is optional again. Link names may contain letters, numbers and spaces, but
are not case sensitive.
IMAGES
Image syntax is very similar to link syntax. Images must be added in the image manager before
referencing them.
To add images in the image manager, click the Manage images button.
Click Add to select an image from the computer. Select the image in the list, and click Insert to
place the image in the text.
BLOCKQUOTES
Quote a passage of text by inputting a greater-than (>) symbol at the beginning of the line of text.
> Quoted passage of text
Output:
CODE EXAMPLES
Code blocks are created be indenting the text with four spaces at the beginning of each lines
There must have an empty line before.
// Testing indented code
var markdownAwesomeness = 0;
if (indentedCodeWorks) {
markdownAwesomeness++;
}
Output:
DESCRIPTION
Entry History feature allows you to view details regarding different version of your sessions and
also gives you the option of performing compares between different versions.
For architectural reasons, the documents stored in our Advanced Data Sources
are NOT protected from modifications. Once they are modified, the previous
version cannot be restored. Please keep a safe copy of all documents in
another storage device. Support for this feature will be added in a coming update
to our products.
SETTINGS
Session History
To display the entry history, right-click on an entry and select View - Entry History.
The entry history view dialog allows you to compare two entries and manage history revisions.
To compare simply select any two entries then use the Compare button. You can delete any
history revision or the entire history using the Delete and Delete All buttons.
Use the Administration - View Deleted to manage and resurrect deleted entries.
Deleted Entries
7.2 File
DESCRIPTION
The File menu contains many actions regarding the application and the data source. This menu
is contextual and depends on the connected data source.
File
GO OFFLINE/ONLINE
LOCK APPLICATION
The user is prompted for the data source password when the application is restored (if required
by the configuration).
For more information, please consult the My Data Source Information topic.
DEVOLUTIONS ACCOUNT
Connect to a Devolutions Account, create custom installer for Remote Desktop Manager,
manage license serials, and more.
REFRESH
Refresh the data source and retrieve the most recent data.
DATA SOURCES
BACKGROUND SERVICES
MY ACCOUNT SETTINGS
View information about the current user and edit personal credentials.
For more information, please consult the Change Master Key topic.
IMPORT
EXPORT
OPTIONS
TEMPLATES
7.2.1 Go Offline/Online
DESCRIPTION
Use the offline mode to connect to a local copy of the data source when the remote database is
unavailable. This is useful when working from a remote location and the network is unreachable
or if there is any kind of connectivity issue.
There are security considerations to take into account when enabling the offline
mode.
The offline mode availability relies on several settings, refer to the Offline Mode topic.
The lowest setting (in terms of security) prevails over the others, which may prevent you from
using the offline mode. If the Go Offline button is not available, please consult your
administrator.
The Data Source Information displays the size of the offline cache file along with the effective
modes (disabled, read-only or read/write).
DESCRIPTION
The Data Source Information displays various information related to the current data source,
such as the current user and security access.
The My Data Source Information view can be different depending on the Data
Source Type. This topic uses an SQL Server data source.
GENERAL
The General tab displays information about the current user and data source configuration.
OPTION DESCRIPTION
Database user The name of the user currently logged to the database.
Allow offline mode Indicates if the user can use the data source in offline mode.
Allow drag-and-drop Indicates if the user can drag-and-drop entries in the data
source.
OPTION DESCRIPTION
Auto refresh interval Indicates the delay for the auto refresh to occur.
ENTRIES
OPTION DESCRIPTION
Add, Edit and Delete Indicates if the user has the right to add, edit, or delete
entries entries.
View information section Indicates if the user can view the information section of
entries.
OPTION DESCRIPTION
Import and Export entries Indicates if the user has the privilege to import or export
entries.
Allow add entry in vault Indicates if the user can add entries in the vault root of the
root folder data source.
SECURITY GROUPS
The Security Groups are now a Legacy setting. We strongly recommend using roles instead.
ROLES
The Roles tab displays the roles that the user is a member of and the rights related to those
roles.
This feature is only available with an SQL Server/SQL Azure and a Devolutions
Password Server (DPS) data source.
DESCRIPTION
SETTINGS
Devolutions Account
DEVOLUTIONS ACCOUNT
OPTION DESCRIPTION
Edit Devolutions Account Edit your Devolutions Online Database (DODB) account.
SETTINGS
OPTION DESCRIPTION
TOOLS
OPTION DESCRIPTION
Installer File Create a Remote Desktop Manager Installer File (.rdi). Consult
Generator topic Installer File Generator.
7.2.4 Backup
DESCRIPTION
DESCRIPTION
The Online Backup allows you to backup your Devolutions Online Drive, SQLite, XML or
Microsoft Access data sources in a safe online storage. The backup option is available through
File – Backup menu.
SETTINGS
Back up Name
4. You will need to specify a unique backup name in the field New backup for each of your data
source which will then be used to backup and restore the data source. Click on Create to
automatically create your Online Backup.
Create Back up
5. Once you've completed all the steps, perform a change in the data source to properly activate
the Online Backup.
6.The backup logo will display a green arrow meaning your backup is now enabled.
You must perform this for all your Devolutions Online Drive, SQLite, XML or
Microsoft Access data sources in order to be fully protected!
7.2.4.2 Restore
DESCRIPTION
Before being able to restore a backup, you MUST create an empty data source
and define the backup name before being able to use it. You need to create a
new SQLite, XML, Online Drive or Microsoft Access data source in File – Data
Sources.
At some point, you may need to restore a backup of your Devolutions Online Drive, SQLite, XML
or Microsoft Access data sources. The restore option is accessible from the menu File –
Backup – Restore.
SETTINGS
1. To restore a data source from a backup, select it as the current data source.
Back up Restore
3. Select the backup that you wish to restore from the list and click on Select.
4. The Online Backup wizard will display a brief description of the backup. Click on Next.
Back up Wizard
5. Select the restore destination. It is not necessary to select the option Perform a backup
data source before restoring the selected backup since it is empty.
Restore Destination
7.2.5 Refresh
DESCRIPTION
Refreshing the data source allows for updating its content. Data sources are usually refreshed
automatically after a set period of time.
To refresh the data source, use File – Refresh. Do a refresh to make sure that the data source
is up to date.
SIMPLE REFRESH
A simple refresh updates the data source to retrieve only the modified content. Use the above-
mentioned File – Refresh or the refresh button in the Quick Access Toolbar.
A refresh of the local cache resets the local cache of the data source. All the content is retrieved
from the database and the local cache file is recreated. Click the refresh button while holding
the Ctrl key or use the Ctrl+F5 key combination. A local cache refresh may also help when
experiencing Cache issues.
7.2.6 Change Master Key
DESCRIPTION
The master key prevents unauthorized users to access the data source without knowing the
master key. It is highly recommended to apply a master key to the data source if you're using
Remote Desktop Manager in a portable environment (i.e. USB Flash Drive, USB Hard Drive).
Since version 14.0.4.0, the user is automatically prompted to add a master key
when connecting to one of the above mentioned data sources for the first time.
The master key is completely optional (yet highly recommended).
DESCRIPTION
Use File – Data Sources to manage data sources. Remote Desktop Manager supports
multiple types of data source. Most are available only with an Enterprise Edition of Remote
Desktop Manager.
Please refer to the Data Source Types topic for more information on all supported types of data
sources.
Data Sources
SETTINGS
Use the – – buttons to respectively edit, duplicate or delete the selected data source
configuration.
Only the configuration will be deleted but the actual file or database will still be
available.
Use the – buttons to respectively import or export the selected data source configuration.
The configuration is exported as a .RDD file.
Use the lock button to lock the data source with a password to prevent any modification to a
data source configuration. This is useful when having sensitive credentials that you wish to
protect from other users.
Use the unlock button to unlock a data source locked with a password.
ON START UP
OPTION DESCRIPTION
Use default data Set the data source that you always want to open at start up.
source
OPTION DESCRIPTION
Last used data Open with the last used data source.
source
Prompt for data A message box will open on startup for the data source selection.
source
SYNCHRONIZERS
When experiencing a performance degradation with Remote Desktop Manager you will be able
to verify if a synchronizer is running in the background causing the system to slow down.
Synchronizers
IS ONLINE
Is Online allows you to verify and change the settings of your server's online availability.
Is Online
OPTION DESCRIPTION
Enable check for Server is ping to determine if they are available. Server will be
server availability displayed in "red" in the tree view if not available.
Execute automatic Execute the online check automatically each determined amount
check every of minutes.
Check is online If the option is On the application will verify if the server is online.
Online detection If Check is online option is enable, select the detection method
between:
· Ping
· Port scan
7.2.9 Import
DESCRIPTION
Use the File – Import to import entries in Remote Desktop Manager. You can import entry types
from multiple sources.
We support native import formats from many popular tools on the market. In case we don't
support the native format, or don't support the third party, we have wizards to import from a csv
file.
The import feature is only active if the import Permission has been enabled inside
the user account.
SETTINGS
File - Import
IMPORT ENTRIES
You can import computers from different sources. These sources includes:
· Network neighborhood
Consult Import with Network Scan to learn more about this option.
· Import Session
· Import Login
Each wizard specifies the list of supported columns and identifies which are mandatory.
IMPORT FROM
Consult topics below to import sessions, logins and contact from many tools:
· Import Sessions
· Import Logins
· Import Contacts
DESCRIPTION
The Import Computer Wizard allows you to create sessions for computers using one of the
following sources:
· Network neighborhood
· Active directory: your current domain or another domain on your network
· Host list: List of computers from a file
OVERVIEW
The template selection should not be overlooked, in fact it is probably the most important step to
ensure your newly created sessions are usable right after being created. You should divide the
sessions in batches based on which template you need to apply and import one batch at a time.
WORKFLOW
Upon launching the wizard, you are prompted for the source to use.
The Resolve IP address option must be checked if you want to use the IP address in the host
field of your sessions instead of the host name.
NETWORK NEIGHBORHOOD
The next screen will immediately be populated with the result of the network discovery.
ACTIVE DIRECTORY
The following screen allows you to select the domain to interrogate after which you must press
refresh to load the list of computers that are available.
After the query is executed the results are displayed in the grid.
HOST LIST
The following screen allows you to enter a list of hosts in an Edit control. If you prefer that your sessions use the
IP address to connect to the hosts, you must enter the host name, a pipe, then the IP address.
TEMPLATE SELECTION
The template selection is an optional step, but its the only way that you have to choose a protocol
type other then RDP. It also allows you to set your preferences and have them used by all the
created sessions. In fact we recommend you to import in batches for each of the session type
that you need to import.
DESCRIPTION
This version of the wizard has been greatly enhanced to support not only all entries general fields
but also sub-fields. This gives you access to all properties, even for types provided by add-ons,
therefore unknown by Remote Desktop Manager.
For a discussion on the CSV file format, and the impact of decisions made in this
entry, please consult Import Strategies and file format
SETTINGS
Once you've selected the CSV file to process you will be presented with the template selection
screen.
If you have selected a template as suggested, you will see a list of templates available to your
system.
If you wish to review each and every session as they are imported you can check the Edit
imported entry, but it is not really recommended for a large number of sessions.
Press finish and the import will proceed using your chosen settings.
DESCRIPTION
The most important decision is about if and how to apply a template as part of the process.
Both methods of importing from CSV allows you to choose a template for newly created entries.
If you do choose a template as part of the process, it will be apply to ALL entries created from
that batch. Sometimes, it may be a good strategy to split the entries in different CSV files by
grouping them by type of entries you wish to create.
If you need finer control, you can specify the template to use in a Template column of the CSV
file. But since you're able to specify the entry type from within the CSV file it may not be
necessary. Please consult CSV Samples below.
COLUMNS
Some validations on entry settings are not in the business layer but rather in the
property dialogs. This means that using the import process can result in invalid
entries that trigger errors. Please validate the resulting entries carefully.
In the CSV file, only the Host field is mandatory. If no template is specified, the RDP type will be
used as a fallback type.
We cannot provide the list of all supported fields for all entry types because Remote Desktop
Manager uses an open architecture and therefore is not even aware of all the fields of entry
types that are provided by our Add-On system. A good method of finding out the field structure is
to create an entry of the desired type and to use Clipboard – Copy, then paste the content in
your favorite editor. You will see the structure and the field names.
Default values for fields are NOT serialized. This means that they are simply left
out of the serialized structure.
Implementing support for all fields comes at a cost. The import process is time
consuming because of all the dynamic field access that takes place. A massive
initial import of entries should be separated in batches of manageable size.
Please perform trials and tune the number of entries to achieve acceptable
performance.
All of our entries share a basic set of fields, the rest are tied to the specific technology being
interfaced with (RDP, SSH, etc). Some fields are grouped in structures like the Information Tab
for instance. This means that those fields are accessible only when providing the structure name
as a prefix, for example: "MetaInformation\OS" or "MetaInformation\PurchaseDate"
Note that the content of the CSV file can contain our variables and they will be
resolved upon saving. For instance you could use the $HOST$ variable in fields
like Description, URL, Putty\CustomSessionName, etc. It will be replaced by
the corresponding value.
OPTION DESCRIPTION
Host Host name of the device, this is the only mandatory field.
Group Destination folder. Note that if the import process itself had a
Destination Folder defined as well, the folder listed here would be
created below the one from the process.
Open (Embedded) Boolean value (true or false) that indicates to open the session
embedded. The default value is false, meaning that the native
client will be used depending on the technology. MSTSC.EXE for
instance.
Password Password used to open a session to the device. Please note that
this field is encrypted and stored into another field upon being
OPTION DESCRIPTION
imported.
CSV SAMPLES
Host,Name,Template,ConnectionType,ConnectionSubType,SubMode,Group,Username,Domain,Passwor
192.168.10.001,one,,Microsoft Remote Desktop (RDP),,,QA Lab,,,,Description001,
http://online.remotedesktopmanager.com,two,,Web Browser (http/https),,,QA Lab,,,,Descript
192.168.10.003,three,,LogMeIn,,,QA Lab,,,,Description003,
192.168.10.004,four,,"Telnet, SSH, RAW, rLogin",,0,QA Lab,,,,"This is the Putty sub-type"
192.168.10.005,five,,"Telnet, SSH, RAW, rLogin",,1,QA Lab,,,,"This is the Telnex (Rebex)
192.168.10.006,six,,"Telnet, SSH, RAW, rLogin",,2,QA Lab,,,,"This is the SSH Shell (Rebex
192.168.10.007,seven,,"Telnet, SSH, RAW, rLogin",,3,QA Lab,,,,"This is the SSH (Rebex) su
192.168.10.008,eight,,VNC,,,QA Lab,,,,Description008,
192.168.10.009,nine,,Citrix,,,QA Lab,,,,Description009,
DESCRIPTION
The Import from Network allows you to perform a network scan based on a predefine range of
IP address to find sessions to import.
Once the scan is completed select the sessions you wish to import (by default every session will
be selected) and click on OK to import those sessions in your data source.
If you wish to review each and every session as they are imported you can check the Edit
imported entry, however we do not recommend this for large number of sessions.
DESCRIPTION
Use the File – Import – Import from – Session to import sessions from other software into
Remote Desktop Manager.
The import feature is only active if the import Permission has been enable inside
the user account.
SETTINGS
You can import your sessions from an existing application or an existing file format. Some
application encrypt the data but it must be in plain text to allow the application to parse the
content. Please note that all entries will be imported in the current folder. For some applications
it's not possible to extract the password.
DESCRIPTION
Use the File – Import – Import from – Login to import different logins or credentials from other
software into Remote Desktop Manager.
The import feature is only active if the import Permission has been enable inside
the user account.
SETTINGS
You can import the credentials from a wide array of formats exported by various password
management solutions. The export content must not be encrypted in order to parse the content.
Please note that all the entries will be imported in the current folder. We support a multitude of
Login imports, explore to your heart's content!
7.2.9.6 Import Contacts
DESCRIPTION
Use the File – Import – Import from – Contact to import contacts from other software into
Remote Desktop Manager.
The import feature is only active if the import Permission has been enable inside
the user account.
SETTINGS
· Microsoft Outlook
· Real VNC
· VCard
Please note the all the entries will be imported in the current folder.
7.2.10 Export
DESCRIPTION
Use the File – Export to export entries from Remote Desktop Manager. Below is a list of export
options:
· Export All Entries (.xml) (It's exactly the same content as a .rdm file but with the XML
extension).
If you have used Document entries in the Stored in database mode, or used
attachments, the binary content of the documents is NOT exported in any of
our export formats. These documents/attachments MUST be handled manually.
The export feature is only active if the import Permission has been enabled inside
the user account.
The only appropriate format to import the entries back into Remote Desktop
Manager is the .rdm format.
SETTINGS
File - Export
When using an Advanced Data Source, export capabilities can be disabled via
security policies at the data source level (no one can export) or at a user level
(particular users can't export). See Security Group Management for more
information.
Export all entries in a .rdm file that can be imported into any Remote Desktop Manager data
source. You can also include credentials in this export format and secure your file with a master
key.
By default the credentials are NOT included. It's critical to check the
Credentials option in order for the exported data to include the credentials.
Specifying a master key will encrypt the whole content of the .rdm file to protect
its content. It is highly recommended as a backup measure, but the key is
absolutely necessary for decryption. Preserve this as well in a separate storage
device for safekeeping.
Export a simple host list in .csv format. You will be prompted to see if you wish the export to be
slightly more detailed and include the following information: Host, Description, Display Name,
Group, Security Group.
Export all entries using the .csv format file. For security reasons the .csv file will be contained
within a password encrypted zip file. This type of security can be hacked using brute force
attacks, it should be used only when the zip file is under your exclusive control.
Please note that the csv columns will vary depending on entry types being
exported. This makes it the wrong format if ever you want to import the data back
in Remote Desktop Manager. Use this only to migrate to another system.
Export all entries within a AES-256 to encrypt self contained html file. See Export Html
Encrypted topic for more information.
Because it brought confusion to our user base, this export format has been converted to perform
the exact same export as the "Export all entries" but sets the file extension to .xml instead.
Export Documents
Export all attachments or all document entries that are linked to your data source.
7.2.10.1 Encrypted Html
DESCRIPTION
The Html Encrypted export format was designed for simple and secure exports of entries. It
allows for an html export of the entry information while using symmetric encryption (AES-256) to
encrypt sensitive information such as passwords. The file is an ultra portable self contained html
file that requires no external script files or installs. As long as you have a web browser with
JavaScript enabled you can get to your encrypted data.
With a secure encrypted document you can freely send the information via email
or any other protocol without compromising the sensitive data. Use the export as
means of sharing or as a backup for sensitive information.
SETTINGS
Select the entries to export or export all entries. Right-click and select Export – Export Special
– Export All Entries (.html) or use File – Export – Export All Entries (.html). You will be
prompted for a password for the symmetric encryption key. Select the file name for the new
document. Once the export is completed the file will open in your default browser.
Ensure you do not forget the password as you will not be able to decrypt the data
without it.
When exporting multiple entries that are all contained within the same file, at decrypt time, each
encrypted value must be decrypted individually for security reasons. Once you're done with the
sensitive data simply hit F5 to refresh the file or simply close it. Your data is now safe from prying
eyes.
AES-256
We use AES-256 to encrypt/decrypt your sensitive data. Since the decryption is done entirely in
the browser, there’s no need for external tools, downloads or installs.
Encrypted Value
In addition, HTML Export using symmetric encryption is a great way to securely backup your
passwords and other sensitive information. It allows you to share information via email or simply
send the file to your personal email account as a backup.
7.2.11 Options
DESCRIPTION
There are multiple options available to manage and customize your Remote Desktop Manager
in the menu File – Options. Most of these options are related to changes to the local instance.
File - Options
· User Interface
· Types: Settings for different types of entry, terminal, ssh keys, etc.
· Reports
· Tools
· Path: Customize installation paths for Remote Desktop Manager, logs, documents, templates and add-ons
· Cloud
· Advanced
· Import Options
· Export Options
DESCRIPTION
Use the File – Options – Advanced tab to control the application behavior as it pertains to low
level settings.
Options - Advanced
SETTINGS
ADVANCED
OPTION DESCRIPTION
Debug level Set the level of debugging information that Remote Desktop
Manager will capture. This should only be modified upon request
from a Devolutions support technician as it might cause your
system to slow down .
OPTION DESCRIPTION
Offline engine You can choose your Offline engine between the SQLite or
OpenMCDF. Only change this option upon request from a
Devolutions support technician.
Force "localhost" Forces the use of "localhost" when using the VPN dynamic port.
when using VPN
dynamic port
Confirm on multiple Select a target number where mass opening sessions will
session open if open demand confirmation.
count greater than
OPTION DESCRIPTION
Auto close embedded Automatically closes all tabs for embedded sessions when
tab on disconnect they are disconnected.
Confirm on multiple When opening more than one session you will be presented
sessions open with a confirmation dialog. This typically occurs when doing an
Open session on a folder.
OPTION DESCRIPTION
Disable multi-thread This setting allows Remote Desktop Manager to use multiple
loading threads to load the data. Disabling this option will decrease
the performance.
Disable multi-thread This setting allows Remote Desktop Manager to use multiple
offline file threads in offline file. Disabling this option will decrease the
performance.
Disable RDP virtual Turning off virtual channel disables some Remote Desktop
channel Services features such as clipboard and printer redirection.
Ensure that KeePass is Validate that KeePass is running on your computer before
running accessing any KeePass data.
Force refresh before Perform a refresh of the entry before entering in edit mode.
edit entry This is useful in a multi-user environment with a shared data
sources. This ensure that you are editing the most recent
version of the entry.
OPTION DESCRIPTION
Force restore When double-clicking on the desktop shortcut it will restore the
application with application that is already open. If the option is unchecked a
desktop shortcut second Remote Desktop Manager window will open.
Open shortcut session Disable the command line warning message when using a
silent shortcut.
Use connection loader Only enable this option upon request from our Support team.
optimization
Use DirectX rendering By default this option is enabled to use DirectX rendering
in VNC when available for VNC connection.
Use NTFS Encryption When using Offline Mode, a local file is created to hold a copy
for Offline mode of the data source. If this is enabled the local file is encrypted
using the built-in NTFS encryption of Windows. This setting
may cause delays when accessing the data source because
the local file is refreshed on every access.
Use Secret Server Enable to use the Secret Server Legacy interface.
Legacy Interface
OPTION DESCRIPTION
Allow multiple Allows more than one instance of Remote Desktop Manager
instances to run concurrently. This is not a recommended practice.
Allow non upgraded Allow Remote Desktop Manager to work on an older data
data source source that has not being upgraded.
Confirm on drag and When session(s) are moved by drag and drop, a confirmation
drop move message will appear to confirm the move.
OPTION DESCRIPTION
Disable stack trace Disable the stack trace details when an error occurs in
Remote Desktop Manager. This is a security feature.
Focus content on Set focus on the last embedded session when the application
application activation is activated.
Use application Use the installation folder to save the local play list that has
directory for local play been created.
list
Use application Use the installation folder to save the offline cache file.
directory for offline
cache
OPTION DESCRIPTION
Always show "Go Always display the "Go Offline" button in the status bar when
Offline" button Offline Mode is active.
Disable custom images Disable the loading of any custom images in the tree view.
Too many custom images could dramatically increase the size
of the data source and increase the load time at the same
time.
Expand all tree nodes After creating a new credential entry, the tree nodes expands
on select credential automatically.
entry
Hide last opened play Hide the last opened play list at startup in the play list dialog.
list in play list
OPTION DESCRIPTION
management
Use old entry sort Use the old entry sort from previous version of Remote
Desktop Manager.
INFORMATION
OPTION DESCRIPTION
SETTINGS
Select the Configuration File to import in Remote Desktop Manager and click on Open.
OPTION DESCRIPTION
Decide which options to replace with the one from RemoteDesktopManager.cfg that you wish to
import. Select Replace to replace an existing setting with a new one or select Ignore if you want
to keep the setting that you already have.
7.2.11.3 Ex port Options
DESCRIPTION
Use File – Options – Export Options to control the options to export from your application
configuration. Use this to easily transfer settings to another machine.
Sharing the exported file with a colleague would effectively give that person
whatever credentials you have set in your data source definitions, including
credentials set in your DODB.
SETTINGS
REGISTRATION INFORMATION
OPTION DESCRIPTION
MISCELLANEOUS
The local templates may contain credentials, ensure you do not share the
exported file.
OPTION DESCRIPTION
Saved Preserve your installation paths configured for the external application.
installation
paths
DATA SOURCES
The data source configurations you select will be exported with the
username/password as they are currently configured. If you are creating a file to
quickly set up new employees, you must be careful not to give away your
credentials. Using the Custom Installer Service is recommended for this case.
All your configured data sources will be displayed in this section. Select the one(s) that you want
to include in the export. Please note that the content of the data source is not exported.
When your settings are customized to your liking, click on Export. You will be prompted to save
your settings in a RemoteDesktopManager.cfg file.
7.2.12 My Account Settings
DESCRIPTION
Use File – My Account Settings to configure accounts that connect to different web platforms.
Set up account settings one time and use it in entries as many time as required. This section
also allows to manage Personal Credentials, Personal Private Key and Specific Settings
lists.
SETTINGS
My Account Settings
INFORMATION
OPTION DESCRIPTION
OPTION DESCRIPTION
User Specific Provide a list of all the User Specific Settings configured in
Settings List Remote Desktop Manager.
Local Specific Provide a list of all the Local Specific Settings configured in
Settings list Remote Desktop Manager.
SETTINGS
We support a specifics settings for a variety of Credentials, explore to your heart's content!
7.2.12.1 My Personal Credentials
DESCRIPTION
The My Personal Credentials feature is a single credential entry which is locally stored on your
computer in your Windows profile.
It is typically used to hold the Windows credentials for your running sessions because Remote
Desktop Manager can't access them. If you can't use integrated security then you must store
your credentials in My Personal Credentials.
This allows you to centralize one special credential to replace or emulate the ones for your
Windows session. When a password change is needed you simply need to change it once in
My Personal Credentials.
My Personal Credentials
DESCRIPTION
The User Specific Settings List feature will provide all entries that are overridden with user
Specific Settings.
OPTION DESCRIPTION
Import Import a list of user Specific Settings from a .rds file. As this file is
encrypted using a mandatory password, you will have to provide
the password to successfully import the content of the .rds file.
Export Export a list of user Specific Settings into a .rds file. A password is
required to encrypt the .rds file.
OPTION DESCRIPTION
7.2.13 Templates
DESCRIPTION
Templates are useful to have predefined values when creating an entry. Use templates to:
· Add preconfigured entries
· Use with the Quick connect feature
· Open entries as a template
· Create an import wizard
· Create password templates
This allows for creating predefined templates available to use with the quick connect feature or
when creating or importing a entries.
In Advanced Data Sources , local templates are disabled by default. They can
be enabled from the Data Source Settings (System Settings).
File – Templates
AVAILABILITY
USAGE
By default, when creating an entry of a type that has templates configured for, the user is
prompted for a template to use. This behavior can be modified in the Data Source Settings
(System Settings).
Select a template
The template can be selected before creating the entry as well. Simply use the Template
section of the Add New Entry window.
Templates can be used with the Quick Connect feature. For example, the same template can
be used to connect to different hosts.
Quick Connect
IMPORT WIZARD
The import session wizard uses a template for the imported sessions.
DESCRIPTION
There are many ways to create template for entries. You can create a new template, save an
entry as a template, import entries as templates, and duplicate a existing template. It is also
possible to create group templates.
In this topic:
· New Template
· Save as Template
· Import Template
· Duplicate Template
· Template Groups
File – Templates
4. Enter a name for the template, and configure the properties as necessary.
Template Properties
It is possible to save entries as templates to use their properties in other entries. Furthermore,
this can be achieve on folders to include all their child items in the template.
From the Navigation Pane, right-click an entry and select Add – Save as Template...
Save as Template...
IMPORT TEMPLATE
1.1. From the Templates window, click on the Import template button.
Import Template
2. Select the *.rdm file to import to create a template for each entry in the file.
DUPLICATE TEMPLATE
Navigate to File – Templates, and select Templates. From the Templates window, click on the
Duplicate template button.
Change the template name to distinguish the copy from the original, and edit the properties to
meet your requirements.
TEMPLATE GROUPS
It is possible to save a set of selected entries or a folder and all its child items to a unique
template.
DESCRIPTION
Default Templates create default settings for new entries. Every entry type is supported and can
have a default settings template defined.
· Session
· Information
· Credential Entry
· Folder
· Contact
· Document
· Synchronizer
· Macros/Scripts/Tools
SETTINGS
To help you locate the entry type you want to customize, all entry types are organized by
category.
Select a category of entry from the File – Templates menu, then select the specific entry type to
be edited.
Please note that a [No default] notice is displayed below each type that does not have a default
template defined.
All entry types without the [No default] notice have a default template. You can double-click on
the type to edit the template or press the edit button.
If you want to remove the default settings template, press the delete button.
DESCRIPTION
Password templates set requirements for the password format: characters usage, patterns,
readability.
Password templates are available in the password generator. Password templates can be
optional or required.
SETTINGS
OPTION DESCRIPTION
Default General settings about length and minimum amounts for characters
and symbols.
Use a pattern Set a pattern for the passwords using the key.
OPTION DESCRIPTION
1. On the Tools tab, click Password Generator. Or open the password generator from an entry
.
2. To choose a password template, select the title from the list. Default is equivalent to no
template, until it is configured by an administrator. When you select a template the options are
unavailable because they were saved in the template.
The default template in the Password Generator is set to "no template" until an administrator
configures the template.
3. Choose the template. The chosen template will now be the Default in Password Generator.
4. If you want to force one template, check Force default template. No other choices will be
available in the password generator.
7.3 Home
DESCRIPTION
The Home ribbon tab allows you to apply an action on the currently selected session. The ribbon
will display the following tab when the session is embedded.
Ribbon - Home
· Connect.
· Macros.
· Clipboard: Configure clipboard in File – Options.
· Miscellaneous.
7.4 Actions
DESCRIPTION
The Actions tab is only available when a session is open. Available actions differ depending on
the action.
For our example we are running an RDP session. The ribbon will display the following tab when
the session runs with the Embedded (tabbed) display mode.
Ribbon - Actions
CONNECTION
OPTION DESCRIPTION
Reconnect Quickly close the session and then re-open it automatically. Use it to
update the resolution of your embedded RDP connections when you
resize the window.
LogOff Logoff the RDP session. See Logoff topic for more information.
ACTIONS
Option Description
Execute Execute the selected macro or script in the previous window or in the
current tab. This is only available when there is something to Execute.
Macro/Script Displays a window where you can select a macro or script, as well as the
execution options.
Option Description
Type Send the content of the clipboard over to the opened session.
Clipboard
DISPLAY
OPTION DESCRIPTION
Undock Undock your embedded session and move it anywhere outside Remote
Desktop Manager or even on another monitor.
Embedded Re-embed your session when your session is undocked. This option will
only appear if your session is not already in an embedded mode.
Full Screen Display your session in full screen outside Remote Desktop Manager.
Work Area This mode allows you to open the connection in full screen but to also
Screen have access to your local taskbar.
SETTINGS
OPTION DESCRIPTION
Keep tab on Your session tab will stay after a session disconnect. For more
disconnect information, see Keep Tab Opened topic.
Smart Sizing Enable or disable the RDP smart sizing. This setting will determine
whether or not the client computer can scale the content on the
remote computer to fit the window size of the client computer.
OPTION DESCRIPTION
Smart Reconnect Automatically reconnect your session with the most appropriate
band.
Windows Key on When enabling Windows key, it will send the function to your host
the Remote instead of running it on your computer.
Computer
COMMANDS
This tab contains multiple type of commands and keystrokes combinations to affect the current
session in a variety of instances. As such, these commands depend on the currently selected
(and opened) entry. For a few example scenarios, refer to the following topics:
· RDP
· VNC
· SSH Shell (Rebex)
· Telnet
Session add-ons may add custom command in this section, they will not be
documented in these topics but rather in the add-on documentation.
SCREENSHOT
OPTION DESCRIPTION
Save to File Prompts for a file name and saves the capture to that file.
OPTION DESCRIPTION
Save to File and Prompts for a file name and saves the capture to that file, then
Open automatically open the file using your default editor.
VIDEO
OPTION DESCRIPTION
Record Record your screen in an MP4 format. We recommend the use of a VLC
player to view the recorded video.
Alternatively, these actions are also available by right-clicking on the tab of an embedded
session.
7.4.1 Commands
7.4.1.1 RDP
DESCRIPTION
The commands for an RDP session allows you to send remote commands to your host.
SETTINGS
RDP Commands
OPTION DESCRIPTION
View Only Prevent the session from receiving any input from the keyboard or
the mouse. This feature was requested to allow monitoring while
preventing manipulation errors. Use it to have a read only access
to the remote server.
App Bar On Windows 8 or Windows 2012 server, displays the App bar to
show navigation, commands, and tools.
7.4.1.2 VNC
DESCRIPTION
The VNC Commands allows you to send remote commands to your host. You will also notice
another toolbar holding more defined commands for a VNC session.
SETTINGS
VNC Commands
OPTION DESCRIPTION
Window Start Menu Open the Start menu on the host computer.
View only mode This will prevent the session from receiving any input from the
keyboard or the mouse. This feature was requested to allow
monitoring while preventing manipulation errors. Use it to have a
read only access to the remote server.
Remote input Keyboard and pointer events will be sent to the server and the local
and remote clipboard will be synchronized.
Open file transfer Open the file transfer with the host computer.
Open chat dialog Open a chat dialog with the host computer.
OPTION DESCRIPTION
DESCRIPTION
The commands for a SSH Shell session allows you to send remote commands to your host.
OPTION DESCRIPTION
Clear Clear the scrolling display that precedes the current line.
Scrollback
START RECORDING
Recording type
OPTION DESCRIPTION
Ansi Record all of the activity in the SSH session using the Ansi format. This
Recording can be replayed like a video using Tools - Tools - Terminal playback
(Ansi).
Log file (plain Record all of the activity in the SSH Shell (Rebex) session using a text
text) format.
CONNECTION INFORMATION
7.4.1.4 Telnet
DESCRIPTION
The actions for a Telnet session allows you to send remote commands to your host.
SETTINGS
OPTION DESCRIPTION
Clear Clear the scrolling display that precedes the current line.
Scrollback
START RECORDING
OPTION DESCRIPTION
Ansi Will record all of the activity in the SSH session using the Ansi format.
Recording This can be replayed like a video using Tools - Tools - Terminal
playback (Ansi).
Log file (plain Will record all of the activity in the SSH session using a text format.
text)
7.5 Edit
DESCRIPTION
The Edit tab contains operations to quickly Add, Edit, Overrides, Batch Edit or Export entries.
Ribbon - Edit
ADD
OPTION DESCRIPTION
New Entry Create a new entry (session, folder, information entry, credentials,
etc.).
Create Shortcut Link your entry to more than one group. For more information, consult
the text below.
A shortcut is the reiteration of an existing entry. In contrast to a duplicated entry, which has its
own ID and properties, a shortcut is a link to an entry and its properties. You can create shortcuts
easily by right-clicking the entry Edit – Create Shortcut or by using the aforementioned button in
the Edit tab. There are a few scenarios where a user would want to use the same entry
differently, such as connecting to two different hosts with a single RDP session.
Entries reiterated this way also have both folder paths indicated in their Folder field in their
properties, the paths are separated by a semi-colon.
There is no visual differences between the shortcut and the original entry.
Therefore, you’ll need to delete all entries to completely remove said entry. You
will be asked for confirmation when attempting to delete said shortcut.
EDIT
OPTION DESCRIPTION
The Play List feature in Remote Desktop Manager is a lot like a music play list. It opens a list of
entries, in a specific order, automatically.The Play List can be used to create groups of sessions
for a specific task or for security reasons. You can build your own Play List and start all entries
from a Play List at the same time.
SETTING OVERRIDES
OPTION DESCRIPTION
User Specific Override properties of the selected entry with settings with settings
Settings specific to the current user. For more information, please consult
the Specific Settings topic.
OPTION DESCRIPTION
Local Specific Override properties of the selected entry with settings specific to
Settings the local machine. For more information, please consult the
Specific Settings topic.
BATCH
OPTION DESCRIPTION
Edit (Special Perform special actions on the selected entries, such as change
Actions) the type, run a script, and more. For more information, please
consult the Batch Actions Samples.
Move to Vault Transfer the selected entries to another Vault in the database.
EXPORT
OPTION DESCRIPTION
Export Entry as Remote Export the selected entries in a Remote Desktop File
Desktop File (.rdp) (.rdp) format.
Export Selection (.rdm) Export the selected entries in a .rdm file that can then be
imported into any Remote Desktop Manager data source.
You could choose to include the credentials of your entry in
your export format and secure your file with a master key.
7.5.1 Edit
7.5.1.1 Play List
7.5.1.1.1 Create and Edit a Play List
DESCRIPTION
You can create Local or Shared play List in Remote Desktop Manager. There's several methods
to create or edit a Play List:
You can also use the context menu to create and edit your Play List. When your
entries are selected, right-click in the Navigation Pane and select Play List –
Create Play List or Add to Play List.
SETTINGS
You can access this by selecting Play List Management in the ribbon.
OPTION DESCRIPTION
Local The Play List is saved locally and can only be accessed as such.
These can only be launched through the Play List Management.
Shared The Play List is saved in the database. It can be accessed by anyone
on the data source. These can be launched through the Play List
Management or by using the entry itself.
Private Vault The Play List is saved in your Private Vault and can only be
accessed by the user. These can be launched through the Play List
Management or by using the entry itself.
ACTIONS
1. If you wish to pre-determine a list of entries, select them for your Play List in the Navigation
Pane.
2. On the Edit ribbon menu, click Play List, then select whichever setting you prefer.
OPTION DESCRIPTION
New Creates a new Play List directly, a window prompt will ask you where
you wish to save it and which selection you would like to highlight.
Create from Brings up the window for creating a new Play List with all currently
Opened Sessions opened session already selected for the Play List. You can select
and remove additional entries if desired.
Add Selection to Prompts a window where you can select currently accessible Play
Existing Play List Lists and adds the selection in the Navigation Pane to the Play List.
(X Entry)
3. Choose if you wish to save your Play List locally, in a shared Vault or in your Private Vault.
Saving it locally will prompt a different window. This window will contain everything needed for a
local Play List.
4. The next window lets you choose how you want your current selection or opened sessions to
affect your playlist.
OPTION DESCRIPTION
Selected Entries All currently selected entries in the Navigation Pane will already be
in Navigation selected for your Play List. You can still add and remove entries to
OPTION DESCRIPTION
Opened Tabbed All currently opened sessions (Embedded only) will already be
Sessions selected for your Play List. You can still add and remove entries to
the Play List if you desire.
And there you have it, your Play List is ready for use.
2. Select the Play List you wish to modify and click Edit.
If the Play List is shared or saved in your Private Vault, you can also right-click
the entry and click Properties to access it.
SETTINGS
First, open your Play List Management Edit – Play List – Play List Management.
Default Mode
OPTION DESCRIPTION
Open Embedded Overrides the display selection of entries inside the Play Lists and
launches them as Embedded (some entries might not support this).
Select in Selects all entries the Play List contains in the Navigation Pane.
Navigation Pane
Execute Script This will prompt for you to select the Typing Macro (exclusively) you
Against... wish to execute against your Play list.
Launch at startup Here you can select a specific Play List you would like launched
whenever the application starts. You can also default back to None
or Last opened Connections.
DESCRIPTION
Specific Settings are used to override the properties of an entry. Several settings can be
overridden, such as the credentials or the display mode. There are two types of Specific
Settings: user Specific Settings and local machine Specific Settings.
· User Specific Settings override an entry's properties for a single user.
· Local Specific Settings override an entry's properties for all users of a specific device.
This feature is only available when using an Advanced Data Source. A setting on
the data source allows usage of Specific Settings. Contact your administrator if
the menu is grayed out.
If both User Specific Settings and Local Specific Settings are defined on the
same entry, Local Specific Settings have the priority.
These can also be accessed by using the right-click on an entry and going to Edit
– User/Local Specific Settings.
An indicator icon is displayed in the dashboard when an entry with Specific Settings is
selected. Click on the icon to open the Specific Settings dialog.
WORKFLOW
In the majority of cases, editing the Specific Settings displays the following dialog:
Specific settings are context sensitive, and several settings might not be
available for some entry types.
7.5.3 Batch
7.5.3.1 Batch Edit
DESCRIPTION
The Batch Edit feature changes the settings of multiple entries in one operation. For example, it
can be used to remove or update the credentials of a group of sessions.
ADVANCED SELECTION
Select multiple entries by using the usual Ctrl/Shift + Left-click, etc. For a method with a little
more power, use the Advanced Search feature, which allows to select multiple entries at once,
based on the defined criteria. The advanced search is available in View – Advanced Search. If
required, you can achieve similar result with the Multi Vault Advanced Search.
Advanced Search
Press on Select in Navigation Pane to select the same entries as in the Advanced Search
dialog. Then use Edit – Batch Edit to edit all the selected entries.
SETTINGS
You can choose to change a specific setting, for instance, the Host name.
Clear all the existing credentials of all the selected sessions or specifically the password if
desired.
Edit Sessions (General Settings) allows you to change the common settings of all the selected
entries.
Change settings that are is available only for specific session types, such as Microsoft RDP.
Specific Settings can be modified in a batch if supported by the type of the edited entries.
7.6 View
DESCRIPTION
The View ribbon is used to control different feature regarding the views, layout and logs of
Remote Desktop Manager.
Ribbon - View
PANELS
OPTION DESCRIPTION
Vault Access the view mode for your Navigation Pane for the current Vault.
Opened Sessions Display the currently Opened Sessions in your Navigation Pane.
Favorites Display your Favorite entries and folder in your Navigation Pane.
VIEW
OPTION DESCRIPTION
Multi Vault This functions essentially the same way as Advanced Search, but it
Advanced Search searches all the Vaults of the database.
OPTION DESCRIPTION
Tab Groups Open a docked window to browse through the various Tab Groups.
LAYOUT
OPTION DESCRIPTION
Top Pane Toggle the Ribbon. (Right-click the Application header to bring it
(Ribbon/Menubar back or use Alt+F11).
)
Grouped Tab Bar Toggle the grouped tab bar. (Must have group tabs to work).
OPTION DESCRIPTION
FOOTER
The Footer section allows you to show or hide the various panes that are provided with Remote
Desktop Manager.
Although they are by default displayed in the footer, all those panes can be
dragged and docked anywhere within Remote Desktop Manager.
7.6.1 Panels
7.6.1.1 Task List
DESCRIPTION
Create a list of tasks to keep track of work that needs to be done by the team. You can perform
a search to filter out the list of displayed tasks. You can search by Due Date, username or by
Status.
Task lists can be exported in different types of files for printing or reviewing. Right-click the task
list to export in html, xls, xml or csv. You can also export filtered task lists.
Task list
This feature is only available for the following data sources: Devolutions
Password Server, MariaDB, MySQL, SQL Azure, SQL Server and SQLite.
CREATING A TASK
Add a task
2. Enter your task information, like the name of the task, the priority, the due date, the
description, etc.
Task Management
OPTION DESCRIPTION
Entry Displays the entry currently selected in the Navigation Pane. The
task is assigned to this entry. Read-only field.
OPTION DESCRIPTION
· Open
· Assigned
· In progress
· Closed
· Done
· Canceled
· Postponed
7.6.2 View
7.6.2.1 Activity Logs
DESCRIPTION
The shared session log offers a more robust solution. Through it, it's possible to monitor an
opened session for all users that are using an Advanced Data Sources. The log is available for
specific sessions in the context menu, in the session properties (Log tab page) and in the
dashboard.
SETTINGS
The log contains all the CRUD (add, edit and delete) operations, passwords being viewed,
credentials being used by other sessions, etc...
OPTION DESCRIPTION
Message Indicate the action that was done on your entry or session.
On Open The Open Comment is defined in the Log tab of your session, to learn
Comment more please see Logs Options
On Close The Close Comment is defined in the Log tab of your session, to learn
Comment more please see Logs Options
Log Date Indicate the date and time your session was opened or your entry was
edited.
End Indicate the date and time when the session or entry was closed.
Date/Time
Active Time Only available for sessions in embedded mode. It will record your session
active time, meaning the time your session was opened in embedded
mode and you were active in your session. If your session is opened but
OPTION DESCRIPTION
your view is on your Dashboard tab and not on your session tab, no Active
Time will be recorded.
Duration Only available for sessions in embedded mode. When sessions are
opened in embedded mode the Duration time will be recorded, meaning
that even if your view is on your Dashboard and you are not actively
working in your session but your session tab is opened, Duration will
record how long it was opened for.
DESCRIPTION
The Advanced Search allows to search for entries based on multiple criterias.
SETTINGS
OPTION DESCRIPTION
Name You can select between different criteria to tweak your search:
· Name
· Connection type
· Contact Reference
· Creation date
· Custom field
· Description
OPTION DESCRIPTION
· Domain
· Group
· Host
· Is favourite
· Keywords/tags
· Name
· OS
· Password strength
· Security group
· Status
· Username
Save Allows you to save your search locally and reuse it.
Save as Use to save a previously saved search but under another name.
Export Export the entries of your search result as a Csv, Html, Xls or Xml
file. Sensitive information will be encrypted using AES.
Search Once you have selected your search criteria click on Search to
display the search result.
OPTION DESCRIPTION
Select in Select your search result in your Navigation Pane. This option can
Navigation Pane be used in combination with a Batch Edit.
There will be a drop-down list next to certain fields (ex: Name) to give you search options for:
· Contains - any name that includes the characters you have entered, anywhere in the field name.
· Starts With - any name beginning with the characters you have entered.
· Ends With - any name ending with the characters you have entered.
· Exact Expression - will find names that match every character you have entered, exactly as entered.
DESCRIPTION
USER INTERFACE
Documentation search
USER INTERFACE
ELEMENTS DESCRIPTION
Drop down menu Page title; When one entry contains multiple documentation pages
(3) with the search term, a list of the page titles is available.
SELECT AN ENTRY
Click Select in Navigation Pane to choose the entry in your main tree view.
CLEAR A SEARCH
7.7 Administration
DESCRIPTION
The Administration tab allows to manage settings and users of a data source, view reports
such as the activity logs, and much more. This tab is only available to administrators of the data
source.
Most features contained in the Administration tab are only available when using
an Advanced Data Source.
Ribbon - Administration
MANAGEMENT
OPTION DESCRIPTION
Security Groups Security Groups are now a Legacy option, and although we have left
(Legacy) documentation in the online help to help users identify it, we strongly
recommend switching to Roles instead.
REPORTS
OPTION DESCRIPTION
Reports Open the Reports section to select which type of report best suit your
current needs.
Deleted Entries Open a log of all Deleted Entries (since last clean up).
SETTINGS
OPTION DESCRIPTION
Vault Settings Opens the Vault Settings. The Vault Root Folder is the one at the top
of the navigation pane (in Tree View). It is the one from which all
entries and folder stem. By default, lower level folders inherit settings
and security from parent folder until reaching the vault root. Therefore,
using permissions on the vault root folder allows to secure all entries
below the vault root level. Refer to Default security for entries for
more information.
System Settings Opens the System Settings. There are many features here, all meant
(Data Source to help you customize your data source and security needs.
Settings) Remember that these settings applies to all users that have access
to the data source.
CLEAN UP
OPTION DESCRIPTION
Clean Up Activity Perform a partial or full clean up of the Activity Logs. You also have
Logs the option to clean up the Administration Logs if desired.
Pack Data Source The Pack Data Source (Optimize) feature analyzes all entries,
(Optimize) compress and save them, thus saving space in your data source.
7.7.1 Management
7.7.1.1 User Management
DESCRIPTION
The Users Management allows to create and manage users and their privileges. You can set
the default privileges on the user type in Data Source Settings (System Settings). Remote
Desktop Manager offers advanced user rights management that allows for restricting access to
entries. Please note that availability of some features depends on the active data source.
A user can be created using default security (specify the password) or Integrated
Security. Not all Advanced Data Sources support the use of Integrated Security.
In order to create users and assign rights, you must be administrator of not only
Remote Desktop Manager, but also of the underlying database.
MANAGE USERS
To create, edit, delete, rename or otherwise manage users as a whole, simply use the buttons in
the toolbar.
GENERAL
OPTION DESCRIPTION
Username Enter the username for the user. When using Integrated
Security the user must be selected from the directory.
Password Enter the user's Password. This field is disabled when using
Integrated Security.
OPTION DESCRIPTION
· Read only user: Grant only the view access to the user.
· User: Grant all basic rights to the user (Add, Edit, Delete).
User license type Select the license type of the user. Select between:
· Default
· Connection Management
· Password Management
Full name Enter the First name and Last name of the user.
INFORMATION
The Information section allows to store information regarding the users, such as their name,
address, and more. The Information section is divided in three sub-sections: Details, Address,
Phone.
ROLES
OPTION DESCRIPTION
Roles Check the Is Member box to assign the role to the user.
Consult Role Management topic for more information.
PRIVILEGES
OPTION DESCRIPTION
The import menu (File – Import) and the import feature in the
context menu will be grayed out if the option is not active.
OPTION DESCRIPTION
The export menu (File – Export) and the export feature in the
context menu will be grayed out if the option is not active.
Security Groups are a legacy setting, we strongly recommend switching over to Roles instead.
VAULTS
Select which repositories the user has access to. For more information, please consult the
Vaults topic.
APPLICATION ACCESS
The application access section allows to restrain access to Remote Desktop Manager or
Devolutions Web Login.
OPTION DESCRIPTION
Remote Desktop Select if the user can access to the data source from Remote
Manager Desktop Manager.
Devolutions Web Select if the user can access to the data source form Devolutions
Login Web Login.
SETTINGS
Allow the user to enable the Offline Mode on the data sources. This also depends on the data
source being configured to allow it. There are 4 modes available:
OPTION DESCRIPTION
Cache only Allow to save a cache of the data source but not the offline mode.
Read-only A read-only cache. The user will not be able to edit data in the data
source. This mode is allowed for Advanced Data Sources only.
DESCRIPTION
When creating users in Remote Desktop Manager, four types of user are available. Basic rights
are granted to the created users depending on their type.
TYPE DESCRIPTION
User Grant all the basic rights to the user (Add, Edit, Delete).
For more information, please consult the Rights section below in this
topic.
Read only user Grant only the view access to the user.
RIGHTS
When setting a user to the Restricted User type, rights must be granted manually. These rights
have an immediate influence on which actions the user can perform on unsecured entries.
Therefore, rights must be granted for users to be able to perform actions on entries, as
permissions cannot override the absence of right.
Once rights are granted, they can be restricted with the Role-Based Security or Security Groups.
The Add right also displays the Add in root option. This must be enable for users to be able to
add entries into the vault root folder of the data source.
DESCRIPTION
Integrated Security is a Microsoft technology, which uses the credentials of the current Windows
session and send them automatically to the remote resources for authentication.
This feature is available with the SQL Server or Devolutions Password Server
data sources.
SETTINGS
To use the Integrated Security, enable the Integrated Security box in the User Management
window. The Password field is disabled because the operating system will provide a cached
copy automatically.
Integrated Security
When the option is activated, an ellipsis button either appears or is enabled. Click this button to
display the Select User dialog.
Select User
Ensure the appropriate domain is displayed in the From this location field.
Sometime the location defaults to the local computer. Click the Locations button
to browse for the domain instead.
When using Integrated Security, the currently running windows session must be from a user of
the domain. If you need to use other credentials, Remote Desktop Manager must be started
using the RUNAS command as described in Running Remote Desktop Manager as Another
User.
7.7.1.1.3 TLS Options
DESCRIPTION
MySQL and MariaDB databases can verify X509 certificate attributes alongside the usual
authentication method.
For more information on TLS options, please consult the following topics:
· MySQL GRANT syntax (Other Account Characteristics)
CONFIGURATION
OPTION DESCRIPTION
REQUIRE X509 Allow the connection only with valid X509 certificate.
DESCRIPTION
Roles in Remote Desktop Manager manages multiple users at the same time by grouping them.
The management of permissions granted to roles are quite similar to the corresponding notions
for users, but instead of a single user, they apply to all users to which you've assigned the role.
Roles in Devolutions Password Server are in fact links to Active Directory groups. By leveraging
Active Directory integration you can easily define access rights for all domain users in your
organization. Once a domain user log in the Devolutions Password Server data source, their
user account will be created if needed and users rights will be controlled by the defined groups.
Please note that the Unsecured group permissions (the ones above the grid) are
ignored. You must set them on each user individually.
For more information please see Devolutions Password Server Role Management.
CREATE ROLES
Roles in Remote Desktop Manager are mainly used to group users. You can assign multiple
roles to each user. The end result is the union of all permissions given to the roles.
To create a role, in the User and Security Management window, click the Add User button in
the Roles section. From the same menu, you can also edit, assign users, delete or refresh.
7.7.2 Reports
7.7.2.1 Reports
DESCRIPTION
The Reports section automatically generates reports detailing Remote Desktop Manager
usage related to: Entries, Expired Assets, Passwords, Security and Users. You have the option
to export your generated report, as well as executing and exporting reports through a command
line.
Generate Report
From this window, you can browse and select a wide variety of Report Types. Explore to your
heart's content.
Once Generated, a report will provide you with all the information you selected during this step.
These final results can take various shapes and have different features (such as editing a
specific entry or printing the result) depending on what the report actually is.
These logs are still restricted by user rights. A user with restricted access wouldn't
be able to select Password and Security for example.
DESCRIPTION
The Export Reports is a way to execute and export reports through a command line. You can use
this feature in a shortcut or in a batch file and use the Windows task scheduler to execute it.
You will be able to export Data Report, Inventory report as well as most of the reports found in
our Generate Report list except for the Password Usage and Security Group.
You must have the rights to run report in Remote Desktop Manager to use this
feature.
SETTINGS
For Reports containing settings, you will have to start with exporting your report settings to create
the *.rdr file that the command line use to generate the reports. Here is a list of reports
containing settings:
1. Select your Report in Administrations – Report and then select the option Export Settings
in the More text button. It will create an *.rdr file containing all your report settings. This is also
where you Report ID is located (this will be useful later on).
Export Settings
PARAMETERS DESCRIPTION
C:\ Enter the path used to start your Remote Desktop Manager
application (path of the RemoteDesktopManager.exe file)
/reportoutput Specify the path to save your report and the name for the newly
generated report.
To find your Data Source ID and the Command Line use to start Remote Desktop Manager edit
one of your session from your data source and select the Advanced section.
Here is a list of types of Reports you can find in Remote Desktop Manager and the name to
enter in the command line to generate the report:
DESCRIPTION
The Administration – View deleted option allows you to view the deleted entries as well as
restoring them.
For architectural reasons, the documents stored in our Advanced Data Sources
are NOT protected from deletions. Once they are deleted, they cannot be
restored. Please keep a safe copy of all documents in another storage device.
Support for this feature will be added in a coming update to our products.
Sub-connections are not retained in the View Deleted window. To restore a sub-
connection, please have a look at Entry History.
SETTINGS
The Deleted Entries will generate a list containing all the entries previously deleted from your
data source. You may resurrect an entry, meaning it will become an active entry again and will be
shown in your data source. You may also chose to permanently delete your entries, once you
have permanently deleted your entries you won't be able to resurrect them afterward.
Deleted Entries
OPTION DESCRIPTION
Deleted entries can be resurrected as long as the Security Provider has not been
changed since the deleted action.
You can use the Right-click button on one or several lines to export them in CSV, HTML or XML
format.
7.7.3 Settings
7.7.3.1 Root (Settings)
7.7.3.1.1 Default security for entries
DESCRIPTION
In the vault settings, navigate to the Permissions section. Under Inherited Permissions,
change the Permission drop down list to the desired settings.
For more information on the discrete permissions, please consult the Security – Permissions
topic.
Vault – Permissions
To confirm the change, edit an entry below the vault root and navigate to the Security –
Permissions section. All permissions set to Default inherit the value from Data Source
Permissions (System Permissions) or the user. Inherited values are displayed next to the
permissions.
7.7.3.2 System Settings
7.7.3.2.1 General
GENERAL
The General section allows to manage the availability of different features related to the
database.
These settings applies to all users that have access to the data source.
GENERAL DESCRIPTION
Allow database Allows logs and deleted history to be cleaned up. For more
clean up information, please consult the Clean up topic.
Allow shortcuts Allow the reiteration of entries through the shortcut feature.
Allow virtual folders Allow to store entries in virtual folders. (Not supported with
Devolutions Password Server.)
Automatic check in Forces checked out entries to check in automatically after a set
after delay.
Add entry mode Select if users are prompted to choose a template when creating
a new entry. Select between:
· Default
· No template selection
COMMENTS DESCRIPTION
Allow log Enable the log comment editing for all users.
comments editing
COMMENTS DESCRIPTION
Minimum length Set the minimum length (in characters) allowed for comments.
(char)
Maximum file size Limit the size of attachments and document entries to avoid to
(MB) over load the data source.
7.7.3.2.1.1 Security
SETTINGS
Create Vault with Automatically secure the vault settings when creating a
restricted access by repository. Therefore, the permissions settings are set to
default Never.
Force data source 2- Require the users to have a 2-factor configuration applied on
factor configuration the data source. Not shown with Devolutions Password Server
as 2FA set elsewhere.
Use legacy security Use the old system of managing privileges: security groups.
Time of day Select the hours which the data source is limited to. Select
between:
Time of week Select which days the data source is available for. Select
between:
· Any day: the session can be used any day of the week or
week-end.
· Week days: the session can be used only the week days.
· Week ends: the session can be used only the week ends.
Time Zone Select the time zone you are currently in.
DESCRIPTION
Accessing passwords stored in your data source by querying the underlying database is not
possible because of the encryption we apply on the passwords. For those of you that need to
access passwords directly in the database, for example by a CRM system, we have created a
way to achieve this.
SETTINGS
The session information, which is an XML structure, is stored in the Data field of the
Connections table in the underlying database.
However, getting the encrypted password from the database requires the Allow password for
external system to be configured.
Enter an encryption key in the Key field. Once a key is provided it will cause the system to
extract a copy of the password from our XML structure, this will then be re-encrypted using the
key you have provided and stored back into the UnsafePassword field of the Connections
table.
Security Provider
DECRYPTION CODE
try
{
TripleDESCryptoServiceProvider tripleDesCryptoServiceProvider = new TripleDESCrypt
MD5CryptoServiceProvider cryptoServiceProvider = new MD5CryptoServiceProvider();
tripleDesCryptoServiceProvider.Key = byteHash;
tripleDesCryptoServiceProvider.Mode = CipherMode.ECB;
string strDecrypted =
Encoding.UTF8.GetString(
tripleDesCryptoServiceProvider.CreateDecryptor().TransformFinalBlock(
byteBuff, 0, byteBuff.Length));
return strDecrypted;
}
catch (Exception)
{
return null;
}
}
7.7.3.2.2 Application
DESCRIPTION
The Applications section manages the availability of different features related to Remote
Desktop Manager application.
Operating systems Enable access to the data source from the selected operating
systems.
GENERAL DESCRIPTION
Disable entry drag-and- Disable entries drag and drop from one folder to another. This
drop setting is useful for avoiding accidental drag and drop.
GENERAL DESCRIPTION
Disable quick connect Disable the Quick Connect feature for all users of the data
source.
Disable RDM Agent and Disable the option to activate a session as an RDM Agent or
Jump Jump.
Disable stack trace Disable the stack trace details when an error occurs in
Remote Desktop Manager. This is a security feature.
PASSWORD DESCRIPTION
Disable password Prevent users to save or change the passwords stored in the
saving for data source data source configurations.
access
Use web or html Enter an URL to use as the application's welcome page.
welcome page
SECURITY DESCRIPTION
SECURITY DESCRIPTION
7.7.3.2.2.1 Offline
DESCRIPTION
OPTION DESCRIPTION
Offline mode Set the global data source Offline Mode availability. The offline
mode is useful when using a VPN connection that makes using
local network impossible.
Expiration Number of days before the offline cache expires. You must go
online prior to the end of that period to re-validate the data.
Prompt for Force the user to provide their credentials before going offline.
credentials before
going offline
Prompt for 2FA Force the user to provide their 2FA before going offline.
before going offline
DESCRIPTION
Store an Enterprise Edition Site or Global License serial to share in the data source.
When you add a data source with a saved serial in an unregistered version of
Remote Desktop Manager, the license serial is automatically retrieved from
data source settings.
SETTINGS
You can manage your licenses through a shortcut in Administration - System settings - Serial
Number.
SETTINGS
OPTION DESCRIPTION
Type Select entry types to exclude. Excluded entries will not be in the Add
Availability New Entry window.
DESCRIPTION
The Version Management allows the administrators to manage the data source availability in
other versions of Remote Desktop Manager.
Version Management
OPTION DESCRIPTION
Minimal version Forces users of the data source to use a minimal version
of Remote Desktop Manager. Enter the entire version
number (2019.1.0.0) to force a specific version. Use this
to disable connecting to the data source with an older
version.
Minimal version custom Enter a custom message for the minimal version
message notification.
OPTION DESCRIPTION
Maximal version custom Enter a custom message for the maximal version
message notification.
Disable auto update Disable the auto update notification message. Use this to
notification manually update the application and prevent from getting
notified when new versions are available.
DESCRIPTION
The System Permissions allows to grant some administrative permissions to standard users
without making them administrators. The Default setting inherits the permission set on the user
or role. For more information about permissions, consult General Security.
ENTRIES
OPTION DESCRIPTION
MISCELLANEOUS
OPTION DESCRIPTION
View deleted entries Allow users/roles to view and restore deleted entries.
Check in (force) Allow users/roles to check in entries with the checked out state.
TOOLS
OPTION DESCRIPTION
MANAGEMENT
OPTION DESCRIPTION
OPTION DESCRIPTION
DESCRIPTION
The Security Provider allows for encrypting the data source content. To access the security
provider, navigate to Administration – Security Provider.
By using a security provider, you ensure that nobody can read entries
configuration data, even when people have a direct access to the database(s) or
a backup. Shared data sources should always be secured with a security
provider especially Devolutions Online Database.
Prior to applying a new or changing an existing security provider, make sure that
every users are disconnected from the data source. If you are changing an
existing Shared Passphrase or Certificate, please note that users will get back
access to the data source when they the new Shared Passphrase or Certificate
on their computer.
SETTINGS
Please note that changing a security provider on a data source with a great
number of entries is a lengthy operation.
Applying a new security provider does process the whole database, therefore we
advise you to create a backup prior to this operation.
Security Provider
Security Type
OPTION DESCRIPTION
Default This is the legacy security provider. The data is encrypted if the entry
configuration is set accordingly in the advanced settings of the entries.
SHARED PASSPHRASE
If the passphrase is lost, nothing that can be done to recover the data. When
using a passphrase, always copy it to a secure location.
Entries configuration data is encrypted using a mix of a key stored in Remote Desktop Manager
and the passphrase you've entered.
The passphrase is required only when configuring the data source. A policy can be enabled to
always prompt for the passphrase when connecting to the data source. For more information,
please consult the How to modify Group Policy Templates topic.
CERTIFICATE
When choosing Certificate as Security Provider, entries configuration data is encrypted using a
mix of a key stored in Remote Desktop Manager and the private key contained in the certificate.
OPTION DESCRIPTION
· Current user
· Local machine
· Address book
· Authorization root
· Certificate authority
· Disallowed
· My
· Root
· Trusted people
· Trusted publisher
OPTION DESCRIPTION
CREATE CERTIFICATE
OPTION DESCRIPTION
Key size (bits) Indicate the key size (bits) of the certificate. Select between:
OPTION DESCRIPTION
· 384
· 512
· 1024
· 2048
· 4096
· 8192
· 16384
Save to file Save the certificate as a pfx file and secure this certificate with a
(pfx) password.
Save to Indicate the location and the store to save the certificate.
certificate store
7.7.4 Clean up
7.7.4.1 Clean Up Deleted History
DESCRIPTION
The Deleted History permanently delete entries that had been previously deleted. Full history is
always preserved because every entry "version" is kept in historical tables.
SETTINGS
1. Select prior to which date you wish to permanently delete your deleted entries.
Confirmation window
DESCRIPTION
The Entry History deletes the history attached to your entry, you can find the history by right
clicking on your entry and selecting View – Entry history.
SETTINGS
1. Select prior to which date you wish to permanently delete your Clean up entry history.
2. Another window will appear to confirm your choice of deleting all the history prior to the
chosen date.
Confirmation window
DESCRIPTION
The Clean Up Activity Logs will delete your data source's Activity Logs, you also have the
option to clean up the Administration logs and set up a back up if desired..
SETTINGS
1. You must confirm your choice prior to permanently deleting your data source logs.
A backup of your log will be created as an XML file although it will then be
impossible to import this file in Remote Desktop Manager.
2. Once you have entered your Backup file name and proceeded with the clean up a delete log
result window will appear.
DESCRIPTION
When holding a great number of entries in your data source it is a best practice to compress
them to avoid slowness issues when using your data source. The Data Source (Optimize) will
analyze all your entries, compress them and then re-saves them, thus saving space in your data
source.
SETTINGS
1. Open the data source you wish to optimize. In Administration click on Pack Data Source
(Optimize) and then click on Analyze.
2. Once the Analyze is completed click on Optimize to proceed with the optimization of your
data source. You can select which Vault you wish to Analyze and Optimize, or use the
Optimize All feature to perform the Optimize action on all available Vaults.
7.8 Tools
DESCRIPTION
The Tools tab contains your Add-on and Extensions manager as well as your Devolutions
Password Server Console, Generators and multiple useful tools.
Ribbon - Tools
GENERATORS
OPTION DESCRIPTION
Password Opens the Password Generator window. You can use this to
Generator generate password according to pre-determined criteria for better
security.
SSH Key Launches the SSH Key Generator. SSH keys provide a secure way
Generator of logging into a virtual private server with SSH than using a
password alone.
Certificate Launches the Certificate Generator. With this you can create a self-
Generator signed certificate, which is an identity certificate that is signed by the
same entity whose identity is certified.
Port Generator Launches the Port Generator. With this you can generate ports for
your connections.
TOOLS
OPTION DESCRIPTION
Password Opens the Password Analyzer. This is used to evaluate the strength
Analyzer of passwords stored in the data source. This feature is restricted to
Administrators only.
Key Agent Opens the Key Agent Manager. This is used to hold all your SSH
Manager Keys in memory, already decoded and ready for them to be used.
OPTION DESCRIPTION
More Tools The More Tools window contains a variety of application tools such
as: Chocolatey Console, Local RDP/RemoteApp Manager,
Playback (Ansi), RDM Agent and more.
MANAGERS
OPTION DESCRIPTION
Add-on Manager Opens the Add-on Manager. It is used to simplify the management of
different add-ons.
7.8.1 Generators
7.8.1.1 Passw ord Generator
DESCRIPTION
The Password Generator is available in the Tools – Password Generator menu. It allows to
create random passwords that are and difficult to interpret or predict, due to a mix of uppercase
and lowercase letters, numbers and punctuation symbols.
You can also create password generator templates to generate passwords. After you have
selected your mode and settings, you can then create your template.
MODE
DEFAULT
ADVANCED SETTINGS
READABLE PASSWORD
Generate passwords that are readable but are not actual words.
USE A PATTERN
Press the button and select any pattern you need to create the passwords, you can also
exclude certain characters if desired. A list of the most recent used pattern will also be created.
Bracket b ()[]{}<>
Lower-Case c bcdfghjklmnpqrstvwxyz
Consonant
Digit d 123456789
Punctuation p ,.;:
Upper-Case z BCDFGHJKLMNPQRSTVWXYZ
Consonant
PRONOUNCEABLE PASSWORD
Generate passwords that are pronounceable, but are not actual words.
STRONG PASSWORD
DESCRIPTION
SSH keys provide a secure way of logging into a virtual private server with SSH than using a
password alone. While a password can eventually be cracked with a brute force attack, SSH
keys are nearly impossible to decipher by brute force alone.
SETTINGS
OPTION DESCRIPTION
Key size You can choose your SSH Key size between:
OPTION DESCRIPTION
Comment Enter your username and the name of the computer you're
transferring your key to.
Load Private Key This feature will allow you to import a previously saved SSH Key.
Save Public Key Saving the public key will generate a *.pub file. Simply enter a
file name when prompted.
Save Private Key You will have the option of saving your Private Key in different
format, choose between:
If you did not specify a passphrase you will have to confirm that you do not wish to use a
passphrase.
If using the Key Agent Manager you must chose the PuTTY Private Key (.ppk) file
format or the OpenSSH Private Key (.pri) file format. The PKCS Private Key is not
a supported file format for the Key Agent Manager.
DESCRIPTION
The Certificate Generator allows you to create a self signed certificate which is an identity
certificate that is signed by the same entity whose identity is certified.
SETTINGS
OPTION DESCRIPTION
Key size (bits) Indicates the key size (bits) of the certificate. Select between:
· 1024
· 2048
· 4096
· 8192
OPTION DESCRIPTION
· 16384
Save to file Save the certificate into a *.pfx file and secure this certificate with a
(pfx) password.
Save to Indicate the location and the store to save the certificate.
certificate store
· Current user
· Local machine
· Address book
· Authorization root
· Certificate authority
· Disallowed
· My
· Root
· Trusted people
· Trusted publisher
OPTION DESCRIPTION
Browse Store Browse the store that is indicated in the store field.
DESCRIPTION
The Port Generator allows you to generate ports for your connections.
SETTINGS
Port Generator
OPTION DESCRIPTION
Include well known Include ports from range 0 to 1023. They are the well-known
ports ports or system ports. They are used by system processes
that provide widely used types of network services
OPTION DESCRIPTION
Include registered ports Include ports from range 1024 to 49151. They are assigned
by IANA for specific service upon application by a requesting
entity. On most systems, registered ports can be used by
ordinary users.
Include ports used by Include the ports that are already used by other sessions.
others sessions
7.8.2 Tools
7.8.2.1 Passw ord Analyzer
DESCRIPTION
The information in this topic is how the "Legacy" mode of password analysis
works. The mode can be changed in the System Settings for ZXCVBN . The
"Legacy" mode is not the default mode.
The Password Analyzer evaluates the strength of passwords stored in the data source. To
access the password analyzer, navigate to Tools – Password Analyzer.
A password analyzer control is also displayed under most password fields of entries.
The password analyzer follows a set of rules to determine the strength of the password with a
score from 0 to 100. There are two categories of rules.
REINFORCE
WEAKENING
SETTINGS
OPTION DESCRIPTION
Show all Shows you all the entries in your session, including those without
password.
DESCRIPTION
The Key Agent Manager is used to hold all your SSH Keys in memory, already decoded and
ready for them to be used. It has the same use as Pageant (SSH Key Manager) has for Putty
except that the Key Agent Manager is used with Remote Desktop Manager.
SETTINGS
1. When opening the Key Agent Manager you will notice at the bottom right that the agent is not
running you will need to click on Start Agent. If you wish to always have your Key Agent running
you can activate the option in File – Option – Key Agent – Start agent on application start.
2. Click on Add key and select the file to open your SSH key.
3. All your added SSH Key will appear in your Key Agent Manager.
4. In your SSH Shell Session in the General tab enter a Username and leave the Password field
blank.
5. In the Private Key tab of your SSH Shell session leave the option for the Private Key to No
Private Key.
6. In the Advanced tab of your SSH Shell session activate the option Use Agent. The Use
Agent automatically take the information of the SSH Key kept in your Key Agent Manager.
When creating new Private Key credential entry in Remote Desktop Manager you have the
option of loading them automatically in your Key Agent Manager.
2. In the Advanced tab of your Private Key entry activate the option Automatically load to key
agent.
DESCRIPTION
The PowerShell (RDM CmLet) automatically opens an embedded PowerShell window. RDM
snap-in allows for quick and robust automation of actions such as add/edit/open of sessions, the
possibilities are endless.
Since its release, this highly-requested feature has become very useful in solving user requests.
A quick search through our forum reveals many usages of the cmdlets, such as automating the
creation of Windows Start Menu shortcuts for every RDM session.
To learn more, you can find full RDM cmdlet documentation available via the PowerShell
Scripting topic or directly in PowerShell using the Get-Help cmdlet.
SETTINGS
You will find on the Forum multiple PowerShell script to import edit or interact with the Remote
Desktop Manager data.
PowerShell
DESCRIPTION
Wayk Now helps you provide remote assistance to others by allowing one user to connect to
another person's computer. It is a Devolutions product that is integrated with Remote Desktop
Manager.
Wayk Now
For more information about using Wayk Now consult the Wayk Now Online Help.
7.8.2.5 More Tools
7.8.2.5.1 Chocolatey Console
DESCRIPTION
The Chocolatey Console is available in the Tools – More Tools - Chocolatey Console menu.
It allows you to install all the supported applications from Chocolatey directly from Remote
Desktop Manager.
SETTINGS
Chocolatey Console
OPTION DESCRIPTION
USAGE
Installation window
When the installation is completed you will see a check mark in the Installed column.
Installation Complete
DESCRIPTION
The local RDP settings and the RemoteApp settings are available from Tools – More Tools -
Local RDP/RemoteApp Manager.
If you run Remote Desktop Manager on a Windows Server 2008 machine the TS RemoteApp
MMC console will be launched.
If you are running on Windows Vista, the RemoteApp console built into Remote Desktop
Manager will be launched because RemoteApp functionality is available in Windows 7 but not
the MMC console. Therefore instead of having to modify the required registry entries you can
use the Remote Desktop Manager RemoteApp Manager.
SETTINGS
REMOTE DESKTOP
REMOTEAPP SETTINGS
RemoteApp Settings
UDP SETTINGS
Enable or disable UDP (User Datagram Protocol) locally on your computer. UDP is a
communication protocol that offers a limited amount of service when messages are exchanged
between computers in a network that uses the Internet Protocol (IP).
USAGE
3. Create a new RDP session and select the Programs tab. Enable the Use RemoteApp
option and then enter the name of the RemoteApp program and save the session. When the
session is launched you will have the RemoteApp running locally.
DESCRIPTION
SETTINGS
OPTION DESCRIPTION
Select the ansi file you wish to open in the Terminal Playback.
OPTIONS
OPTION DESCRIPTION
Auto wrap Indicate what happen when text reaches the right-hand edge of
the window. Select between:
· On
· Off
· Dos
Backspace wrap This option allows you to choose what you want to do when you
press backspace. Some terminals believe that the backspace
key should send the same thing to the server as Control-H
(ASCII code 8). Other terminals believe that the backspace key
should send ASCII code 127 (usually known as Control-?) so
that it can be distinguished from Control-H. Select between:
OPTION DESCRIPTION
· On
· Off
· Dos
Ignore Substitute Ignore the substitute character that can be use in Putty.
character
Implicit Carriage Most servers send two control characters, CR and LF, to start a
return in Linefeed new line on the screen. The CR character makes the cursor
return to the left-hand side of the screen. The LF character
makes the cursor move one line down (and might make the
screen scroll).
Some servers only send LF, and expect the terminal to move
the cursor over to the left automatically. If you come across a
server that does this, you will see a stepped effect on the
screen. If this happens to you, try enabling the option and things
might go back to normal.
7.8.2.5.4 RDM Agent
DESCRIPTION
The Remote Desktop Manager Agent is a very powerful tool that allows commands to be run
on multiple machines.
SETTINGS
To launch a script through the RDM Agent, you first need to open an RDP connection to all the
machines you wish to execute the script on. Once opened, select all the opened sessions in the
Navigation Pane, right-click them and select Execute Script via Agent.
Execute script via Agent only needs the RDM Agent when the script is executed
from the Quick Script tab. RDM needs to be fully installed on the remote
computer when the script is executed from the Scripts/Tools tab.
OPTION DESCRIPTION
OPTION DESCRIPTION
Use Default Use the default working directory when connect to the session.
Working directory
Keep open Keep the window open after the execution of the command line.
OPTION DESCRIPTION
OPTION DESCRIPTION
Use Default Use the default working directory when connect to the session.
Working directory
OPTION DESCRIPTION
Scripts/Tool Select a script or a tool session that you have already created in Remote
s Desktop Manager.
SCRIPT/TOOLS
Scripts/Tools
Search for a script or a tool you wish to execute through the RDM Agent.
SETTINGS
Advanced
OPTION DESCRIPTION
Open all When multiple sessions are selected to Execute Script Via Agent, it
connections will open all the selected connections.
Delay Enter the time delay between opening each selected session.
AGENT STATUS
Open a RDP session, right-click on this single session and select Agent Status. The Agent
Status will show you that Remote Desktop Manager is installed on the remote computer or not,
that the Remote Desktop Manager Agent is active or not and how many Remote Desktop
Manager Jump sessions are opened.
Agent Status
7.9 Help
DESCRIPTION
The Help tab contain links to the Devolutions forum and Online Help, and many support related
features, such as the Application Logs, the Profiler, and the Recorder.
Ribbon - Help
HELP
OPTION DESCRIPTION
Online Help Launches the Online Help you are currently browsing!
OPTION DESCRIPTION
Register Product Register the Remote Desktop Manager with a Trial or Enterprise
license serial. For more information, please consult the Register
Enterprise Edition topic.
Blog Visit our Blog. Learn about the Devolutions Team, as well as our
Goals, Products and more.
SUPPORT
OPTION DESCRIPTION
Record Use the Recorder. Used to help our Devolutions Support team
troubleshoot the problem
Submit a Support Submit a Support Ticket. Help us make your experience better by
Ticket reporting experience issues or by asking for new features.
Visit our Forum Visit our Forum. You can create an account and experience the
bleeding edge of our customer support.
Change History Send you directly to our Remote Desktop Manager web page to view
the new features and enhancements when a new version is release.
ABOUT
OPTION DESCRIPTION
7.9.1 Support
7.9.1.1 Application Log
DESCRIPTION
When encountering errors, you can verify the local application log, which is available in Help –
Application Logs.
REPORT
A report of the logs can be saved in a text file as well. Simply navigate to the Report tab of the
application log, then click on the Save button to select a location to save the file.
CLEAN UP
For security reason, it is a best practice is to clean up the application log once every month. To
do so, in the application log, use the Clean Up feature.
We strongly recommend to do a Delete all, but this can be customized to delete specific logs by
type, date or selection.
When experiencing issues with Remote Desktop Manager our support team might ask you to
increase the debug level of the application during the support process. We strongly suggest to
only increase the debug level when requested by our support team.
7.9.1.2 Diagnostic
DESCRIPTION
If you encounter a problem with Remote Desktop Manager, you can run a system diagnostic,
which is available in Help – Diagnostic. This could help diagnose or give a pointer to what kind
of issues you might be experiencing.
SYSTEM
The administrator item could be the possible source for security problem. This happen often
when a user has the SYSDBA or is DB_OWNER of the SQL Server database.
Some other issues could be related to the fact that the application is running in Remote Desktop
Services. However Remote Desktop Manager is fully compatible with Remote Desktop
Services.
FIPS related issues and solutions can be found in the specific FIPS (Encryption) troubleshooting
section.
If you have a Remote Desktop Manager Jump configured you can run a test of your Jump host by
clicking on Jump Test.
DATA SOURCE
The Data Source tab contains information regarding the current data source, such as the
number of entries it contains, the size of your data source, the number of custom images and the
offline state.
Too many custom images could dramatically increase the size of the data source
and cause load time issue.
POLICY
The Policy tab display the list of Group Policy Templates to see if any of them has been applied.
7.9.1.3 Profiler
DESCRIPTION
Remote Desktop Manager has a built-in profiler to diagnose connectivity issues with a data
source.
Displaying the Profiler window might slow down the operations on the data
source. Proceed with care.
To diagnose startup issues, you can enable the profiler from the command line as
described in Command Line Arguments
PROCEDURE
Holding the Ctrl key while performing the refresh should force a full reload of the
data source, recreating the offline cache.
Performance Profiling
3. Click on Send Trace to Support in order to send the Profiler data logs to our Devolutions
support team. You can add a Marker when running multiple tests to separate them.
DEBUG ONLY
To learn more about the Debug only tab please see the Debugging topic.
Debug only
7.9.1.4 Record
DESCRIPTION
If you are experiencing issues with Remote Desktop Manager, you can help our Devolutions
Support team troubleshoot the problem by sending them a short video of your issue. Launch this
by using the Record feature located in the menu Help – Record.
The Record is an easy-to-use built-in screen recorder that could even be a useful for your in-
house training as it is not limited to Remote Desktop Manager.
SETTINGS
The Video Recording Options uses the MP4 format, which on Vanilla installs of Windows is not
supported. If you encounter any difficulty viewing the video we strongly suggest the use of a VLC
player.
8.1 Overview
Advanced users, other browser extensions, or even JavaScript injection can all
result in the password being read from the password edit control, even if it
displays dots instead of the password. Any use of an external browser must be
carefully weighed against your security requirements.
To use it in a safe manner, it is critical that each user is assigned a distinct port
and that port be kept secret. An application passcode must be set as well to
secure the port. The first client application that starts will be able to use the port
exclusively. All Devolutions Web Login calling on that port will get the
responses, unless an application passcode is required.
8.2 Installation
Devolutions Web Login is a free browser extension companion tools. It does require one of
our products to function at this time.
Click on the browser link below to start the installation of Devolutions Web Login plugin:
· Chrome
· Firefox
· Microsoft Edge
· Opera
8.2.1 Chrome
Follow the steps below to complete the installation of Devolutions Web Login in the Google
Chrome web browser.
2. Navigate to Devolutions Web Login extension or use the link from our Website
Once installed, access the extension by clicking in the top-right corner of the Google Chrome
web browser.
8.2.2 Firefox
Follow the steps below to complete the installation of Devolutions Web Login in the Firefox web
browser.
2. Download the extension from our Devolutions Web Login website page.
Continue to Installation
4. Click Add, when prompted to add Devolutions Web Login to the extension.
5. Once installed, access the extension by clicking in the top-right corner of Firefox.
Here are the steps to install Devolutions Web Login on Microsoft Edge Beta.
Allow Extensions
5. Follow the extension from Devolutions Web Login website page to the Chrome Web Store.
The extension is installed. Access it by clicking in the top-right corner of the Microsoft Edge
Beta web browser.
8.2.4 Opera
Follow the steps below to complete the installation of Devolutions Web Login in the Opera web
browser.
1. Open Opera.
2. Download the extension of Devolutions Web Login from our website page.
4. Drag and drop the .nex file from step 2 from the downloads in the web browser.
Follow these steps to connect Devolutions Password Hub to Devolutions Web Login extension:
1. Click on Devolutions Web Login extension at the top right corner of your browser.
2. Choose Devolutions Password Hub in the list and Save. You could at this point import
settings; the option will also be available in the Settings menu after the log in.
First Login
Log In
Devolutions Web Login will recognize automatically the Password Hub linked to
your Devolutions account. Click Change to modify the URL.
DESCRIPTION
Devolutions Web Login will automatically acknowledge all Password Hub linked to your
Devolutions account.
Devolutions Web Login will only recognize and apply credentials from the
active Password Hub.
To view/validate the active Password Hub, click on the Devolutions Web Login extension at
the top right corner of your browser.
2. Click About.
To switch Password Hub in Devolutions Web Login, click on the Devolutions Web Login
extension at the top right corner of your browser.
2. Click Settings.
3. Click HUB.
5. All the available Password Hub linked to your Devolutions account will show in the list. Switch
by clicking once on the desired Password Hub.
6. Click on the Devolutions Web Login extension at the top right corner of your browser and
enter the Master key associated with this Password Hub.
Follow these steps to connect Devolutions Password Server to Devolutions Web Login
extension:
1. Click on Devolutions Web Login extension at the top right corner of your browser.
2. Choose Devolutions Password Server in the list and Save. You could at this point import
settings; the option will also be available in the Settings menu after the log in.
First Login
3. Enter the server address. Test the connection to validate it, then Save.
Server Address
Follow these steps to connect your Remote Desktop Manager to Devolutions Web Login
extension:
1. Click on Devolutions Web Login extension at the top right corner of your browser.
2. Choose Remote Desktop Manager in the list and Save. You could at this point import
settings; the option will also be available in the Settings menu after the log in.
First Login
The user interface Devolutions Web Login is slightly different in appearance when connected
to Remote Desktop Manager, Devolutions Password Server or Devolutions Password Hub.
See below a list of the menu and information available from the Devolutions Web Login
extension:
· Add a website from Devolutions Web Login in a specific folder located in a vault or your
private vault.
· Visualize the credential stored in the vaults if you are connected with Devolutions Password
Server or Devolutions Password Hub.
· Use the password generator to create custom and more secure credentials.
Devolutions Web Login settings are separated in two categories, Configuration and Data
sources.
CONFIGURATION
The General settings are about the user interface and interaction.
· Color the fields that are filled with Devolutions Web Login
The Never list displays the list of websites, added locally, to which the user will never be
prompted to save credentials.
· Type can range from: Never add site, Never autofill, Never do anything too Never show icons in
field.
· Matching options are: Base domains, Host, Starts with, RegEx and Exact.
To remove a website from the never list click the trash can icon next to it. To edit an entry,
delete it and create another.
The Import / Export setting allows to save and transfer your currently set preferred settings.
· Choose to export Devolutions Web Login settings, password generator template and the
never list.
DATA SOURCES
The data sources settings are used to customize Devolutions Web Login interactions with
Remote Desktop Manager, Devolutions Password Server and Devolutions Password Hub.
Enable Remote Desktop Retrieve entries from Remote Desktop Manager when
Manager app the application is open.
Use default port (19443) Communicate with the default port 19443 between the
application.
Add entry in private vault by Save new entries in the private vault.
default
Destination folder Choose the folder where the credentials are stored in
the vault.
ACTION OPTIONS
DESCRIPTION
Automatically submit the form Submit the credentials automatically when the fields are
after filling filled.
Application key Secure the port with an application key by using the
same code in Remote Desktop Manager and
Devolutions Web Login.
Use legacy API Use the old browser extension API for compatibility with
older versions of Remote Desktop Manager.
Password Server
Destination folder Choose the folder where the credentials are stored in
the vault.
Automatically submit the form Submit the credentials automatically when the fields are
after filling filled.
Automatically submit the form Submit the credentials automatically when the fields are
after filling filled
LOG IN TO A WEBSITE
Select an entry from the list in Devolutions Web Login or click on the icon in the credential field to
fill in the login information and connect to the website.
Automatic Log In
Checkmark Enable web browser extension link in Remote Desktop Manager entries to allow
Devolutions Web Login extension to retrieve the credentials when connecting to its respective
website.
As mentioned in the Devolutions Web Login Overview topic, installing the extension in a
Terminal Services environment can introduce security risks. In such environments, each user
must have a distinct port assigned, as well as an application key to prevent any other
Devolutions Web Login from listening in.
The application key is displayed in clear text, it must be kept secret by the user.
To enable the security layer in Remote Desktop Manager, follow these steps:
5. In your browser, click the Devolutions Web Login icon and go to Remote Desktop
Manager Settings.
Here is the list of keyboard shortcuts available for Devolutions Web Login:
CTRL+SHIFT+Z
Use this key shortcut to open Devolutions Web Login window in your active browser.
CTRL+SHIFT+Y
Use it to auto-fill your credential when only one is available for an entry.
DESCRIPTION
Remote Desktop Manager role-based access control allows to create a granular protection
system that is quite flexible. However, flexibility comes at a price and sometimes making the
wrong choices could increase the time involved in managing the system.
The following recommendations are based on our experience with the system and the ideas
shared by our community. Follow these guidelines, as they will help you to use the role-based
access control efficiently.
Here are the main key points of the role based access system:
· Security is inherited: child items and folders are covered by a parent folder’s security.
· Permissions can be overridden: a permission set on a sub folder will override the parent
item’s permission.
While the role based access control is a great feature to secure access to entries, many other
features can be used to add more security layers. For more information, please consult the
following topics:
· Security Provider
· Credential repository
· Password Templates
· Two-factor authentication
· One-time password
SCENARIOS
Because of the great flexibility of our system, it becomes difficult to describe how to achieve the
exact security system that matches your needs. For this reason, we have elected to describe the
most popular systems that we have seen in use in our current community of users. We hope that
one of them will closely match your needs. You can obviously mix and match the various
strategies used in our scenarios to achieve your requirements.
· Simplified security
· Advanced security
ROLE CONFIGURATION
When using the role-based access control, roles are mostly used to control user access for
multiple users at once.
· Consultants: employed externally on a temporary basis, they usually are read-only users and
can use only a subset of entries.
Create a Role
All settings can be left to default unless the role contains only administrators. In this case, check
the Administrator box when configuring the role. Enter a Name for the role, then click Ok.
Configure a Role
To assign users to the role, click , then check the Is Member box of the respective user.
USER CONFIGURATION
USER TEMPLATE
It is possible to change the default user template. To do so, navigate to File – Options –
Security – User Template. These settings control the default settings of a new user. The best
practice is to disable all privileges.
To create users, navigate to Administration – Users, then click Add User. Enter a Login
and Password for the user and select the User type.
Create a user
A user can be assigned to multiple roles at once by checking the Is Member box of the
respective roles in the Roles section of the User Management.
ADMINISTRATORS
Administrators can do everything, regardless of the security. These users are usually the chief
officers and senior management.
RESTRICTED USERS
Restricted users have limited access to resources. They usually have the Add and Edit rights
only. These users can be mid or first level executives, such as service desk and help desk.
USERS
Users also have limited access to resources much like Restricted users. However, Users have
by default the Add, Edit and Delete rights and can perform these actions on all unsecured
entries.
Read only users can only view and use resources, but cannot edit them. These users are
usually external consultants.
When creating users, some key points must be taken into consideration. Ask yourself the
following questions while configuring a new user:
· Should they be able to access any resource without restriction? These are your
Administrators.
· Should they be able to add, edit, or delete entries? A User would have all of these.
Alternatively, you can select specific rights with Restricted User.
· Should they be able to see sensitive information, or import and export entries? Read-Only
users are best used for those who should very limited access. You can also use the privilege
tab for additional control over users.
ENTRY CONFIGURATION
Access is granted or denied to users by setting permission on entries. Permissions can be set
to users or roles. The best practice is to grant permissions to roles to control access for multiple
users at once.
To set permissions on an entry, edit any entry, then navigate to the Permissions section.
Entry's permissions
Permissions are usually set on folders, and apply to all child entries. A best practice is to set all
the permissions of the vault root folder to Never. As a result, all permissions of all entries are
denied by default.
Access is denied to users by expressly granting the access to other users. In other words, all
users that are not on the list of a permission have the access denied.
For a user to have access to a sub folder, the user must have at least the view permission on all
parent folders.
There are three levels of folders: the vault root, Telemark, and child items of Telemark.
Suppose that a user, such as a consultant, must have access to the Montreal folder only. The
consultant must be granted the view permission on the Telemark folder as well. However,
granting the view access to the Telemark folder gives to the consultant the permissions to view
all child items of Telemark. To deny the view permissions for the consultant on specific child
items, the view permissions of these items must be expressly set for other users.
9.1 Permissions
DESCRIPTION
The Permissions window which is only available in an Advanced Data Source, can be found in
every entry properties in the Permissions section.
The Role Based Access Control feature is not available using an Devolutions
Online Database.
The role-based permissions system can give a very accurate control of the security. Here is an
overview of the permissions window:
Permissions panel
OPTION DESCRIPTION
OPTION DESCRIPTION
Select roles or users Lets you select Users / Roles to be granted the permission.
Available only if the permission is set to Custom.
For more details on each permission, please consult our Common Settings - Permission topic.
9.2 Scenarios
9.2.1 Simplified Security
DESCRIPTION
While the following scenario is relevant for small to medium enterprises, it is not
recommended for a larger business. For a scenario more suited for large
enterprises, please consult the Advanced Security scenario.
Our fictional company, Windjammer, has four roles: HelpDesk, ServiceDesk, Administrations,
and Consultants. There are two client companies: Downhill Pro and Telemark.
The following tree structure represents entries which users have access to once all permissions
are set:
USER CONFIGURATION
Here is an example for user configuration. To create users, navigate to Administration – Users
– Add User.
The following rights selection is available when setting a user to Restricted user.
Administrators: administrators have a lot more access than regular users. When creating these
users, set the User type to Administrator to give them access to everything. The administrator
can access all entries, regardless of permissions.
Regular users (User): these users have fewer rights than administrators. They essentially have
all the basic rights (except for View Password) but are susceptible to all denied permissions.
Later, we will deny these rights by specifying which users can actually perform these actions.
Consultants: consultants can only view a subset of entries, we will set those as Read-Only.
They cannot add, edit or otherwise affect the information in any way.
ROLES CONFIGURATION
Now that the users are created, we will add the roles which we will later grant the permissions to.
We need to create the roles to assign users to them. There is no need to grant any privileges to
these roles.
· ServiceDesk
· HelpDesk
· Consultants
ENTRIES CONFIGURATION
· The HelpDesk will have the permission to view and open entries in the customer
groups/folders only and will not be able to edit them.
· The Consultants will have the permission to view and open entries in the Montreal folder only
but will not be able to edit it nor its child items.
We will begin with the vault root level folders: Downhill Pro, Telemark and Windjammer.
The permission to view the Windjammer folder will be set for the ServiceDesk only since we
want them to be able to use its child entries. We don’t want the ServiceDesk to add or edit
anything. We will set the Add, Edit and Delete permissions to Never. Only the administrator will
be able to add or edit entries in the Windjammer folder.
Windjammer - Permissions
For Downhill Pro, we will grant permissions to the ServiceDesk and the HelpDesk.
We already have a good example of the flexibility of Remote Desktop Manager’s Security. A
ServiceDesk user can view and use all the entries in the Downhill Pro folder, even the credential
entries, but it will never be able to see any password since View Password is Disallowed (from
the vault root folder).
Next, for the Telemark folder, we will grant permissions to the ServiceDesk, the HelpDesk and
the Consultants. This is where things get complex. If we want the Consultants to be able to view
only the Montreal folder which is a child item of Telemark, we must grant to consultants the
permission to view the entire Telemark content. Then we will grant permissions on child items
only to the role that should have access to these items. This last step will deny the view
permission for the consultants on the child items.
Telemark - Permissions
Since we want the users to be able to use the credential entries, we will grant the ServiceDesk
and the HelpDesk the permission to view the Credentials folder. This way, the ServiceDesk and
HelpDesk will be able to use the entries in the folder without revealing the passwords. Therefore,
by specifying that only the HelpDesk and ServiceDesk have the View permission, we deny the
view access to any role or user that is not in the list of the permission.
The Add, Edit and Delete permissions can be left to Inherited since they inherit the settings
from the Telemark parent folder. The ServiceDesk is the only role that has been granted the Add
and Edit permission in the parent folder and the Delete permission inherits the Never setting.
We want the ServiceDesk to be able to use the Domain Admin credential entry as well but not
the HelpDesk. For this we must grant the View permission to the ServiceDesk. The
ServiceDesk will still be able to edit the credential entry but will never see the password. The
delete permission is set to Never.
The last step for the Telemark child items is to set the View permission to the ServiceDesk and
the HelpDesk on the Boston folder and leave every other permission of this folder to Default.
This denies the Consultants to view the Boston folder. Now, the Consultants will be able to view
and open entries only in the Montreal folder.
Every time a new folder is added, the View permission must be set for
ServiceDesk and HelpDesk to hide the new folder and its content from the
Consultants.
No need to set any permissions on the Montreal folder, since they are inherited from the parent
folders.
IN CONCLUSION
The permissions are now correctly set. Note that every entry added at vault root level will have no
security by default. This means they would be available for anyone, even the consultants. This
can be confirmed by looking at the screenshot below in which the entry Daily routine is
available for everyone. Here is what each user should see in the tree view:
You can further customize your permissions by using the Security Settings tab when editing
entries, or the Logs tab to add more traces of coming and goings. As always, great care must
be taken when granting permissions.
If you need more details on each permission, please consult our Common Settings –
Permissions topic.
9.2.2 Advanced Security
DESCRIPTION
The following scenario is designed for large enterprises. For a scenario more
suited for small enterprises, please consult our Simplified Security scenario.
While this example fits for large enterprises, please keep in mind that any privilege should be
granted only as necessary. Be careful when granting permissions to a user or a role.
Our fictional company, Windjammer, has three roles: HelpDesk, ServiceDesk, and Consultants.
There are two client companies: Downhill Pro and Telemark.
The following tree view structure represents entries which users have access to once all
permissions are set:
USER CONFIGURATION
In this scenario, all the options in the Privileges section of the User
Management are set to None.
Here we select the user type to give them the most basic rights (Add, Edit, and Delete).
ServiceDesk users are Restricted users. They have the Add and Edit rights. However, they
cannot add entries into the root folder.
HelpDesk users are Restricted Users as well. They only have the Add right. However, they
cannot add entries into the root folder.
Consultants are Read Only Users and can only view a subset of entries. They cannot add or
edit anything.
ROLE CONFIGURATION
Now that the users are created, we will add the roles which we will later grant the permissions to.
We need to create the roles and assign the respective user to each role. There is no need to
grant any privilege to these roles since they are mainly empty shells used to group multiple
users. This allows for controlling multiple users at once instead of granting permissions to each
users, one at a time.
· ServiceDesk
· HelpDesk
· Consultants
To add a role, click the Add Role button, enter a name for the role, and click Ok.
To assign users to a role, select a role and click the Assign roles button. Use the Is Member
check boxes to add users to the role.
ENTRY CONFIGURATION
· The ServiceDesk has the permission to view and open all entries but is able to edit only the
entries in the client's groups/folders.
· The HelpDesk has the permission to view and open entries in the client's groups/folders only
and is not able to edit them.
· The Consultants have the permission to view and open entries in the Montreal folder only but is
not able to edit it or its child items.
Root
As mentioned above, ALL root folder permissions are set to Never. This denies the default
access to other users.
Root - Permissions
The permission to view the Windjammer folder is set for the ServiceDesk only since we want
them to be able to use the child entries. We don’t want the ServiceDesk to add, edit or delete
anything. We leave the Add, Edit and Delete permissions to Inherited so only the
administrators can perform these action on the Windjammer folder and its child items.
Windjammer - Permissions
· View: Custom; ServiceDesk.
· Add: Inherited; Never inherited from Root. Only the administrator can add entries.
· Edit: Inherited; Never inherited from Root. Only the administrator can edit entries.
· Delete: Inherited; Never inherited from Root. Only the administrator can delete entries.
For Downhill Pro, we grant permissions to the ServiceDesk and the HelpDesk.
· Delete: Inherited; Never inherited from Root. Only the administrator can delete entries.
We already have a good example of the flexibility of Remote Desktop Manager Security.
ServiceDesk and HelpDesk users can view and use all the entries in the Downhill Pro folder,
even the credential entries, but they will never see any passwords since the ServiceDesk and
HelpDesk users do not have the privilege to reveal passwords.
Next, for the Telemark folder, we grant permissions to the ServiceDesk, the HelpDesk and the
Consultants. This is where things get complex. If we want the Consultants to be able to view only
the Montreal folder, which is a child item of Telemark, we must grant Consultants the permission
to view the parent folder, thereby the entire Telemark content. Then we will grant permissions on
child items only to the role that should have access to these items. This last step will deny the
view permission for the Consultants on the child items.
Telemark - Permissions
· View: Custom; Consultants, HelpDesk, ServiceDesk.
· Delete: Inherited; Never inherited from Root. Only the administrator can delete entries.
Since we want the users to be able to use the credential entries, we grant the ServiceDesk and
the HelpDesk the permission to view the Credentials folder. Therefore, the ServiceDesk and
HelpDesk are able to use the entries in the folder without revealing the passwords. By specifying
that only the HelpDesk and ServiceDesk have the View permission, we deny the view access to
any role or user that is not on the list of the permission.
The Add and Edit permissions are set to Never and the Delete permission can be left to
Inherited since it inherits the Never settings from the Root. Only the administrators can perform
these actions in groups/folders containing credentials.
· Delete: Inherited; Never inherited from Root. Only administrators can delete entries.
We want the ServiceDesk to be able to use the Domain ladmin credential entry, but not the
HelpDesk. For this, we must grant the View permission to the ServiceDesk. The ServiceDesk is
still be able to use the credential entry but will never see the password.
· Add: Inherited; Never inherited from Root. Only administrators can add credential entries.
· Edit: Inherited; Never inherited from Root. Only administrators can edit credential entries.
The last step for the Telemark child items is to set the View permission to the ServiceDesk and
the HelpDesk on the Boston folder and leave every other permissions of this folder to Inherited.
This denies the Consultants to view the Boston folder. Now, the Consultants are able to view and
open entries only in the Montreal folder.
Every time a new folder is added as a child of the Telemark folder, the View
permission must be set for ServiceDesk and/or HelpDesk to hide the new
folder and its content from the Consultants.
There is no need to set any permissions on the Montreal folder, since they all inherit values from
parent folders.
IN CONCLUSION
The permissions are now correctly set. Note that every entry added at root level are inheriting
from the Root as well. This means they would be available to admins only, unless their
permissions were modified. This can be confirmed by looking at the screenshot below, in which
the entry Daily routine is available for everyone (It's permissions have been changed to
Everyone. Here is what each user should see in the tree view:
You can further customize permissions by using the Security Settings tab when editing entries.
As always, great care must be taken when granting permissions.
If you need more details on each permission, please consult our Common Settings –
Permissions topic.
9.3 Legacy Information
DESCRIPTION
Describing such a flexible security system takes a lot of effort. This chapter contains valuable
information, but that may have been optimized by a newer topic.
9.3.1 Small to Medium Enterprise
DESCRIPTION
Here we will give you a security structure example that should be relevant for small to medium
business.
In this scenario, all the options in the Privileges section of the user properties will be left
disabled.
While this example might fit for many enterprises, please keep in mind that any privilege should
be granted only if needed. Be extremely careful when granting permissions to a user or a role.
STEPS
USER CONFIGURATIONS
The administrator:
· When creating the user, select the Administrator in the dropdown menu to give it access to
everything.
Administrator Permission
The ServiceDesk:
· Add
· Edit
ServiceDesk Rights
The HelpDesk:
· Add
HelpDesk Rights
The MontrealConsultant has read-only access. He cannot see any password or entry detail.
MontrealConsultant Rights
ROLES CONFIGURATION
Now that the users are created we will add the roles to which we will later grant the permissions.
We just need the roles to assign users to them. No need to grant them any privileges.
· ServiceDesk
· HelpDesk
· MontrealConsultant
Roles
ENTRIES CONFIGURATION
· The HelpDesk will have the permission to view and open entries on the customer groups/folders only and will not
be able to edit them.
· The MontrealConsultant will have the permission to view and open entries on the Montreal goup/folder only and
will not be able to edit it nor its child items.
We will begin with the root level groups/folders: Downhill Pro, Telemark and Windjammer.
For Downhill Pro, we will grant permissions to the ServiceDesk and the HelpDesk.
· Add: ServiceDesk
· Edit: ServiceDesk
· Delete: Since no user have the delete right we can leave this permission to Default.
We already have a good example of the flexibility of Remote Desktop Manager’s Security. A
ServiceDesk user can view and open all the entries in the Downhill Pro folder, even the
credential entry, but it will never be able to see any password.
Next for the Telemark folder, we will grant permissions to the ServiceDesk, the HelpDesk and
the MontrealConsultant. This is where things get complex. If we want the MontrealConsultant to
be able to view only the Montreal folder which is a child item of Telemark, we must grant to the
consultant the permission to view the entire Telemark content. Then we will grant permissions on
child items only to the role that should have access to these items. This last step will deny the
view permission for the consultant on the child items.
Telemark - Permissions
· Add: ServiceDesk
· Edit: ServiceDesk
· Delete: Default
Since we want the users to be able to use the credential entries, we will grant the ServiceDesk
and the HelpDesk the permission to View the Credentials folder. This way they will be able to
use the entries without being able to view the passwords.
The Add and Edit permissions can be left to Default since the ServiceDesk is the only role that
has been granted these permissions in the parent folder.
· Add: Default
· Edit: Default
· Delete: Default
We want the ServiceDesk to be able to use the Domain Admin credential entry as well but not
the HelpDesk. For this we must grant the View permission to the ServiceDesk only and change
the Add and Edit permission to Never. The ServiceDesk will still be able to edit the credential
entry but will never see the password. If you prefer you can set the Edit permission to an
Administrator user or role to deny it to the ServiceDesk.
· View: ServiceDesk
· Delete: Default
The last step for the Telemark child items would be to set the View permission to the
ServiceDesk and the HelpDesk on the Boston folder and leave every other permission to
Default.
Now the MontrealConsultant will be able to view and open entries only in the Montreal folder.
Every time a new folder is added the View permission must be set for ServiceDesk and
HelpDesk to hide the new folder and its content from the consultant.
· Delete: Default
No need to set any permissions on the Montreal folder, since they are inherited from the parent
folders.
Finally, the permission to view the Windjammer folder will be set for the ServiceDesk only since
we want them to be able to use its child entries. We don’t want them to add or edit anything so
we will set the Add and Edit permissions to the Administrator user/role.
Windjammer - Permissions
IN CONCLUSION
The permissions are now correctly set. Note that every entry added higher than the root level
groups/folders will have no security by default. This means they would be available for anyone,
even the consultant. This can be confirmed by looking at the screenshot below in which the entry
Daily routine is available for everyone. Here is what each user should see in the tree view:
You can go further with granting permissions by using the Security and Attachments tabs of
the permissions section. As always, a great care must be taken when granting permissions and
users should have very strict privileges.
If you need more details on each permission, please consult our Common Settings –
Permissions topic.
10 PowerShell Scripting
DESCRIPTION
If the sample above does not work due to a different Remote Desktop Manager
installation directory, simply change ${env:ProgramFiles(x86)}
\Devolutions\Remote Desktop Manager for the correct application path.
COMMANDS
For further information on the subject, or if you have questions, join us on the forum and our team
will be glad to assist you.
DESCRIPTION
We are always asked for a full list of property names and sadly it is extremely hard to provide for
multiple reasons. The best way is still to look at the xml structure of an entry of the proper type to
identify the field names.
1. Create an entry of the needed type, add only mandatory data at this time. Save the entry.
2. Right-click on the entry, then use Clipboard – Copy.
3. In the dialog that appears, switch to the Preview tab, copy the xml structure to a text file. This is the
BEFORE.
4. Manually perform the modification to the entry that you would like to automate using PowerShell, save the
entry.
5. Using Clipboard – Copy, save the modified xml to another file. This is the AFTER.
6. Compare the two files with your favorite difference tool, you will see the fields that have changed, and the values
that have been assigned. This indicates what your script should do.
· To save space, most fields have a default value and when the field contains that default value, it simply does
NOT appear in the content. That is why you must watch out for new fields that appear in the AFTER content.
· Credentials are handled in a special way. They contain a GUID when they refer to other
entries, but they hold Well-Known static GUIDs when they use other mechanisms.
Default ""
Inherited "1310CF82-6FAB-4B7A-9EEA-
3E2E451CA2CF"
None "B87B29D9-9239-4D7B-86D8-
9B53DCD3BA9F"
· Use the Set-RDMProperty cmdlet to set almost any value within the session object. To find
properties and paths, reverse engineer the session XML file format. Create a sample
session in RDM and export it using the right click menu Import/Export - Export Session
(.rdm).... Once exported, open the .rdm file with your favorite editor. Browse the XML
structure to find the property path and name.
· Use the AddDataEntryKind method to set the data entry kind to Web (11 in this case). This
is not actually documented – it’s just a bonus tip that we use here at Devolutions all the
time!
10.2 PowerShell Samples
DESCRIPTION
These are the recipes to perform various tasks using our PowerShell cmdlets.
10.2.1 Creating an entry
DESCRIPTION
SAMPLE
$computerName = "wind10";
$theusername = "david";
$thedomain = "windjammer";
$thepassword = "123456";
$session = New-RDMSession -Host $computerName -Type "RDPConfigured" -Name $computerName;
Set-RDMSession -Session $session -Refresh;
Update-RDMUI;
Set-RDMSessionUsername -ID $session.ID $theusername;
Set-RDMSessionDomain -ID $session.ID $thedomain;
$pass = ConvertTo-SecureString $thepassword -asplaintext -force;
Set-RDMSessionPassword -ID $session.ID -Password $pass;
NOTES
The Update-RMUI call is to allow the entry to be physically saved and available for the rest of the
script. It may not be necessary for a types of data sources and our objective is to make it
unnecessary for this scenario.
CMDLETS REFERENCE
DESCRIPTION
Please note that the CSV file must be encoded in UTF-8 to support special
characters.
SAMPLE
# Create the group folder if it is not null, empty or fill in with space characters
if (![string]::IsNullOrWhiteSpace($groupName)) {
$session = New-RDMSession -Type "Group" -Name $groupName
$session.Group = $csvEntry.Name
Set-RDMSession $session
Write-Host "Group Folder $groupName created" -f Yellow
}
}
Update-RDMUI
NOTES
The CSV file must have only one column with the title set as Name.
CMDLETS REFERENCE
DESCRIPTION
The Batch Actions allow for a quick way to modify multiple sessions at once, but within Remote
Desktop Manager itself.
To be able to create your PowerShell script, you would need the name of the field(s) that you
would like to update. To retrieve the exact name of the field, right-click on your session and
select Clipboard – Copy. You can then paste the information in a text editor to retrieve the
name of the field(s) that you would like to modify via the Custom PowerShell Command.
Since they use the Powershell technology, we provides samples in this section because the
fields are the same when accessed through our Batch Actions or through Powershell.
SAMPLES
$connection.Web.OnlySendPasswordInPasswordField = $false;
$RDM.Save ( ) ;
$connection.DataEntry.ViewUrlDisplayMode = "Default";
$RDM.Save();
$connection.DataEntry.DefaultAction = "OpenUrlExternal";
$RDM.Save();
$connection.Terminal.MaxScrollbackLines = 2000;
$connection.Terminal.AlwaysAcceptFingerprint = $true;
$connection.Terminal.EnableLogging = $true;
$connection.Terminal.LogPath = '$LOGPATH$\$NAME$_$DATE_TEXT_ISO$_$TIME_TEXT_ISO$.log'
$connection.Terminal.LogMode = 1;
$connection.Terminal.LogOverwriteMode = 0;
$RDM.Save();
Here are some values that you can change for this command;
LogPath: your path between ' ' (single quotes). You can also use variables. i.e. %USERPROFILE%, $NAME$, etc.
In this example $LOGPATH$ is a custom variable defined in the Data Source Settings (System Settings) - Custom
Variables
LogMode: 1 = Printable Output, 0 = Event
TerminalLogOverwriteMode: 0 = default, 1 = prompt, 2 = append, 3 = overwrite
Here's also other options that you can modify;
$connection.Terminal.BellMode = 'Visual'
$connection.Terminal.CloseOnDisconnect = $false
$connection.LogMeIn.ScriptErrorsSuppressed = $true;
$RDM.Save();
$connection.LogMeIn.ShowUrl = $false;
$RDM.Save();
$connection.LogMeIn.WebBrowserApplication = "GoogleChrome";
$RDM.Save();
$connection.LogMeIn.SandboxProcess = $true;
$RDM.Save();
Host;
Portal;
$connection.MetaInformation.CustomField3Title = "MyField"
$RDM.Save();
Please note that you would need to change "MyField" for the value that you want to replace Custom field #3 with.
$connection.Putty.RecordingMode = 1;
$connection.Putty.RecordingFileName = "C:\path\to\your\file.log"
$RDM.Save();
ENCODING
$connection.Putty.TelnetEncoding = "UTF-8";
$RDM.Save();
$connection.MetaInformation.Keywords = "";
$RDM.Save();
$connection.Putty.HistoryMaxLength = 2000;
$RDM.Save();
$connection.ConnectionType = 3;
$RDM.Save();
$connection.KeyboardHook = "OnTheRemoteComputer";
$RDM.Save();
11 Knowledge Base
DESCRIPTION
Macros/Scripts/Tools sessions can be used to open web links in Remote Desktop Manager.
3. Assign the new template to your newly created Macros/Scripts/Tools session using the ellipsis button.
DESCRIPTION
Remote Desktop Manager automates opening a VPN when launching a remote session. This
configuration is well suited to situations where you need one VPN for a group of servers at a
remote location. This procedure sets the VPN configurations on the folder and the entries inherit
the settings.
STEPS
Before following the steps below, create a VPN entry and remote session entries, then place
these entries in a folder. For more information about VPN entries, consult the VPN topic.
1. Select the folder and open its Properties then select VPN/SSH/Gateway from the menu on
the left.
2. In the Open list, select how the VPN opens when you launch a remote session. We
recommend choosing Connect if unable to ping/scan on the folder, later we'll set
Inherited for each session entry.
OPTION DESCRIPTION
Manual VPN requires user to manually activate the VPN before opening
the session.
Connect if unable to Remote Desktop Manager tests if the host responds, if not the
ping/scan VPN opens.
OPTION DESCRIPTION
Prompt if unable to Tests if the host responds, if not VPN prompts for confirmation
ping/scan before opening.
3. In the Close list, select how the VPN closes at the end of a remote session. We recommend
On session close.
OPTION DESCRIPTION
Manually Later VPN requires user to manually close the VPN entry when
finished.
Confirm disconnect VPN prompts to close the VPN when session is closed.
4. Create a VPN group so the VPN only closes when the last session in the VPN group is
closed.
4.1 Click the plus sign to add a new VPN group, then enter a group name.
2. On the Edit tab, click Batch Edit, then select Edit Entries (General Settings). Batch Edit
is also available in the right-click context menu.
4. Select Inherited in the Open list. It will set all the General options to Inherited.
There are many options to accommodate a range of VPN types. Below are two common
situations and options to make using the VPN more efficient.
VPN/SSH/Gateway - Advanced
1. You lose connection to the data source when the VPN is active.
You can adjust the time Remote Desktop Manager waits for the VPN to open.
-1 sec is the default time (5 seconds). Change the default time for all VPN entries in File –
Options – Types – VPN – VPN default pause.
DESCRIPTION
Remote Desktop Manager imports credentials from Keepass. It is a simple way to build your
data. The imported information can be converted into three types of entry:
Username/Password and Website. The entries include credentials, url addresses and notes.
PROCEDURE
2. Export Data to an external file. RDM supports two file types for KeePass: XML and CSV. An
XML file will retain the folder structure from KeePass.
a) Choose desired file type: KeePass CSV (1.x) or KeePass XML (2.x)
3. Choose an entry type. All imported entries are converted to this type.
OPTION DESCRIPTION
4. Select the KeePass exported file in the file explorer and click Open.
DESCRIPTION
To simplify deployment for multiple users, it is possible to import and export data sources,
entries, and even the application's configuration. Configure the application once, with data
sources, entries, and options. Export any of these configurations, then import them in another
Remote Desktop Manager instance.
DATA SOURCES
Only the data source configuration is exported. The resulting .rdd file does not contain the
database content. It contains only the configuration used to connect to the database. From File –
Data Sources, click on the Export Data Source Configuration... button, then save the
*.rdd file on your computer.
To import the data source in another Remote Desktop Manager instance, use File – Data
Sources, and click on the Import Data Source Configuration button.
A locked data source can be exported and imported, but the content will be
locked unless a password is entered when the data source is selected. See Lock
Data Source for more information.
ENTRIES
Entries configuration can be exported to save the time of creating the same set of entries for
multiple users. There are many ways of exporting entries. The only formats allowed to import
entries previously exported from Remote Desktop Manager are .rdm, and .xml.
OPTION DESCRIPTION
Export Select one entry or more, then right-click the selection. In the context menu, under
Selection Export, select Export Selection (.rdm)...
Export Select one entry or more, then right-click the selection. In the context menu,
Special under Export – Export Special, select the desired export format.
Export as Select one RDP entry, then right-click the selection. In the context menu,
RDP under Export, select Export Entry as Remote Desktop File (.rdp)...
OPTION DESCRIPTION
Export All Right-click an entry in the Navigation Pane. In the context menu, under Export, select
Entries Export All Entries (.rdm)...
Export Right-click an entry in the Navigation Pane. In the context menu, under
Special Export – Export Special, select the desired export format.
Export All Right-click an entry in the Navigation Pane. In the context menu, under
Host Export, select Export All Hosts List (.csv)...
OPTION DESCRIPTION
Export All Right-click an entry in the Navigation Pane. In the context menu, under
Documents Export – Export Special, select Export All Documents...
The functionalities for exporting all entries are also available in the File – Export Menu.
File - Export
APPLICATION CONFIGURATION
The application's configuration can be exported to replicate the configuration in other Remote
Desktop Manager instances.
Use File – Options – Export Options, and save the RemoteDesktopManager.cfg file on your
computer.
To import the configuration, use File - Options - Import Options, and select the exported
RemoteDesktopManager.cfg. You can also copy the file to the installation directory of another
Remote Desktop Manager instance.
11.1.1.5 Multiple Types of Connections to a single computer
DESCRIPTION
You have hosts for which you need to use many different remote access technologies (ex: RDP,
SSH, Web, etc).
DESCRIPTION
This method uses a dashboard command that is available on all sessions. It's a good fit for a
scenario where you usually connect with a specific technology, but occasionally need to use
another.
SETTINGS
Templates
Create Template
2. In the computer field, use the $HOST$ variable and click on OK.
Default Template
3. In the case that you need to launch a session using a template, click on Open with a
Template in the Dashboard and select the appropriate template
DESCRIPTION
In Remote Desktop Manager, you can use Folder entries to organize your sessions in the
application. It is possible to store information at the top level folder and use Variables in the child
entries to resolve information that you have saved in the parent folder.
SETTINGS
1. Create a Company, Database, Device, Domain, Identity, Printer, Server, Site, Software or
Workstation folder in the Navigation Pane.
2. Enter information in Folder properties. Only include a password if you want to put password
protection on the folder.
Folder Properties
3. In the child sessions, use the appropriate Variables to retrieve the information that is saved at
the folder level
Variables
11.1.1.5.3 Host w ith Templates
DESCRIPTION
A Host entry will let you use templates in order to connect to the host. It will prompt you to choose
which template to use to launch the host.
SETTINGS
1. Create one or multiple Templates via the File – Templates – Templates menu. You may
need to use Variables like $HOST$ for the host name as well as $USERNAME$ or
$PASSWORD$ for the username and password.
Host Entry
3. Press the Select Templates button and select the templates that you would like to add to
your Host session
Select Templates
5. Launch your Host session. You will be prompt to select the appropriate template to launch the
session
DESCRIPTION
In the InfoSec world, a pwned password is a password that has been exposed in data breaches
(i.e. they are owned/pwned by hackers).
Using a pwned password significantly increases the chances of being the victim of a data
breach. Pwned Check leverages Troy Hunt’s Pnwed Passwords API and automatically checks
to see if a password that you’re using (or are thinking of using) has been pwned by hackers. If it
has, you will be notifiied and can be proactive and choose something else to stay out of harm’s
way. There are over half a billion passwords in the Pwned Passwords database.
1. On the Administration tab, open Data Source Settings (System Settings) – Password
Validation.
Remote Desktop Manager analyzes a password when you save an entry. A message is
displayed when a password is found in the Pwned Passwords database. If you see this window
you should change your password immediately. Remember to change it in Remote Desktop
Manager and the actual account.
Rest assured Remote Desktop Manager does NOT send your passwords to Pwned Passwords.
Remote Desktop Manager only sends the first five characters of the SHA-1 password hast to the
API.
The API sends back a list of every password hash that matches the first five characters of the
hash. The API only sends back the second part of the hash.
Remote Desktop Manager compares the hashes on the list to the password hash for the
password you want to use.
Remote Desktop Manager makes it easy to make strong passwords. The built-in Password
Generator creates secure passwords, following your specifications for password length and
complexity. The password generator is available on every entry beside the field where you enter
a password.
Remote Desktop Manager also has a Password Analyzer that provides feedback on all your
passwords. A rating is included on the entry. It uses Zxcvbn to evaluate passwords.
You can also create a report of all your passwords by using the Password Analyzer in the
Tools tab.
Vaults are containers that divide the data source into multiple compartments.
We recommend using Vaults for improved organization and security.Vaults also help
performance as they limit the amount of entries that load at once.
Vaults are available with Advanced Data Sources: Devolutions Password Server, SQL Azure,
Maria DB, MySQL and SQL server.
CREATE A VAULT
Administration –Vaults
Vault Management
1. In the Navigation Pane, use the Vault list to move between Vaults. Change the location of
the Vault list in File – Options – User Interface – Vault Location.
3. Select the repository you want to move the entries to, and click Next.
Move to Vaults
4. Choose the entries you want to transfer to the new repository, and click Transfer.
Vaults simplify user management because Active Directory groups define who has access to a
Vaults. These Active Directory groups are known as Roles in Remote Desktop Manager. In
general, most roles have access to a couple Vaults, while some groups will only have access to
one Vaults. Limiting access to Vaults minimizes the need to set permissions on lower-level
folders.
How to assign roles to a Vault and the permissions you need to k eep in mind
Administration –Vaults
2. On the User and Security Management window, choose the Vaults, then click Assign
Roles.
3. Choose which roles have access to the Vaults: select the Is Member box.
Repository Assignment
VAULTS SHORTCUTS
We recommend administrators and users who have access to multiple vaults create vaults
shortcuts to navigate between vaults.
If you use vaults shortcuts, the vault root should only contain folders. Do not save entries at the
vault root.
Each Vault contains a shortcut that returns the user to the main Vault.
3. In the Name box, enter the name of the Vault you are creating a shortcut to. Save the shortcut
in a folder.
4. To find the Vaults ID, click the ellipses button. Enter a folder name (case sensitive) to create
a shortcut to a specific folder.
Select Vault
We recommend removing the data source drop-down list when using Vault shortcuts. Then the
Vaults list can be moved above the Navigation Pane.
Via the quick connect toolbar, you can open an ad-hoc session by specifying the host and
session type. It's also possible to create a template and establish the connection with your
template. Configure the settings in the template, Remote Desktop Manager will apply them when
connecting to the specified host.
SETTINGS
The ellipsis button will list network discoverable computer to allow you to select computer from
the list.
USING TEMPLATES
Remote Desktop Manager offers default templates to connect with the Quick Connect feature,
but it is possible to use custom templates. In that case, the host field in the template must be set
to the $QUICK_CONNECT$ variable. When they are created, custom templates are
automatically added at the bottom of the type list.
11.1.1.8.1 Allow Range Open
This feature allows to open multiple machine with the quick connect in Remote Desktop
Manager
This range function requires that a sequenced number is at the end of the same
name for all the machine like this list: devolutions08, devolutions09,
devolutions10.
For example: to open the machines devolutions3, devolutions4 and devolutions5 you would write
devolutions3~5.
11.1.1.9 Send application logs
DESCRIPTION
The Devolutions team will need your application logs in some cases to help recreate a specific
issue.
1. Before sending them, please set the Debug Level to 1 by clicking on the Profiler in the
Help tab.
Profiler
3.
4. Fill your contact information along with a complete explanation on the issue and press OK.
DESCRIPTION
An error report is created when an application error occurs in Remote Desktop Manager. You
can send that error report to the Devolutions support team to help reproduce the issue more
easily.
When sending your error report please make sure to include as many details as
possible in the message section to ensure that our support team reproduces
the issue with ease.
When an error dialog appear in Remote Desktop Manager follow these steps to send it to the
support team.
2. Fill in your contact information along with a detailed explanation on the issue and press OK.
DESCRIPTION
In some cases, the Devolutions team will need your configuration file to help reproduce a
particular issue.
2. Type "% localappdata% " in the Run window and press OK.
DESCRIPTION
These steps will help you get through the process of upgrading from the Free Edition of Remote
Desktop Manager to the Enterprise Edition.
STEPS
The Enterprise edition allows for a 30-day trial. Since both editions are totally
independent from each other and can be operated side-by-side, this means
that you can perform this procedure and still benefit of a trial for the Enterprise
Edition features prior to making your decision.
File based data sources (XML, SQLite, etc) are by default stored in the
configuration folder. As a precaution, go through each data source in File -
Data sources and have a look at the local path (if any). Any file that is in the
configuration folder must be copied manually.
The paths mentioned in this topic are for those that have installed using the
default settings. The best way to locate your configuration folder is to use File -
Options - Advanced, in this form you will find an hyperlink near the bottom.
This opens your configuration folder. Please ensure you close the application
before going further.
2. Launch the Enterprise Edition once to have its own configuration folder initialized, then close
it.
RemoteDesktopManagerFree.cfg
RemoteDesktopManagerFree.ext
Connections.db. (default name of the Local Data Source)
Any and ALL other data source files identified in the Data sources list
RemoteDesktopManagerFree.cfg to RemoteDesktopManager.cfg
RemoteDesktopManagerFree.ext to RemoteDesktopManager.ext
AppData Folder
Run the Enterprise edition and ensure all of your data sources are available.
Uninstall the Free edition when you are sure that everything is working as expected.
11.1.1.12 Understand Remote Desktop Manager licensing
DESCRIPTION
Licenses are calculated per user, not per installation. There is no limitation on
installing Remote Desktop Manager (laptop, desktop, home computer, etc), as
long as you hold the proper number of licenses for each individual that connect to
your system.
The licenses are for use by the customer that appears on the invoice. You
cannot share your license with a sub-contractor or, in the case of a service
provider, to one's customers. This applies even if you grant them access to a
shared data source.
Four types of licenses are available to purchase, depending on the number of users:
· User license
· Site license
· Country license
· Global license
USER LICENSE
These licenses are purchased individually. There must be a separate license for each individual
who will have access to the software. This is akin to a named user license.
SITE LICENSE
This license offers unlimited users on the same site (location). Remote workers who are based
in another office are NOT included. A location is a workplace. If a user must work from another
address, they need another another license. Please contact [email protected] to describe
your scenario and get help on which license to purchase.
COUNTRY LICENSE
This license offers unlimited uses within a specified country. One license serial is delivered,
which allows unlimited users at unlimited locations within the same country. Please contact
[email protected] to get a quote.
GLOBAL LICENSE
This license offers unlimited uses, worldwide. One license is delivered, which can be used for an
unlimited amount of users at unlimited location around the world. Please contact
[email protected] to get a quote.
DESCRIPTION
A Web Protocol Handler (also called URL Protocol Handler) has been implemented in
Remote Desktop Manager to be able to launch a session directly from HTML content. This can
be very useful to call Remote Desktop Manager from a Configuration Management Database
(CMDB) or even a Document Management System (DMS).
SCENARIOS
2. Generate a URL for a template, this will allow you to specify the host name of the device you
wish to connect to, but it will take the settings of the template.
PARAMETERS
Here are the parameters used to build a protocol handler URL. These are for advanced
scenarios. Only the DataSource and Session IDs are enough to open a connection.
Please note that the DataSource parameter overrides the data source which
the application connects to at start-up. This applies even if the user is prompted
for a data source to connect to when the application starts.
PARAMETER DESCRIPTION
PARAMETER DESCRIPTION
Host Indicate the hostname or IP address of the remote device. Used along
with the template parameter, or to override the host property of the
session parameter.
Port Indicate the port to use. Used to override the port property of the
session or template parameter.
Username Indicate the username to use. Used to override the username property
of the session or template parameter.
Password Indicate the password to use. Used to override the password property
of the session or template parameter.
Domain Indicate the domain to use. Used to override the domain property of
the session or template parameter.
Title Indicate the title of the tab when a session is launched using the
Embedded (tabbed) display mode. This can be very useful when
several sessions are launched at the same time.
PARAMETER DESCRIPTION
Tabpage Give the focus to a tab in the dashboard after the application has
completed the startup procedure. Available only with the Select action.
The possible tabs are:
· Overview
· Documentation
· Macros/Scripts/Tools
· Management Tools
· Information
· Attachments
· Logs
· Recordings
ACTIONS
· Select: select a connection in the Navigation Pane (allows to select a tab in the dashboard as
well).
SYNTAX
Syntax:
rdm://<action>?<parameter1>=<value>[&<parameter2>=<value>]
The base syntax of the protocol handler requires the application protocol, an action and at
least one parameter to work with.
There are three rules to follow when constructing an URL for the protocol handler:
· The action is separated from the parameters with a question mark (?).
EXAMPLES
rdm://open?Filter=RDP&Tabpage=Dashboard
1. In the Advanced section of an entry properties, click on the Create Web Url button.
3. Paste (Ctrl+V) this Url in any application able to handle application protocols. It can be in a
web page, a web browser address bar, or even a supported chat application. The protocol
handler launches Remote Desktop Manager if it is closed, then perform the requested
action with the provided parameters.
11.1.1.14 Create a saved search w ith Smart Folders
DESCRIPTION
Smart folders are saved searches. You can search by entry name and/or tag. The smart folder
lists search results in the dashboard. You can open and edit entries directly from the smart
folder. The folder updates dynamically; each time you open the folder it searches.
3. Enter the name for the smart folder. This is how the smart folder name will appear in the
Navigation Pane. It is not for the search terms.
2. You can work with an entry directly from the search results.
Double-click to open an entry.
Right-click to access actions in the context menu (e.g. View password or Select in dashboard).
The smart folder can be edited. It has the same settings as other entries.
11.1.1.15 Add an RDP entry
DESCRIPTION
RDP (Microsoft Remote Desktop) and other tools that open remote connections are saved as
Session entries Remote Desktop Manager. The entries store information about the host,
credentials, local resources, and VPN, so users can open a session with one click. You can also
set permissions, configure security settings and customize logs.
You can open more than one session at once. With embedded sessions you can switch
between the tabs or monitor connections simultaneously: use thumbnail view or rearrange open
sessions with split screen.
DESCRIPTION
Welcome to Remote Desktop Manager! Here are three steps to quickly set up Remote Desktop
Manager and start testing the features.
DESCRIPTION
Remote Desktop Manager comes with a local SQL Lite data source. It is enough to quickly test
out remote connections (e.g. SSH or Microsoft Remote Desktop) and other types of entries.
LEARN MORE
DESCRIPTION
You can use credential entries to open remote connections, saved as sessions in Remote
Desktop Manager. Credential repositories link one credential or a list of credentials with a
session.
LEARN MORE
Watch this video for step-by-step instructions: Import credentials from KeePass.
DESCRIPTION
When it comes to entries, there are a lot of different options. Here's a quick way to set up an
RDP (Microsoft Remote Desktop) entry:
3. Choose Credential repository and link a credential entry with this session. You can also
enter the username and password directly in the entry by choosing Default.
LEARN MORE
DESCRIPTION
Please note that if your windows profile is corrupted Remote Desktop Manager
Agent and Remote Desktop Manager Jump might not work.
Remote Desktop Manager Jump is built in Remote Desktop Manager desktop application
(Windows only). This feature relies on the Remote Desktop Manager Agent and a full
installation of Remote Desktop Manager on the local machine and the jump host.
For an introduction on Remote Desktop Manager Jump, please consult the Remote Desktop
Manager Jump topic.
PROCEDURE
1. Add an RDP entry for the jump host. Enter a name for the session, host name and include
credentials.
4. Confirm Remote Desktop Manager Agent is set to auto-start. Go to Tools – More Tools
and select Remote Desktop Manager Agent. Click Yes to start the agent.
5. Right-click the Remote Desktop Manager Agent in the taskbar. Check Auto Start.
6. Adjust the user interface on the jump host to maximize the area to display remote sessions.
· Make the application full screen.
· Remove the Navigation Pane. Go to View and click Navigation.
· Hide the ribbon. On the View tab, click Top Pane.
To show the ribbon again, click the blue bar at the top of the jump host instance of Remote Desktop
Manager. To reset the layout, on the Window tab, click Reset Layout.
Hide the Ribbon and Navigation Pane; it will make it easier to work. The
menus are not needed. Hiding them provides more space in the dashboard.
Use the same Remote Desktop Manager license on the local and remote
instances.
The jump host acts as a relay between the local and the remote systems, it is
possible to use the Remote Desktop Manager license serial that has been
used on the local workstation to register the application on the jump host.
There is no need to add a data source on the jump host. Remote Desktop
Manager opens for first time with a default Local Data Source. This is
sufficient because the application on the jump host only acts as an intermediate
between the local and the remote hosts.
1. On the local Remote Desktop Manager instance, create a session entry as usual. Set the
jump host by clicking on the RDM Jump settings button. The jump host can be Inherited if the
jump host is defined in the parent folder, or choose a specific Session.
2. Click Open Session. The Remote Desktop Manager Jump opens automatically. It looks like
a session in a session.
11.1.3 RDP
11.1.3.1 Restoring the rdp file association w ith mstsc.ex e
DESCRIPTION
If you have elected to do so during the installation, the *.rdp file extension has been associated
with Remote Desktop Manager, this means that is does not use the mstsc.exe client from
Microsoft anymore.
SOLUTION
From an elevated command prompt (run as administrator), run the following command:
ftype RDP.File="%systemroot%\system32\mstsc.exe" "%1"
TIP
Add the command above to the domain logon script to fix all of your users at once.
11.1.4 SSH
11.1.4.1 Configure an SSH Tunnel
DESCRIPTION
DESCRIPTION
The VMware PowerCLI is used by Remote Desktop Manager to interact with vSphere/vCenter
in three distinct cases:
1. Getting the list of virtual machines from a vSphere/vCenter;
2. Performing operations on these virtual machines (start, stop, etc); and
3. Launching a VMware Remote Console.
Some operations are not allowed on the Free edition of VMware Esxi. All
operations acting on the state of the virtual machine need the vSphere API
license.
As a service to our community, we will provide the procedure to get the PowerCLI up and
running. Please remember that this is not a product of Devolutions and that we have no control
over breaking changes that may occur between versions of the PowerCLI. You should always
refer to the manufacturer's documentation.
PROCEDURE
The bitness of both Remote Desktop Manager and the PowerCLI must be
taken into account for this procedure. Since these steps are performed only
once, we would recommend that you follow the procedure for BOTH the 32 bit
and 64 bit editions of the PowerCLI.
1. Ensure that PowerShell's script execution policy is configured. Please refer to Script
Execution Policy.
2. Launch VMware vSphere PowerCLI using the shortcut on your system, this is the 64 bit
version (using Run As Administrator).
3. Launch VMware vSphere PowerCLI (32-Bit), adjust both windows side by side (using Run As
Administrator).
4. In both windows, set the SSL certificate setting of your choice. Obviously deploying a valid
certificate on the vSphere server and trusting the Certification Authority is the most secure
route. In secure environments or in a low-risk setting, we simply set to ignore.
If you see no error messages, you can close both PowerCLIs and you are now ready to test it using Remote
Desktop Manager.
DESCRIPTION
You have 2 different versions of an application installed on your workstation and you want to be
able to use both versions within Remote Desktop Manager.
SETTINGS
When you configure your Application Installation Path in File – Options – Path, separate the
2 paths by a semi-colon (;).
Remote Desktop Manager will prompt you with the selection list and you will be able to pick the
one that you want to use.
EXAMPLE
DESCRIPTION
Many users have requested the ability to automate the login process on a Windows system
through TeamViewer.
Since we are not able to send the password automatically inside the TeamViewer session, you
would need to accomplish this with a typing macro.
First, the typing macro session should look like the following;
Please note that the initial wait has been configured to 5 seconds, this varies depending on
each user system.
Now, in the properties of your Credential entry, you will enable the Allow password in variable
in the Advanced section.
If you have an Advanced Data Source, in Administration – Data Sources Settings (System
Settings) – Password Management, you will need to enable the Allow password in macro
(send keys) option.
The next step happens when the TeamViewer session is opened and credentials are ready to
be entered. Right-click on your credential entry and select Macros/Scripts/Tools -> Send
Credentials (or whatever name you gave your entry).
In conclusion, put the mouse cursor in the appropriate login field and the typing macro will do the
rest.
11.2 Performance
11.2.1 Memory Tuning Of RDP Sessions
DESCRIPTION
RDP sessions using version 8 of the protocol, namely Windows 8 and Windows 2012, consume
more memory than previous versions of the protocol. For those of you that open many sessions
concurrently, this sometimes forced you into using the 64 bit version of Remote Desktop
Manager.
By default, the RDP protocol will reserve a sizable chunk of memory right from the start of a
session for caching purposes, but we have some level of control over that. In the Experience tab
of the RDP session, there is a Cache setting that you can use to control the behavior. It's values
are as follows:
VALUE DESCRIPTION
Default Uses the value set in File – Options – Types – RDP – Cache.
Full Mode The protocol is full Windows 8 Remote Desktop Protocol cache.
Thin client The protocol is limited to using the Windows 7 with SP1 RemoteFX codec
and a smaller cache. All other codecs are disabled. This protocol has
the smallest memory footprint.
Small cache The protocol is the same as Full mode, except it uses a smaller cache.
Choosing Thin client is therefore the choice that limits memory consumption the most, but will
downgrade to the previous version of the protocol. The Small Cache mode may be sufficient for
your needs if you need the newer features of the RDP protocol.
You might wish to set this for all sessions. In this case, go to File – Options – Types – RDP to
assign the default value, then in all of your sessions use Default.
11.3 Security
11.3.1 Blocking MS RDP to Only Use Remote Desktop Manager
DESCRIPTION
SOLUTION
Just blocking Microsoft RDP (mstsc.exe) is still leaving other “surfaces” open for getting
access. One could imagine installing Microsoft RDC Manager or even another copy of Remote
Desktop Manager which would connect with settings that you do not approve.
Indeed, you can force your users to use Remote Desktop Manager by hiding the session
credentials in the application. This will results in the users able to establish the remote
connection without knowing the credentials.
If you feel that disabling Microsoft RDP (mstsc.exe) is sufficient for your needs, it is documented
on
https://social.technet.microsoft.com/wiki/contents/articles/4980.how-to-enable-or-disable-
remote-desktop-via-group-policy-windows-2008.aspx
Our best solution involves going through a gateway that is protected by a password unknown
from the end user. One can achieve this by using a SSH Tunnel or our own Jump feature. The
second step is to adjust the firewalls on the remote hosts to disable connections from IP
addresses other than those use by your approved gateways.
Gateways
SSH tunnels are a very good approaches since they can run on a VM using any *nix distribution
and require limited ram and hdd space.
This will also force your user to use Remote Desktop Manager because the credentials to use a
SSH Tunnel cannot be a domain credential and the information to authenticate will be saved in
Remote Desktop Manager.
DESCRIPTION
Remote Desktop Manager can validate certificates against the certificate store. However,
ensure to only validate certificates from a trusted certification authority.
· Remember a certificate.
· Certificate options.
1. Open the certificate, then verify by which Certification Authority the certificate has been
issued by, in the General tab.
2. Verify that the Certification Authority is properly installed in the certificate store.
REMEMBER A CERTIFICATE
It is possible for Remote Desktop Manager to remember a certificate when prompted to verify it.
Always make sure that the certificate is valid before clicking on any of those choices. Verify the
certificate by clicking View Certificate.
CERTIFICATE OPTIONS
Enable this option to disable the application certificate validation. This is not recommended, as
it would compromise confidentiality and integrity of communications between the client and the
server and could expose the application to potential threats.
Use this option to clear the cached certificates. All certificates would need to be validated again.
TROUBLESHOOTING
To find out more about why the certificate validation failed, you can use some tools, but you need
to export the certificate first.
Certificate Window
TOOLS
Here are some tools that can be used to verify the newly exported certificate:
1. Using PowerShell (requires PowerShell v4):
1.1 In a PowerShell console, replace the path below with the path of your certificate, then run:
$cert=New-Object System.Security.Cryptography.X509Certificates.X509Certificate2("C:\U
1.2 Then, run the following command:
Test-Certificate -Cert $cert
2. Using CMD:
Run the following command (replace the path below with the path of your certificate):
certutil -verify "C:\Users\mmorrissette\Desktop\cert.cer"
The resulting output from those tools can be used to obtain more information about the
encountered issue.
COMMON ISSUES
· Root and Intermediate certificate authority are not properly installed in the Windows certificate store.
· Ensure that the proxy server blocks do not block the CRL (Certificate Revocation List) server as it is required to
validate a certificate.
DESCRIPTION
The Windows Credential Manager allows you to store credentials, such as usernames and
passwords, which you can use to log on to websites or other computers on a network. By storing
your credentials, Windows can automatically log you on to websites or other computers.
Credentials are saved in special folders on your computer called Vaults. Windows and other
programs (such as web browsers) can securely give the credentials in these Vaults to other
computers and websites.
Windows Credentials
For information about saving credentials in Windows, see Credentials Overview. You can also
learn more in the Windows Credential Manager section.
12 Technical Support
Langua English-Français-Deutsch
ge:
Email: [email protected]
Forum: https://forum.devolutions.net/
Subscribers of a paid support plan receive an email address and a plan ID. You should send
your support requests to the appropriate email address and provide your plan ID in the subject
line.
13 Support/Resources
DESCRIPTION
Here are the default keyboard shortcuts for various commands. These can be modified in File –
Options – User Interface – Keyboard.
GENERAL
ACTION SHORTCUT
Filter Ctrl+F
Online Help F1
Refresh F5
EDIT
ACTION SHORTCUT
ACTION SHORTCUT
Delete Ctrl+Del
Duplicate Ctrl+D
Rename Entry F2
ACTIONS
ACTION SHORTCUT
ACTION SHORTCUT
Open Ctrl+Enter
(Embedded/Tabbed)
VIEW
ACTION SHORTCUT
Dashboard Alt+F6
Details F12
Favorites F10
ACTION SHORTCUT
Large Icons F6
Opened Sessions F8
Tiles F3
Tree View F7
NAVIGATION
ACTION SHORTCUT
File Ctrl+Shift+F
ACTION SHORTCUT
ACTION SHORTCUT
IMPORT/EXPORT
ACTION SHORTCUT
DESCRIPTION
PARAMETERS DESCRIPTION
/Session:{session ID}; Specify one or more session IDs (available in the Advanced
{session ID}... Tab of the session).
/UserName:{username}
/Domain:{domain}
/Password:{password}
PARAMETERS DESCRIPTION
/Template:{template ID} Open the template ID with the specified host name and an
optional username/password.
/Host:{host name}
The template ID is the Session ID of the template (available
/UserName:{username} in the Advanced Tab of the template).
/Domain:{domain}
/Password:{password}
/Filter:{filter} Execute the application with the filter filled with a parameter.
USAGE
13.3 Lexicon
DESCRIPTION
Remote Desktop Manager is a feature-rich software that has an extensive set of functionality.
Here are the major concepts that are important to understand in order to use the program to its
full potential.
DATA SOURCE
A container for entries. It can be a local file or a database (either local or shared). You can use
multiple distinct data sources in the application, although only one is considered active at one
point in time. See data source Overview for more information.
ENTRY
All items in your data source are entries. There are multiple types. The entry is an abstract
concept that serves as a container for all specific types.
CREDENTIAL ENTRY
A credential is used to control access to a resource by identifying the user. It can be a classic
username/password pair held by the application or even by an external source.
INFORMATION ENTRY
An information entry can contain various information like account information, emails, serial
numbers. Unlike credential entries, information entries are meant to be shared. Therefore, the
data in the information entries is not encrypted. It's principal use in Remote Desktop Manager is
to hold Web site information, from the URL to the credentials. This allows auto log in on the
specified web site.
CONNECTION
Any type of entry that allows you to connect to a remote host, service or device is a connection.
An IP address or host name is normally used, as well as credentials.
SESSION
In Remote Desktop Manager infancy, it was mainly aimed at managing Microsoft Remote
Desktop. A Session was a term that was in use back then to describe a connection to Microsoft
Remote Desktop Services. It appears widely in our documentation. Any technology that
connects to something and that needs to use authentication is a Session.
13.4 Follow Us
OVERVIEW
Get the hottest information about our products - tips and tricks, case studies and new release
announcements!
This is not a marketing newsletter. We focus on the issues that matter to you, whether you're
looking for up-to-the-minute software tutorials, additional outside resources or a peek at how
others are using our products.
Links
RSS feeds
YouTube
Blog
Forum
Spiceworks
DESCRIPTION
This section contains the documentation of the Add-ons for Remote Desktop Manager. Not all
Add-ons are provided by Devolutions but we'll do our best to cover what we host in our add-on
repository.
See Add-on Manager for more details on how to install or manage Add-ons.
See topics below for more information about more complex Add-ons:
· Bomgar Representative Console Add-on
· DbVisualizer Add-on
· NoMachine Add-on
· PenguiNet SSH Client Add-on
· SAP Frontend Server (SAP GUI) Add-On
· Shutdown Application Tool Add-on
· SQL Server Management Studio Add-On
DESCRIPTION
With this Add-on you will be able to define a session that will can automatically:
· Login
The Bomgar Representative Console entry type is available when the Bomgar
Representative Console Add-on is installed.
Make sure that you have a bomgar-rep.exe file in the installation folder of
Bomgar. You need the same file to be present in each site that you will create.
Then, go in File – Options – Path – Bomgar Representative and configure
Remote Desktop Manager to point on the appropriate installation folder.
SETTINGS
OPTION DESCRIPTION
Bomgar site Select the Bomgar site to login. To create the Bomgar site
properly, you need to create a folder for each of your sites. In
each folder, make sure that bomgar-rep.exe is also present.
Example:
· C:\Program Files\Bomgar\Representative\Site1
· C:\Program Files\Bomgar\Representative\Site2
Starting method Start a pinned client session with a search string: Start a
client session with a search string. Indicate the
Host/Description in the appropriate field.
Start a script file name on local disk: Start a script from disk.
Indicate the script in the Script Filename field.
OPTION DESCRIPTION
DESCRIPTION
SETTINGS
Db Visualizer
OPTION DESCRIPTION
OPTION DESCRIPTION
DESCRIPTION
This entry is used to define and configure a "NoMachine" session. This allows you
to store in Remote Desktop Manager each NoMachine profile as a distinct
session, so that you can connect automatically to different computers (exactly like
RDP sessions).
The NoMachine entry type is available when the NoMachine Add-on is installed.
SETTINGS
NoMachine entry
OPTION DESCRIPTION
Starting Using profile file name on local disk: The session will be linked to
method an existing profile (file) on a computer and it will be dependent on it.
DESCRIPTION
This entry is used to define and configure a "PenguiNet SSH Client" session.
PenguiNet is a simple all-in-one SSH client for Windows. It also includes an SCP
browser so that you can easily transfer files with just a few mouse clicks.
The PenguiNet SSH Client entry type is available when the PenguiNet SSH Client
Add-on is installed.
SETTINGS
OPTION DESCRIPTION
Start a Secure CoPy Allow to start a Secure CoPy session (SCP). Secure CoPy or
session (SCP) SCP is a means of securely transferring computer files
between a local host and a remote host or between two
remote hosts.
OPTION DESCRIPTION
· Telnet
· SSH
OPTION DESCRIPTION
· SCP
Terminal type Determinate the terminal type that you want to use. Select
between:
· Linux
· VT100
· Xterm
Don't use SOCKS Disallow the use of a SOCKS Server to connect with
Server PenguiNet.
DESCRIPTION
This entry is used to define and configure an "SAP Frontend Server (SAP GUI)"
session. This allows you to start sessions selected from your saplogon.ini files
located anywhere on your computer.
The SAP GUI entry type is available when the SAP Frontend Server (SAP GUI)
Add-on is installed.
SETTINGS
SAP GUI
The SAP Frontend Server (SAP GUI) add-on does not allow you to insert
connection information manually without selecting a saplogon.ini file first.
FEATURES
REQUIREMENTS
LIMITATIONS
DESCRIPTION
The Shutdown Application Tool allows you to shutdown or restart one or many
computers at the same time.
The Shutdown Application Tool is available when the Shutdown Application Tool
Add-on is installed.
SETTINGS
The Shutdown Application Tool is accessible from the Dashboard under the
Macros/Scripts/Tools section.
USAGE
Select one or several computers that you want to restart or shutdown in the Navigation Pane and
click on Shutdown/Restart Computer in the Dashboard.
Select the option that want those computer(s) to do, enter a comment and click on Execute.
DESCRIPTION
This entry is used to define and configure an "SQL Server Management Studio"
session. This allows you to launch and perform authentication to an instance.
Optionally you can select a database, as well as open a script in the editor. SQL
Server Management Studio is primarily a GUI tool, if you need to run commands
and exit automatically, you should look at the SQLCMD tool that comes with the Sql
Server utilities.
The SQL Server Management Studio entry type is available when the SQL Server
Management Studio Add-on is installed.
SETTINGS
OPTION DESCRIPTION
OPTION DESCRIPTION
Net Only (Integrated Use to make connections that are made from computers that
security only) are not on the customer's domain.
Default query file Specifies a file that will be opened in the editor. Please see
(Optional) note below
Show splash screen Indicates to let Sql Server Management Studio display its
splash screen.
NOTE
On some systems, specifying a file to open in the editor has the side effect of preventing the
Object Explorer from being connected. This renders the add-on useful only for when you want to
run the script and exit soon after. If you need to use the Object Explorer do not specify a script
file.
DESCRIPTION
Multiple VPN Add-ons can be installed using Remote Desktop Manager Add-on Manager.
We support a very wide variety of VPN Add-ons, explore them to your heart's content.
Consult the three topics below for examples on what our VPN Add-ons look like:
· Cisco AnyConnect
· Generic VPN
· OpenVPN
DESCRIPTION
Cisco AnyConnect VPN Client Add-on can be used to connect to your Cisco
AnyConnect VPN session.
The Cisco AnyConnect will not be able to see if the VPN is already open on its
own.
DESCRIPTION
Generic VPN Add-on can be used to connect to your Generic VPN session.
Generic VPN
13.5.8.3 OpenVPN
DESCRIPTION
OpenVPN
INFORMATION
For the Certificate and Key fields it's important that your files are into the same folder as the
*.ovpn files.
DESCRIPTION
The following recommendations are provided for new and experienced users alike. Remote
Desktop Manager has a lot of flexibility and sometimes we are faced with so many choices that
we aren't sure of the proper decision to make or its impacts. Read below to find out what our
own AND the community's experience has shown is the preferred way of operating Remote
Desktop Manager in various scenarios.
Most of these recommendations apply to the Enterprise Edition because the range of options is
so much greater then the Free Edition.
13.6.1 Data Backups
DESCRIPTION
It is recommended to always have a current backup of your data source. Since we support a
wide range of data stores, you should use the best solution for you chosen data source.
AMAZON S3
Devolutions Password Server use a SQL Server database to store the data. We
recommend creating a maintenance plan to perform automatic backups regularly.
This topic is a good start on the subject: Setting up a Maintenance Plan to Backup
Databases.
DROPBOX
FTP
MARIADB
MICROSOFT ACCESS
Our recommended backup solution is to use our free Online Backup Service.
MYSQL
ONLINE DATABASE
The protection offered by Online Database is for Disaster recovery only, for
instance a hardware failure. Note that we cannot restore a backup of a single
database. Using our Entry History and our View Deleted features, you can revert
any change on specific sessions.
ONLINE DRIVE
Our recommended backup solution is to use our free Online Backup Service.
SFTP
SQLITE
Our recommended backup solution is to use our free Online Backup Service.
WEB
XML
Our recommended backup solution is to use our free Online Backup Service.
DESCRIPTION
Remote Desktop Manager allows to handle credentials in multiple ways for a team environment.
This brings flexibility, but at the cost of creating difficulty when you need to choose an
implementation for a particular requirement.
Below are multiple methods to handle credentials. You may choose one or many depending on
your requirements. We often see scenarios where our clients manage their own infrastructure, as
well as their customers. Group entries in folders depending on the kind of credential
management that you must use. Each of these folders could use a different scheme.
PREAMBLE
Here are a few notions to know prior to getting to the scenarios, as they are at the core of the
usage of Remote Desktop Manager:
INHERITED CREDENTIALS
Credentials can be set at different levels, such on the entries themselves or on their parent
folders. The latter enables entries to inherit credentials from a parent folder. Whenever using
inherited credentials, the credential resolver will go up a level and use the credentials set on the
parent folder. If the inheritance is set on a folder, the resolver simply continues up to the next
parent.
PRIVATE VAULT
The Private Vault, available for Advanced Data Sources, allows to create entries available only
to their owner. In the cases where a user must use a credential that is exclusive to them, using
the Private Vault is the logical choice.
SPECIFIC SETTINGS
Specific Settings allow you to override some settings of the entries in the data source. One of
the most typical use for this is to override the credentials of the entry for a specific user. Specific
settings can override credentials, session types, folders, etc.
SCENARIOS
The credential entries are referenced directly in the properties of sessions. Select Credential
repository, then select the existing credential entry from the data source.
If the credentials are the same for more than one device, store the sessions in a folder which the
credential entry is assigned to, and set the sessions to use the inherited credential mode.
Use the User Specific Settings. Type the credentials directly or refer a credential entry in the
Private Vault (recommended).
The shared credential entries are referenced directly in the properties of sessions. Admins use
User Specific Settings to override the credentials, usually to refer a credential entry in the
Private Vault.
To change the credentials of multiple entries at once, the following features might help you out:
BATCH EDIT
The Batch Edit feature allows to modify multiple entries at once. This feature can be used to
apply a set of credentials on multiple entries.
POWERSHELL
The PowerShell CmdLet of Remote Desktop Manager allows to massively update entries. The
script below will set all folders to use the inherited credential mode.
Always have a backup of the data source before running a PowerShell script.
cls
Write-Host "Fixing Groups...`n"
$entries = Get-RDMSession | where {$_.Kind -eq "Group"}
Write-Host "`nDONE!"
DESCRIPTION
Credentials management is one of the main strengths of Remote Desktop Manager. Although
you can specify the credentials directly in the properties of entries, we recommend linking
credentials to entries. This has the following advantages:
· The linked credential entry is the only one requiring modifications if necessary, rather than
change every entry affected by it.
· When necessary, Permissions can be customized for an entry to better suit your needs
(when an Advanced Data Source is used).
13.6.4 Use VPN Entries
DESCRIPTION
Although you can specify VPN details directly in the entry's settings, using a VPN entry should
provide better results. This has the following advantages.
· Only that specific VPN entry requires maintenance when modifications are necessary.
· When necessary, Permissions can be customized for an entry to better suit your needs
(when an Advanced Data Source is used).
DESCRIPTION
It's possible to create a Macros/Scripts/Tools session that contain a web link. This
Macros/Scripts/Tools can be launched from the dashboard.
SETTINGS
Template Creation
5. After the creation of the template, create a new entry Macros/Scripts/Tools - Template. This
isn't done through the Template menu from step 1 - 4, use the Add Entry feature to locate a
Template in the Macros/Scripts/Tools.
6. Click on the ellipsis to select your newly created template and check the box Keep template
host. You can also opt to keep whichever part of the credentials you would want.
7. You can now launch the web link (website) from the Tree View.
13.7.2 How to apply policies
DESCRIPTION
Administrative Templates facilitates the management of registry-based policy settings that can
be applied on the computer and/or the user configuration. Group policy (GPO) is a tool for
organizations to enforce settings on their computers and allows to harden Remote Desktop
Manager security.
The Administrative Templates are simply registry settings that are enforced by
domains. They contain registry keys that can also be set on computers that are
not joined to domains. Proper Access Control Lists (ACL) must be put in place to
prevent users from modifying registry settings in this case. Refer to the tables
below to find the registry key for each policy setting.
To learn more on how to deploy the Remote Desktop Manager Administrative Templates on
your domain please refer to the Microsoft Online Help.
The admx file is distributed with Remote Desktop Manager, you will find it in a Policies sub-
folder. By default the path is C:\Program Files (x86)\Devolutions\Remote Desktop
Manager\Policies.
SETTINGS
In the console tree, click the folder under Administrative Templates that contains the policy
settings you want to configure.
GENERAL
SECURITY
SESSIONS
USER INTERFACE
Options ktopManager\DisableImportExportOptions
ktopManager\EnableMergeCredentialListWithS
essions
NOTES
DESCRIPTION
A proper backup will cover both your data and your settings.
BACKUP
DATA
Your data is stored in your data source. Please consult Data Source Backups for more details.
SETTINGS
You can export your settings via the Export Options wizard of Remote Desktop Manager.
DESCRIPTION
You can create Password Manager Pro credential entries in Remote Desktop Manager,
however a Password Manager Pro account needs to be created and configured in the
application prior to the utilization.
SETTINGS
1. Connect to your Password Manager Pro server (https://localhost:7272) using your admin
account.
Users
4. In the Host Name field, enter the name of the computer where the API user will be use.
5. Enable the REST API to have a API Auth Token key generated
Auth Tok en
Copy the Auth token key in your clipboard. You will need it to configure Password
Manager Pro in Remote Desktop Manager.
6. Now, go inside Remote Desktop Manager and click on File – My Account Settings –
Password Manager Pro.
New User
8. Enter the username of the API User that you have created in Password Manager Pro in the
Username field, enter the appropriate computer name in the Workstation field and paste
the Auth Token key that you have copied on step 5 in the Token field and click on OK.
New User
9. You can now create a Password Manager Pro credential entry in Remote Desktop Manager
Credential Entry
DESCRIPTION
SETTINGS
Admin Tab
2. Click on Extensions in the Administration section and select Browse Online Extensions.
Extensions
4. Now that the extension is installed, you can create your ScreenConnect session. In the Advanced tab,
change the version for Extension (Version 5 or higher).
5. You can also select Default in the drop down list instead of Extension (Version 5 or higher). If
you select Default, you'll need to configure the ScreenConnect version that you wish to use in File –
Options – Types – ConnectWise Control.
DESCRIPTION
Remote Desktop Manager has the option to use Google Authenticator to provide an additional
security layer when the application starts.
SETTINGS
Before you start the configuration, make sure you have installed the Google
Authenticator application on your Android device, Blackberry or on your Apple
product.
1. Click on File – Options – Security and select Require Google Authenticator in the 2-
Factor Authentication section. Then click on Configure to set up your Google Authentication.
Google Authenticator
2. Scan the QR code on your screen with the Google Authenticator application to setup Remote
Desktop Manager in Google Authenticator.
When Remote Desktop Manager is configured in Google Authenticator, enter the Validation
code provided by Google Authenticator in Remote Desktop Manager.
4. Relaunch Remote Desktop Manager to be prompted for the Google Authenticator code.
DESCRIPTION
Remote Desktop Manager allows you to configure a Yubikey to provide an additional security
layer when the application starts.
SETTINGS
Before starting the configuration, make sure you have a Yubikey in your
possession.
2. Click on File – Options – Security and select Require Yubikey authentication in the 2-
Factor authentication section. Press and hold the gold button on the Yubikey to have the code
in Remote Desktop Manager and click OK.
Yubik ey Authentication
4. Press and hold the gold button on the Yubikey and access will be granted.
13.7.8 How to Disable Remote Desktop Manager Auto Update
DESCRIPTION
Remote Desktop Manager frequently offers new updates to release new features, improvements
as well as fixes. If you don't want to receive the update notifications, you can disable it in the
options.
SETTINGS
In Remote Desktop Manager, uncheck both options “Check for update at startup” and
“Includes Beta versions” in File – Options – General – Application Start.
DESCRIPTION
You need the KeePass plug-in to send the credential to Remote Desktop Manager (RDM).
1. Due to the changes made in RDM with add-on, you will need to download the Keepass plugin
manually using this link :
https://remotedesktopmanager.com/download/Devolutions.RemoteDesktopManager.KeePa
ssPlugin.2.1.2.0.zip.
2. When the download is finished, copy the .dll files in the Keepass installation folder (you can
locate your KeePass installation folder with the help of the Keepass Help Center).
The KeePass application must be running and the database must be opened
3. In RDM create a KeePass entry. You can validate that the KeePass plug-in is now installed.
Remote Desktop Manager will by default select the database; this option can be overridden by
manually entering the path. RDM also can support linking to multiple KeePass databases
simultaneously. Add all the paths separated by semicolons.
4. In the Advanced tab choose your preferred method. It is where you can enter your Universal
Unique Identifier (Uuid) and the name of the entry in the database, or to always be prompt
with a list.
DESCRIPTION
To register the license serial of Remote Desktop Manager in the data source in a version prior
to 2019.2.24, go to Administration - System Settings.
In the System Settings window, go in the Serial Number section. Enter the license serial and
click OK.
DESCRIPTION
Refer to the Installation Overview topic for details on the installation of Remote Desktop
Manager.
SETTINGS
After Remote Desktop Manager has been reinstalled on your computer, you need to copy your
RemoteDesktopManager.cfg (that you had backed up) to the %LocalAppData%
\Devolutions\RemoteDesktopManager folder. This is the default path. If you have not
installed with the default settings, please consult Configuration File Location for instructions on
locating your configuration folder.
DATA
If you have moved the file based data source to another relative path, you will have to edit the
data source definitions to fix the paths.
DESCRIPTION
When an application error occurs in Remote Desktop Manager, you can send the error report to
the Devolutions' support team.
The strength of Remote Desktop Manager comes in great part from its
community of users and we depend on you to not only send in those reports, but
to do it with as much information as possible. We often already have the solution,
so please use your real email address.
WORKFLOW
Details
4. Fill in your information and add as many details as you can before pressing Send such as:
It's really important that you enter your email address, name and company name
before you send the report, so that the Devolutions support team can contact you.
· The feature that you were using;
· The steps that you performed to get the error;
· Has this error occurred more than once;
· Are you the only one in your team to have the error; etc.
DESCRIPTION
The Support team, QA department or engineering department may request some file(s) for
investigation on a specific scenario or to troubleshoot a certain issue.
SOLUTION
Devolutions has a secure way to transfer file(s) between a customer and us. We use ShareFile
to transfer the data securely.
DESCRIPTION
The Devolutions support team may ask for the application logs to help you in certain situation.
Here is how to send it to the support team.
WORKFLOW
2. Select the Report tab. Then click on the Send to Support button.
Report Tab
3. Fill the Email, Company and Name field with your information (your email address, your
Company name and your name) and click on OK to send the report.
The Devolutions support team may ask for your configuration file to help you in certain situations.
Here's how to send a clean configuration file to the support team.
2. Remove any sensitive information's and save the file on your computer. The file name will be
RemoteDesktopManager.cfg.
3. In order for us to provide you a secure link to share your file, send an email to
[email protected].
DESCRIPTION
SSH tunneling is used to create an encrypted connection over an untrusted network. It consists
of an encrypted tunnel created through an SSH protocol, providing secure connections for data
transfer. The SSH Tunnel can be used to establish sort of a virtual private network (VPN) to
access services across firewalls.
This is the procedure to establish a basic SSH Tunnel to reach a remote machine.
To create an SSH tunnel, local connections through a specified port must be forwarded to an
SSH server.
To create an SSH tunnel a given port of one machine needs to be forwarded to a port on the
other machine which will be the other end of the tunnel. Once the SSH tunnel has been
established, the user can connect to earlier specified port at first machine to access the network
service.
OPTION DESCRIPTION
Host Set the IP address of the SSH Server. (please refer to 1 in the Tunnel
diagram)
Port Set the port of the SSH Server. The default port is 22. (please refer to in the
Tunnel diagram)
OPTION DESCRIPTION
Local The local address must be left to 127.0.0.1. (please refer to in the Tunnel
address diagram)
Local port In most cases leave the local port to its default value 3390. (please refer to
‚ in the Tunnel diagram)
Remote Enter the host or IP address of your remote client. (please refer to … in the
host Tunnel diagram)
Remote Set the final port that you must reach, in most cases leave it to it's default
port value 3389. (please refer to † in the Tunnel diagram)
At this time, you can launch your entry to see if indeed the tunnel has been opened successfully.
Close the session.
RDP entry
OPTION DESCRIPTION
Host Enter your Local address which is 127.0.0.1. (please refer to in the
Tunnel diagram)
Port Enter your Local port which is 3390. (please refer to ‚ in the Tunnel
diagram)
In the VPN/SSH/Gateway side menu of your RDP session select Always connect in the Open
field and Session in the Type field.
In the VPN – Settings tab, click on the drop down list next to Session and select your SSH
Tunnel entry previously created.
You now have configured your session with the following rule: for each connection that comes on
interface 127.0.0.1 and port 3390, forward that connection to the SSH server and request the
server to forward that connection to your Remote host.
You can now launch your RDP session, your SSH Tunnel will open, establish the connection and
then launch and open your RDP session.
DESCRIPTION
In Remote Desktop Manager you can manage two or more active SSH session with Broadcast
actions.
3. Select all the required session in the list and close the window.
You can now broadcast commands on all the sessions at the same time.
To remove a session from the broadcast, you can either bring the Manage Broadcast window
to uncheck the session, or on the specific SSH tab, right-click to bring the menu, click
Broadcast Input, then Remove from Broadcast.
13.7.17 How to Setup Remote Desktop Manager to Receive New Update
DESCRIPTION
Remote Desktop Manager frequently offers new updates to release new features,
improvements, as well as fixes. If you always want to use the latest version of Remote Desktop
Manager, follow the steps below.
SETTINGS
1. In the application, check both options “Check for update at startup” and “All updates
including beta” in File – Options – General – Application Start.
2. Subscribe to the Announcements Forums to be aware of all the latest announcements on our
products.
13.7.18 How to Setup the Usage of the Session Credentials to Launch a Tool
DESCRIPTION
To run some tools, specific credentials needs to be sent through the remote session. By default,
the credential used by a tool are the one from the Windows session. Sometime with those
credentials you will not have enough privileges to run the tool. This is why you need to use the
credential of the session instead.
SETTINGS
You can specify the usage of the session credentials for a session in Management Tools –
Credentials – Use session credentials.
We also recommend that you configure your Default Settings of the entry type that need this
setting by default.
13.7.19 How to Subscribe to the Announcements Forums
DESCRIPTION
You can be notified when new product updates are available by subscribing to announcements
on our forum at https://forum.devolutions.net/
If you wish to subscribe to the announcements for Remote Desktop Manager, click on the
following link : https://forum.devolutions.net/forum20-remote-desktop-manager--
announcements.aspx
Devolutions Forum
The procedure is the same for all forums, below are the Announcement forums that exist at this
time for our various products.
https://forum.devolutions.net/forum43-remote-desktop-manager-mac--announcements.aspx
· Devolutions Account:
https://forum.devolutions.net/forum31-remote-desktop-manager-online--announcements.aspx
https://forum.devolutions.net/forum32-remote-desktop-manager-server--announcements.aspx
· Wayk Now:
https://forum.devolutions.net/forum68-wayk-now--announcement.aspx
DESCRIPTION
This feature simply uses a basic mechanism offered by the .net framework of
sending keystrokes, much like if a person was using the keyboard. It sends the
keystrokes to the operating system itself, they will be handled by WHATEVER
application has the focus at the time that the message is received. If the focus
is switched to another window, the credentials will most likely be revealed by
being typed in a text area.
SETTINGS
1. Edit your Web Browser (http/https) entry, click on the Login tab, and unchecked the Auto submit and Auto
fill login option.
Autofill
2. In the Security Settings section, check the Allow password in variable option. This option
need to be checked so that the typing macro can send the password to the remote session.
Using an Advanced Data Sources, the option Allow password in macro (send
keys) in Administration - Data Source Settings (System Settings) - Password
Management also needs to be enabled.
3. In the Events section, click on the After Connect tab and add the following macro in the
Typing Macro section: $USERNAME${TAB}$PASSWORD${ENTER}. You may have to
adjust the Initial wait to leave time for the page to load.
Typing macro
Make sure that the cursor is in the appropriate field prior to the macro execution
so that the username and password can be sent properly to the website.
DESCRIPTION
The "Theme system" of Remote Desktop Manager is still in its infancy and will evolve in future
releases. You can override most images used by Remote Desktop Manager simply by providing
an image in the Theme folder, the only requirement is that the file uses a specific name. Most
images come in pair, a small one and a large one. You must override both in order to be
consistent.
FOLDER LOCATION
The Theme folder can be found in your local configuration folder, under the Images folder.
TRAY ICON
It must be a standard *.ico file containing at least a 16*16 image. The name must be
Trayicon.ico.
SMALL IMAGES
LARGE IMAGES
For instance for the Folder type, the image names are: GroupFolderLarge.png and
GroupFolderSmall.png. Another example is for RDP sessions, their name is RDPConfigured,
resulting in SessionRDPConfiguredLarge.png and SessionRDPConfiguredSmall.png.
DESCRIPTION
Here is a partial list of images that are possible to override using the theme folder.
IMAGES
Trayicon.ico
2XClientLarge.png
2XClientSmall.png
AmmyyAdminLarge.png
AmmyyAdminSmall.png
AnydeskLarge.png
AnydeskSmall.png
AnyplaceControlLarge.png
AnyplaceControlSmall.png
AwrcProLarge.png
AwrcProSmall.png
AxelViewerLarge.png
AxelViewerSmall.png
AzureStorageExplorerLarge.png
AzureStorageExplorerSmall.png
BarracudaNgFirewallLarge.png
BarracudaNgFirewallSmall.png
BitviseSshClientLarge.png
BitviseSshClientSmall.png
BomgarRepresentativeConsoleLarge.png
BomgarRepresentativeConsoleSmall.png
CiscoAsdmLarge.png
CiscoAsdmSmall.png
CitrixNetscalerLarge.png
CitrixNetscalerSmall.png
ContactCompanyLarge.png
ContactCompanySmall.png
ContactCustomerLarge.png
ContactCustomerSmall.png
ContactDefaultLarge.png
ContactDefaultSmall.png
ContactEmployeeLarge.png
ContactEmployeeSmall.png
ContactFamillyLarge.png
ContactFamillySmall.png
ContactSupplierLarge.png
ContactSupplierSmall.png
ContactSupportLarge.png
ContactSupportSmall.png
CredentialAppleKeychainLarge.png
CredentialAppleKeychainSmall.png
CredentialAuthAnvilPasswordServerLarge.png
CredentialAuthAnvilPasswordServerSmall.png
CredentialChromePasswordManagerLarge.png
CredentialChromePasswordManagerSmall.png
CredentialConnectionStringLarge.png
CredentialConnectionStringSmall.png
CredentialDefaultLarge.png
CredentialDefaultSmall.png
CredentialFirefoxPasswordManagerLarge.png
CredentialFirefoxPasswordManagerSmall.png
CredentialKeePassLarge.png
CredentialKeePassSmall.png
CredentialLastPassLarge.png
CredentialLastPassSmall.png
CredentialOnePasswordLarge.png
CredentialOnePasswordSmall.png
CredentialPMProLarge.png
CredentialPMProSmall.png
CredentialPasswordBoxLarge.png
CredentialPasswordBoxSmall.png
CredentialPasswordSafeLarge.png
CredentialPasswordSafeSmall.png
CredentialPasswordVaultManagerLarge.png
CredentialPasswordVaultManagerSmall.png
CredentialPasswordstateLarge.png
CredentialPasswordstateSmall.png
CredentialPleasantPasswordServerLarge.png
CredentialPleasantPasswordServerSmall.png
CredentialPrivateKeyLarge.png
CredentialPrivateKeySmall.png
CredentialSecretServerLarge.png
CredentialSecretServerSmall.png
CredentialWindowsVaultLarge.png
CredentialWindowsVaultsmall.png
DataEntryAlarmLarge.png
DataEntryAlarmSmall.png
DataEntryBankInfoLarge.png
DataEntryBankInfoSmall.png
DataEntryCredentialLarge.png
DataEntryCredentialSmall.png
DataEntryCreditCardLarge.png
DataEntryCreditCardSmall.png
DataEntryCustomLarge.png
DataEntryCustomSmall.png
DataEntryEmailAccountLarge.png
DataEntryEmailAccountSmall.png
DataEntryPassportLarge.png
DataEntryPassportSmall.png
DataEntrySafetyDepositLarge.png
DataEntrySafetyDepositSmall.png
DataEntrySecureNoteLarge.png
DataEntrySecureNoteSmall.png
DataEntrySerialLarge.png
DataEntrySerialSmall.png
DataEntryWalletLarge.png
DataEntryWalletSmall.png
DataEntryWebLarge.png
DataEntryWebSmall.png
Database.NetLarge.png
Database.NetSmall.png
DbVisualizerLarge.png
DbVisualizerSmall.png
DocumentCertificateLarge.png
DocumentCertificateSmall.png
DocumentDefaultLarge.png
DocumentDefaultSmall.png
DocumentExcelLarge.png
DocumentExcelSmall.png
DocumentImageLarge.png
DocumentImageSmall.png
DocumentOneNoteLarge.png
DocumentOneNoteSmall.png
DocumentPDFLarge.png
DocumentPDFSmall.png
DocumentPhoneBookLarge.png
DocumentPhoneBookSmall.png
DocumentPowerPointLarge.png
DocumentPowerPointSmall.png
DocumentTextLarge.png
DocumentTextSmall.png
DocumentVisioLarge.png
DocumentVisioSmall.png
DocumentWordLarge.png
DocumentWordSmall.png
EricomBlazeClientLarge.png
EricomBlazeClientSmall.png
FileExplorerLarge.png
FileExplorerSmall.png
FlashfxpLarge.png
FlashfxpSmall.png
GateprotectFirewallAdministrationClientLarge.png
GateprotectFirewallAdministrationClientSmall.png
GroupCompanyLarge.png
GroupCompanySmall.png
GroupCustomerLarge.png
GroupCustomerSmall.png
GroupDatabaseLarge.png
GroupDatabaseSmall.png
GroupDeviceLarge.png
GroupDeviceSmall.png
GroupDomainLarge.png
GroupDomainSmall.png
GroupFolderLarge.png
GroupFolderSmall.png
GroupIdentityLarge.png
GroupIdentitySmall.png
GroupPrinterLarge.png
GroupPrinterSmall.png
GroupRootLarge.png
GroupRootSmall.png
GroupServerLarge.png
GroupServerSmall.png
GroupSiteLarge.png
GroupSiteSmall.png
GroupSoftwareLarge.png
GroupSoftwareSmall.png
GroupWorkstationLarge.png
GroupWorkstationSmall.png
HeidisqlLarge.png
HeidisqlSmall.png
HpIntegratedLightsOutLarge.png
HpIntegratedLightsOutSmall.png
IbmPersonalCommunicationsLarge.png
IbmPersonalCommunicationsSmall.png
IslLightDeskLarge.png
IslLightDeskSmall.png
JavaWebStartLarge.png
JavaWebStartSmall.png
MacroScriptAppleScriptLarge.png
MacroScriptAppleScriptSmall.png
MacroScriptAutoHotKeyLarge.png
MacroScriptAutoHotKeySmall.png
MacroScriptAutoITLarge.png
MacroScriptAutoITSmall.png
MacroScriptCommandLineLarge.png
MacroScriptCommandLineSmall.png
MacroScriptDatabaseQueryLarge.png
MacroScriptDatabaseQuerySmall.png
MacroScriptJitBitLarge.png
MacroScriptJitBitSmall.png
MacroScriptMacroLarge.png
MacroScriptMacroSmall.png
MacroScriptPSExecLarge.png
MacroScriptPSExecSmall.png
MacroScriptPowerShellLarge.png
MacroScriptPowerShellLocalLarge.png
MacroScriptPowerShellLocalSmall.png
MacroScriptPowerShellSmall.png
MacroScriptTemplateLarge.png
MacroScriptTemplateSmall.png
MacroScriptVBScriptLarge.png
MacroScriptVBScriptSmall.png
MacroScriptWASPPowerShellLarge.png
MacroScriptWASPPowerShellSmall.png
MacroScriptWMILarge.png
MacroScriptWMISmall.png
MobaxtermLarge.png
MobaxtermSmall.png
MysqlGuiToolsLarge.png
MysqlGuiToolsSmall.png
MysqlworkbenchLarge.png
MysqlworkbenchSmall.png
NavicatPremiumLarge.png
NavicatPremiumSmall.png
NetopGuestLarge.png
NetopGuestSmall.png
NetsupportManagerLarge.png
NetsupportManagerSmall.png
NomachineLarge.png
NomachineSmall.png
NxClientLarge.png
NxClientSmall.png
OfficeWord,ExcelAndPowerPointLarge.png
OfficeWord,ExcelAndPowerPointSmall.png
PdfLarge.png
PdfSmall.png
PenguinetSshClientLarge.png
PenguinetSshClientSmall.png
PgadminIiiLarge.png
PgadminIiiSmall.png
PowertermProLarge.png
PowertermProSmall.png
ProxyNetworks-ProxyMasterLarge.png
ProxyNetworks-ProxyMasterSmall.png
RemoteUtilities-ViewerLarge.png
RemoteUtilities-ViewerSmall.png
Remoteassistant365Large.png
Remoteassistant365Small.png
RoyalTsLarge.png
RoyalTsSmall.png
RvtoolsLarge.png
RvtoolsSmall.png
SapGuiLarge.png
SapGuiSmall.png
SapNetweaverLarge.png
SapNetweaverSmall.png
Sccm2012RemoteControlLarge.png
Sccm2012RemoteControlSmall.png
SecurecrtLarge.png
SecurecrtSmall.png
SecurefxLarge.png
SecurefxSmall.png
SessionADConsoleLarge.png
SessionADConsoleSmall.png
SessionAddOnLarge.png
SessionAddOnSmall.png
SessionAppleRemoteDesktopLarge.png
SessionAppleRemoteDesktopSmall.png
SessionAwsLarge.png
SessionAwsSmall.png
SessionAzureLarge.png
SessionAzureSmall.png
SessionAzureTableStorageLarge.png
SessionAzureTableStorageSmall.png
SessionCitrixWebLarge.png
SessionCitrixWebSmall.png
SessionCommandLineLarge.png
SessionCommandLineSmall.png
SessionComputerLarge.png
SessionComputerSmall.png
SessionContactLarge.png
SessionContactSmall.png
SessionCredentialLarge.png
SessionCredentialSmall.png
SessionDamewareLarge.png
SessionDamewareSmall.png
SessionDataEntryLarge.png
SessionDataEntrySmall.png
SessionDataReportLarge.png
SessionDataReportSmall.png
SessionDatabaseLarge.png
SessionDatabaseSmall.png
SessionDeskRollLarge.png
SessionDeskRollSmall.png
SessionDocumentLarge.png
SessionDocumentSmall.png
SessionDropBoxLarge.png
SessionDropBoxSmall.png
SessionFtpLarge.png
SessionFtpSmall.png
SessionGatewayLarge.png
SessionGatewaySmall.png
SessionGroupLarge.png
SessionGroupSmall.png
SessionHostLarge.png
SessionHostSmall.png
SessionHpRgsLarge.png
SessionHpRgsSmall.png
SessionHyperVLarge.png
SessionHyperVSmall.png
SessionICALarge.png
SessionICASmall.png
SessionIntelAMTLarge.png
SessionIntelAMTSmall.png
SessionInventoryReportLarge.png
SessionInventoryReportSmall.png
SessionItermLarge.png
SessionItermSmall.png
SessionLogMeInLarge.png
SessionLogMeInSmall.png
SessionPCAnywhereLarge.png
SessionPCAnywhereSmall.png
SessionPlayListLarge.png
SessionPlayListSmall.png
SessionPowerShellLarge.png
SessionPowerShellSmall.png
SessionPuttyLarge.png
SessionPuttySmall.png
SessionRDPConfiguredLarge.png
SessionRDPConfiguredSmall.png
SessionRadminLarge.png
SessionRadminSmall.png
SessionRemoteAssistanceLarge.png
SessionRemoteAssistanceSmall.png
SessionS3Large.png
SessionS3Small.png
SessionSNMPReportLarge.png
SessionSNMPReportSmall.png
SessionScreenConnectLarge.png
SessionScreenConnectSmall.png
SessionSessionToolLarge.png
SessionSessionToolSmall.png
SessionSkyDriveLarge.png
SessionSkyDriveSmall.png
SessionSpiceworksLarge.png
SessionSpiceworksSmall.png
SessionSyncLarge.png
SessionSyncSmall.png
SessionTeamViewerLarge.png
SessionTeamViewerSmall.png
SessionTerminalConsoleLarge.png
SessionTerminalConsoleSmall.png
SessionVMRCLarge.png
SessionVMRCSmall.png
SessionVMWareConsoleLarge.png
SessionVMWareConsoleSmall.png
SessionVMWareLarge.png
SessionVMWareSmall.png
SessionVNCLarge.png
SessionVNCSmall.png
SessionVPNLarge.png
SessionVPNSmall.png
SessionVirtualBoxLarge.png
SessionVirtualBoxSmall.png
SessionVirtualPCLarge.png
SessionVirtualPCSmall.png
SessionWebBrowserLarge.png
SessionWebBrowserSmall.png
SessionWindowsVirtualPCLarge.png
SessionWindowsVirtualPCSmall.png
SessionXWindowLarge.png
SessionXWindowSmall.png
SessionXenServerLarge.png
SessionXenServerSmall.png
SmartftpLarge.png
SmartftpSmall.png
SqlServerManagementStudioLarge.png
SqlServerManagementStudioSmall.png
StatusAddOnMissingLarge.png
StatusAddOnMissingSmall.png
StatusConnectedLarge.png
StatusConnectedSmall.png
SupermicroIpmiUtilitiesLarge.png
SupermicroIpmiUtilitiesSmall.png
SyncActiveDirectoryLarge.png
SyncActiveDirectorySmall.png
SyncCSVLarge.png
SyncCSVSmall.png
TeraTermProLarge.png
TeraTermProSmall.png
TextLarge.png
TextSmall.png
ToadLarge.png
ToadSmall.png
VisioLarge.png
VisioSmall.png
VmwareHorizonViewClientLarge.png
VmwareHorizonViewClientSmall.png
VmwareRemoteConsoleLarge.png
VmwareRemoteConsoleSmall.png
WinboxLarge.png
WinboxSmall.png
XmailManagerLarge.png
XmailManagerSmall.png
XmanagerLarge.png
XmanagerSmall.png
XshellLarge.png
XshellSmall.png
ZocLarge.png
ZocSmall.png
SPLASHSCREEN
DESCRIPTION
Remote PowerShell allows you to run scripts on remote computers. This is an extremely
powerful tool that can be used to extract a ton of information as well as modify the remote
computer's settings.
SETTINGS
REFERENCES
http://technet.microsoft.com/en-us/library/ee176949.aspx
http://www.howtogeek.com/117192/how-to-run-powershell-commands-on-remote-computers/
13.7.22.1 Ex tract TeamView er ID
DESCRIPTION
SETTINGS
$sessions[0].Session.GetProperty("TeamViewer", "ID")
13.7.22.2 Custom Ex port to CSV
DESCRIPTION
Many customers ask for a special export that would contain specific fields.
SETTINGS
Here is a small script that can be used to generate URLs for our new web protocol handler. We
generate a csv file that contains the name and the URL.
## get the data source ID, note that the "Create Web Url" button generates a different ID
$dsid = Get-RDM-DataSource | where {$_.IsCurrent -eq "X"} | select -expand "ID"
## get the RDP sessions, create a new object with the desired fields.
## Simply append "add-member" commands to include a new field
$s = Get-RDM-Session |
where {$_.Session.Kind -eq "RDPConfigured"} |
foreach {
new-Object Object |
Add-Member NoteProperty Name $_.Name –PassThru |
Add-Member NoteProperty URL "rdm://open?DataSource=$dsid&Session=$($_.ID)" –PassThr
};
## save to csv, the field names are used as column headers.
$s | export-csv c:\temp\sessions.csv -notypeinformation;
DESCRIPTION
Default settings disallow remote management calls, there is also the firewall that is blocking
requests on the associated ports. Luckily a single PowerShell command will perform all the
necessary adjustments without prompting you for each step.
SETTINGS
DESCRIPTION
By default, no scripts can be run on a new installations. Not only must you enable script
execution, but you must choose if you require scripts to have a digital signature.
SETTINGS
In a PowerShell command window, type Get-Help About_Signing to see what is best for your
scenario.
DESCRIPTION
If you have been using the Remote Desktop Manager version with the Synchronizer Action on
Entry Mismatch feature, the following steps will allow you to easily change your source with a
Powershell Command without having to recreate all your sessions, thus marking all selected
entries as created by the synchronizer.
SETTINGS
1. Select your Synchronizer entry in your Tree view, right click and select Properties.
2. In the Advanced side menu of the Properties, copy the Session ID (you will then need that
ID number to insert in your Powershell Command).
Advanced - Session ID
3. In your Tree view select the entries (ctrl+click) you wish to mark as created by the
synchronizer. Then, right-click and go in Edit – Edit (Special Actions).
DESCRIPTION
If you have a suggestion for improving an existing tip or even to suggest a new one, please send
a note to [email protected].
13.8.1 Allow Open Multiple Connections
DESCRIPTION
Remote Desktop Manager allows you to open multiple connections on the same host.
SOLUTION
You can enable the "Allow open multiple connections" option in the Advanced Tab of an entry.
Advanced Tab
OPTIO DESCRIPTION
N
True Allow open multiple connections will be active for this entry only.
False Allow open multiple connections will be disabled for this entry only.
DESCRIPTION
You can configure a MMC Snap-In console to run on any of your servers. The Snap-In need to
support remote access.
SETTINGS
4. Type the following in the Run field: dhcpmgmt.msc /ComputerName $HOST$ ($HOST$ is
the variable that will be replaced by the server name or IP address).
DHCP Macros/Scripts/Tools
If you are running a Windows 64bit edition, you would need to enable the Run in
64-bit mode option in the Execution Mode tab.
7. Now, you would need to verify that your sessions use the appropriate credential to run the
tool. In the Management Tools section of each sessions, make sure you’ve selected the
proper credentials to be supplied:
Tools section
OPTION DESCRIPTION
Use default credentials Use the credentials from the Windows session
To run the Snap-In, select your session and execute the tool from the dashboard.
Dashboard
DESCRIPTION
If you wish to create a report containing a full list of all your credentials here are the steps to
follow:
1. In the menu File – Export – Export Special, select the option Export All (.csv).
File - Export
Connection Export
3. When you try to open your Zip file, it will prompt you for your password.
Password
4. Once your password entered and your file unzipped, you will have your full list of credentials
with all your information in a *.csv file format.
Excel Sheet
OVERVIEW
There are a many scenarios where it makes sense for an entry to appear more than once in the
UI. For example, you might want to:
However, doing this manually is time consuming, tedious and prone to error. But no longer!
SOLUTION
Fortunately, Remote Desktop Manager makes creating shortcuts simple and quick! It works by
saving the entry once in the database, while linking it to more than one group. So when Remote
Desktop Manager loads the data, it automatically creates a link to the original entry. You don’t
have to lift a finger – everything is done for you, to save your time and simplify your life.
One way to create a shortcut is by using the menu Edit -> Create Shortcut...
Simply choose the destination folder for the shortcut. Remote Desktop Manager will
automatically refresh and display the new shortcut in the list.
There is no visual difference between the shortcut and the original entry.
Therefore, you’ll need to delete all entries to completely remove them.
A second way to create a shortcut is via the session properties. Since the shortcut is based on a
group list, simply add a session in multiple groups by setting two or more destinations, which are
separated by semicolons “;”. You can also use the browse button (…) and select more than one
group by holding the Ctrl key while clicking on the tree node.
Folder Example
DESCRIPTION
Here are the steps to follow when copying data from one data source to another.
If you have used the Document entries in the Stored in database mode or
used attachments, the binary content of the documents is NOT exported in any
of our export formats. These documents/attachments MUST be handled
manually.
If you are using a self-managed RDBMS (SQL Server, MySQL, MariaDB), you
can use their management tools to move the database to another server.
Please follow their respective documentation on how to successfully transfer not
only that data, but also the user accounts.
MariaDB: MySQLDump
The migration is simply an export of your original data source followed by an import in the new
destination data source.
EXPORT
1. Select your data source in the data source selection drop down list.
Export menu
3. Select your export entries options. You can choose to export your credentials and may also
choose to use a Master Key as an added security layer. For a typical migration you would check
those options.
Ensure that you do not forget the Master Key as you will not be able to decrypt the
data without it.
4. Save the file with the name and location of your choice.
IMPORT
1. Select the destination data source in the data source selection drop down list.
Import menu
3. In the Import Entries dialog use the ellipsis button to browse for the data file exported in the
previous section.
Import Entries
OPTION DESCRIPTION
Import in root Import your entries in the root of your data source, meaning it will
keep the exact same structure (group, folder, credentials) as the one
you've exported. It is the suggested method of import.
Import in current Import all your entries under the selected folder of the data source.
folder
4. In the next dialog you'll be presented with a list of all entries that are in the data file. You can
select which entry you wish to import or you can Select All to import all of your entries. Simply
press OK to complete the process
DESCRIPTION
The Data Report session type can be use to empower any/all users to generate reports, without
having to grant them access to the actual server.
SETTINGS
GENERAL
Create a Data Report entry and define the connection string by either:
PARAMETERS
Specify the parameters by setting the name, type and default value of all parameters.
QUERY
Enter the query in the Query tab, which features a SQL syntax-highlighted text box with line
numbers.
Ensure that your DBA sets the proper security groups, and that each specific
user(s) has access to it.
DESCRIPTION
IT technicians, as well as web developers, often need to edit the Windows hosts file. This
requires starting your favorite editor using elevated privileges (obviously only if UAC is active),
browsing for the hosts file which is deep in the windows folder and enclosed in a hidden folder
on top of that.
For your own machine you can create a shortcut to achieve this goal, but experience tells us that
most people don't bother with it, ending up losing precious time when they must modify the hosts
file.
What better tool then one that you use every day, which is already running in the notification area,
to implement a solution with. If the machines you work on have the same setup, this will work for
all of them.
STEPS
1. Create a new Command Line (External Application) session and enter a session name. In
the General tab,click on the ellipsis button and select your editor of choice in the Run text box.
Then, paste the following after the name of the program: "c:
\Windows\System32\drivers\etc\hosts". Ensure a blank space separates the two and include the
double quotes.
Close your editor before proceeding with those steps. If your editor is already
running, it will not elevate the privileges. We have implemented an AutoHotKey
script that closes the editor of choice, but being that it shuts off without saving
pending changes, it is not a risk-free solution. It will all depend on your chosen
editor's reaction to the WM_QUIT message.
It is a simple and efficient solution. You can use this for any tool you use regularly. Paired with
shared data source it makes for a powerful library of tools for your team.
Some people wish to use the parameters tab because, upon launching, it will display a dialog
where you can confirm the value of the parameters and even allows you to change them for
whole new values.
1. Create a new Command Line session and in the Advanced tab, check the Run as
Administrator and disable the Use Shell Execute option.
2. In the General tab,click on the ellipsis button and select your editor of choice in the Run text
box. Then enter "{1}" after the name of the executable, keeping a space between the two values
and including the quotes.
3. In the Parameters tab, set Parameter # 1 type to Text and then enter the following in the
Default Value: c:\Windows\System32\drivers\etc\hosts
This is helpful when mostly using the tool with a certain file, but occasionally need to edit another
file. You could have separate entry for each file you commonly edit, but this shows how flexible
Remote Desktop Manager can be.
DESCRIPTION
Remote Desktop Manager can manage *.rdp file to open and connect sessions immediately.
Even if your application is closed, you can open a *.rdp file. The application will open and start
your connection.
SETTINGS
When deploying an installation of Remote Desktop Manager, you will be able to associate your
*.rdp file to the application, allowing you to start an *.rdp file from your computer to be opened
inside Remote Desktop Manager.
.rdp File
If an *.rdp file is launched, the session will start in Remote Desktop Manager. You can then
create a new entry with this session by simply clicking on save session as from the edit section
of the Actions tab.
OVERVIEW
As we all know, email isn't secure. But it’s convenient, fast and free – and so many of us ignore
the security risks.
Yet when you step back and think about it, ask yourself: Would you ever think of sending cash
through the regular mail? Even sending it through a courier is risky! But if you send sensitive
information via email, that’s pretty much what you’re doing.
We've developed a feature that allows for symmetric encryption of sensitive information, so that
it can then be securely sent via email (or any other protocol) while keeping the data safe.
HOW IT WORKS
And that’s it! Your document is ready to be securely sent via email or any other protocol.
And what if you’re exporting multiple data entries? To prevent prying eyes from seeing more than
they should, each secured string must be individually decrypted. Someone is walking by your
desk, simply hit F5 or close the file, and the information is secure again.
We use AES-256 to encrypt/decrypt your sensitive data. Since the decryption is done entirely in
the browser, there’s no need for external tools, downloads or installs. Here’s a snapshot of the
encrypted values:
In addition, HTML Export using symmetric encryption is a great way to securely – and virtually –
backup your passwords and other sensitive information. It allows you to share information via
email, or simply send the file to your personal email account as a backup. The possibilities are
endless, and it’s just another way that we’re working hard to help you centralize it, secure it and
simplify IT!
PRINTING
Sorry, decryption of the printed document isn’t supported. We have yet to figure out a way to do
this. If someone ever does please let us know.
13.8.10 Keep Tabs Opened
DESCRIPTION
Remote Desktop Manager offers you the possibility of keeping a tab open even when
disconnected, thus allowing you to restart a remote device or simply keep your work area set up
to quickly resume after a work interruption.
WORKFLOW
Your session must be running in embedded mode. Once your session is open, you'll notice the
Keep tab on disconnect option in your Action ribbon.
Actions Ribbon
Enable the Keep tab on disconnect to be able to perform a logoff or restart while keeping the
tab present. A panel will replace the content of the session.
Connection panel
· Close: You changed your mind and want to close the tab
· Connect: Connect the session
· Connect When Available: Pings the host until it becomes available, then connects the session.
If you wish to have the option enabled by default, edit your session and in the User Interface tab
enabled the Keep tab page opened on disconnect option.
DESCRIPTION
SETTINGS
In your Microsoft Remote Desktop (RDP) entry, under Connection, you can enable Open
gateway only when unable to ping host, connectivity with the remote host will be tested to
see if its reachable, if not, the RD Gateway will be used.
Connection Tab
DESCRIPTION
Sometimes you want to ensure that your users are really opening the right session.
WORKFLOW
In the Events tab, in the Before Connection section, when you select Message Prompt, you will
notice a Passcode field.
Events Tab
There is a field to enter a Message and another one for a Passcode. The idea is not to add
another password to launch the session, but rather to act as a safeguard. For example, you
could set the message to “Warning! This is a production server. Type YES to continue.” and set
the Passcode to YES.
This allows you to give just a little jolt when you attempt to launch the session!
Passcode In Action
DESCRIPTION
When you close you RDP sessions, you may inadvertently (or willfully) leave your session running
on the remote host. Depending on the programs you have left running, this can consume
excessive resources and can be even interpreted as a security risk.
Windows allows you to control how Remote Desktop Services handle sessions through Group
Policies. This can be administered on the host computer itself, or be pushed at the domain level
for multiple hosts.
PROCEDURE
1. Launch Edit group policy. (Press the windows key, and type "edit group policy", for
Windows 8 it is in the Settings category).
2. Browse to:
Computer Configuration
Administrative Templates
Windows Components
Remote Desktop Services
Remote Desktop Session Host
The settings are described as follows (when you alter the setting using the Group Policy Editor,
you will see a detailed description).
Set time limit for This policy setting allows you to configure a time limit for
disconnected sessions disconnected Remote Desktop Services sessions. By
default, Remote Desktop Services allows users to
disconnect from a Remote Desktop Services session
without logging off and ending the session.
Set time limit for active but This policy setting allows you to specify the maximum
idle Remote Desktop amount of time that an active Remote Desktop Services
Services sessions
Set time limit for active This policy setting allows you to specify the maximum
Remote Desktop Services amount of time that a Remote Desktop Services session
sessions can be active before it is automatically disconnected.
End session when time This policy setting specifies whether to end a Remote
limits are reached Desktop Services session that has timed out instead of
disconnecting it.
3. Double click on the setting (or right-click, Edit), an edition form will appear.
4. Select Enabled, this will enable the control in the lower section.
6. Press Apply.
7. Repeat for other settings as desired. Note that for true/false settings there is no control in the
Options area. Just enabling the policy will activate the setting.
From then on, all future sessions established on that host will follow these policy settings.
You may want to explore all the policies below Remote Desktop Services, you may find hidden
gems that would help your organization.
13.8.14 Remote Install with PSExec
DESCRIPTION
When you need to perform a remote installation, you have multiple options. Such as a domain
policy, a logon script or PSExec.
Depending on the way the security is configured on the remote computer, you may run into
issues where even an administrator cannot install an application properly. For these cases, you
need to run PSExec in the context of the system account.
First of all, you will need to install the Sysinternals tools from Microsoft, because you will need the
help of PSExec.exe in the execution of this script. (https://technet.microsoft.com/en-
us/sysinternals/bb842062)
Then, download the *.msi or the *.exe of the application you wish to install and save the file on a
shared drive that is accessible from the remote computer.
Options exist to copy files remotely, please refer to PSExec documentation for
further details.
SETTINGS
1. Create a Macros/Scripts/Tools entry, use the PSExec type. In the Command line section,
add the following (long) line:
C:\Tools\Sysinternals\psexec.exe \\$HOST$ -i -u $TOOL_DOMAIN$\$TOOL_USERNAME$ -p $TOOL_PA
k "msiexec /i \\SRV-DEPLOY\msi\Setup.RemoteDesktopManager.10.9.0.0.msi /quiet /passive /n
The full path to the *.msi must be entered. A shared network is recommended in
this case.
2. Add the appropriate credentials in the Tools section of your session, if left blank it will use
your current Windows session credentials.
4. When you are ready to deploy your application on the remote computer, you just need to
select the appropriate session in the Navigation Pane and launch the Macros/Scripts/Tools
from the Dashboard. The Macros/Scripts/Tools entry can also be launch via the RDM Agent.
USAGE
The Macros/Scripts/Tools type are always run in the context of a session. In fact they use the
information in the session to identify what host to run the tool against, that is why we used the
$HOST$ variable.
For this reason, the first step is to select a session, any type of session will do (RDP, SSH, etc).
After selecting the session, the dashboard will display the Macros/Scripts/Tools. Simply
clicking on the tool will therefore launch it against the host linked to the currently selected
session. You can select hosts and install in sequence.
13.8.15 Run as Another User
DESCRIPTION
There are many different type of credentials and they are used by a multitude of users. Be it a
mobile warrior, a sysadmin that follows best practices and doesn't log on to his computer using
his domain admin account or even a safety conscious parent that creates limited accounts for
the kids on the family computer. This requires the capability to start an application under a
different set of credentials while we are already logged on using our main credentials.
The Run As command requires that the Secondary Logon service be running.
SETTINGS
In Windows you can manually start any process as a different user using SHIFT + right-click to
get the context menu.
The Run As command has many parameters to change its behaviour, we wont cover them all
here, but if you have an advanced scenario we suggest you consult the Windows help.
OPTIONS
You have two options when it comes to Run As:
BUILT-IN RUN AS
In Remote Desktop Manager, some sessions/tools types support the Run As functionality.
For a complete list and configuration information see the Built-In Run As help topic.
MANUAL RUN AS
Your session type is not supported and need help to manually configure Run As? See the
Manual Run As help topic.
13.8.15.1 Built-in RunAs
DESCRIPTION
This article describes the built in method of using Run As. For sessions types
that don't yet support the built in method you can follow the manual steps outlined
here.
SETTINGS
SUPPORTED TYPES
OPTION DESCRIPTION
· PowerShell
· PowerShell Remote
· PSExec
SESSION
Sessions that support Run As will have a Run As tab where you specify which credentials to use
when starting with Run As.
OPTION DESCRIPTION
OPTION DESCRIPTION
MACROS/SCRIPTS/TOOLS
With tools session types you only need to specify Run as different user in Advanced tab. At
execution time the credentials will be resolved and used to start the Windows Credentials unless
you select Use session credentials, in which case it will use those active for the session.
With tools session types you only need to specify Run as different user. At execution time the
credentials will be resolved and used to start the Run As process.
SESSION ADD-ON
SQL Server Management Studio supports Run As. Configure it like you would configure a
normal session.
NOTES
DESCRIPTION
This article describes the manual method of using RunAs. Some types support
built-in RunAs details are available here.
SETTINGS
SCENARIOS
There are two major scenarios when using RunAs: the authentication server is accessible
directly from you machine or you need delayed authentication.
This scenario is for when you are already authenticated on a domain/workgroup and you
need to switch to another account of the same domain/workgroup.
· DELAYED AUTHENTICATION
This scenario is for when it is impossible to log on your machine using the other set of
credentials. For example you need to connect to a client's domain using your laptop that is on
your company's domain. This will require using the /NETONLY parameter of RunAs.
EXAMPLES
The RunAs command is invoked from an entry of the "Command line" type. Create the entry
either by pressing the Insert key or by using the menus. Select the "Command line" type and
enter a name for it.
1. You can use the ellipsis button to browse for the runas.exe command, but if you are in a
shared data source and the session is used on various operating systems, it's better to
type in "%systemroot%\system32\runas.exe" because it will work on all of them.
3. Append the name of the executable you want to run. Enclose it in quotes if the full path
contains spaces. In our case we can simply add CMD,
4. Specify your credentials in the Host and Credential tab. Note that when you are not part
of a domain, you should enter the computer name in the domain field.
5.1. Set the Initial Delay to the lowest value that will allow the initial prompt to appear. On
most systems 1 second is sufficient
5.2. In the Typing macro field, enter the following: $PASSWORD${ENTER}. For more
information please consult Auto Typing Macro.
6. In the Security Settings tab, you must check "Allow password in variable".
When you run your session, a command prompt window appears requesting the password for
the user. The Typing Macro will fill it in after the 1 second delay. After this, the command window
that is running under the different credentials appears. Note that the title indicates the other
identity.
The are minor differences with Example 1, but here is the full procedure to make it easy to read
Note that most of our entries now support NetOnly as a built in feature.
1. You can use the ellipsis button to browse for the runas.exe command, but if you are in a
shared data source and the session will be used on various operating systems, it's better
to type in "%systemroot%\system32\runas.exe" because it will work on all of them.
3. Append the name of the Management Studio executable and its parameters. All this
needs to be within the same double quotes
3.2.My parameters look like this: -S sql.windjammer.loc -E. -S is for the server name, -E
is to use windows authentication, you can even specify the database using -d
__DB_NAME__ (i.e. -d rdm)
4. Uncheck "Use Shell Execute" (this must be done for most Windows Applications)
7. Specify your credentials in the Host and Credential tab. Note that when you are not part
of a domain, you should enter the computer name in the domain field.
8.1.Set the Initial Delay to the lowest value that will allow the initial prompt to appear. On
most systems 1 second is sufficient
8.2.In the Typing macro field, enter the following: $PASSWORD${ENTER}. For more
information please consult Auto Typing Macro.
Run the session and wait for Management studio to appear, attentive users will notice that it
looks like you are running under your local credentials because of these...
A simple query will prove that it worked, perform a SELECT SUSER_NAME() query.
DESCRIPTION
There are many different type of credentials and they are used by a multitude of users. On
Windows systems, having multiple user accounts enables the ability to launch Remote Desktop
Manager under a different set of credentials while we are already logged on using main
credentials. This allows for using Integrated security to connect to an Advanced Data Source.
If the other account belongs to a domain different than the one from your
workstation, solution A must be used.
This solution is ideal if you do this often, you can create a batch file with the command and
simply type in your password when prompted.
The RunAs command has many parameters to change its behaviour, we wont cover them all
here, but if you have an advanced scenario we suggest you consult the Windows help.
2. Type runas /netonly /user:{your username here}. Usage of the NetOnly parameter
signals that the credentials will be used for network access only. Ensure you username is
entered as your infrastructure requires. Typically its {domain}\{user}, i.e.
windjammer\david
4. When you press enter, you are prompted for the password, then the application will
launch.
When you press Shift + Right Click on an executable, you'll notice an additional menu item for
Run as different user.
You are presented with a logon form in which you must specify the username and password.
OVERVIEW
We will take you through a step by step guide to configure and test a Remote Desktop Manager
deployment against an SQL Server data source using Integrated Security.
Any user (domain, local machine or SQL user) that has a server role of sysadmin is
automatically an administrator of Remote Desktop Manager.
The first step is to create the database that will store all your entries.
Click on the ellipsis button in the Navigation Pane, then click on Add a new data source.
Select the Microsoft SQL Server data source and click OK.
If the logged-on Windows User is not part of the SQL Server sysadmin role and
you've configured the server to use SQL Server and Windows Authentication
Mode, then use a SQL Server user (SA for example) that has the appropriate role
assigned. You can then add yourself as a Remote Desktop Manager user later
and change the data source to use Integrated security.
· From the upgrade tab, click Test Server then Create Database to create the SQL Server
database.
Press OK to close the dialogs. In the Navigation Pane, select the newly created data source
from the data source drop down list.
CREATE USERS
Administration - Users
Check the Integrated security (Active Directory) box and click the ellipsis button to select the
domain user to add.
Select the User type. Grant the Add, Edit, and Delete rights (optional, restricted user only). For
more information on user types and rights, please consult the Administration – Users topic.
Keep the Create SQL Server Login and User box checked. This will in effect
cause Remote Desktop Manager to map a new login to the domain account and
link it to a user.
You can uncheck this in the case where your DBA has created your login already
on the SQL Server.
Repeat these steps for each user that needs access to this data source in Remote Desktop
Manager.
To configure the data source on other workstations, three methods are available:
· Create the data source as done previously, making sure to check the Integrated Security
(Active Directory) box.
· Export the data source from the initial workstation and import it into Remote Desktop
Manager on all client workstations.
· Use our Custom Installer Manager service to help distribute the application and
personalize the installation process.
Now in your Remote Desktop Manager with admin rights, create a few roles (Admin, Production,
Staging) and assign them users.
13.8.18 SQL Server Maintenance Plans
DESCRIPTION
Sadly, a SQL Server Instance is not something you can simply install and run without proper
care. Keeping the default values for new databases will almost certainly cause issues in the long
run.
If maintenance is not performed regularly, the database files will grow and grow until the mere
size of the files will decrease performance and finally reach a point where the client application
appears unusable.
We are NOT a DBA shop. Asking the question "What is the best maintenance plan I can
implement?" to seasoned DBAs will invariably result in an answer similar to "It depends".
These "pointers" are provided as is and we cannot be held responsible if they don’t meet your
requirements. You must consult a qualified database administrator to confirm your needs and
how to meet them.
The backup strategy really depends on the amount of data you are comfortable with losing in
the event of failure, yes... expect to lose data, the cost of a system that does NOT lose any data
is quite high and is not in the scope of this topic.
If you are comfortable with only being able to revert to last night’s backup, you can set the DB to
simple recovery model, and take a nightly full backup.
If you want something a little more robust we have seen the following:
· More frequent backup of the transaction log, lets say every 4 hours starting at 06:00 and
ending at 18:01 or 22:01
If you need to be able to recover data that is minutes in the past, then you really need a qualified
DBA to help you.
Again, these are examples of how we've seen backups planned for non-critical systems. If it
does not meet your specific requirements. You must monitor: the time the backups take to
complete; the free space left on the backup device; and so on and so on!
Also, a backup strategy involves actually going through the recovery process regularly to prove
that it works. Backups usually work fine, it is the restoring process that is difficult, imagine having
a boss breathing down your neck while you are searching for the proper sequence of actions
because you've never done this before...
Backup plans must be monitored and Recovery plans must be enacted to confirm they actually
work!
DESCRIPTION
Remote Desktop Manager is great for running many sessions at once by using its
Embedded/Tabbed display mode. It's especially true when using multiple remote control
technologies at the same time. No longer will you have to dig in your task bar to locate the
session of interest, you have them all running in tabs within the same tool used to launch them.
But when you reach a certain number of running sessions, it may become difficult to identify them
using only their name. To improve user experience for those of us that love embedded sessions,
we created a feature to filter the tab pages, it is called the Tab group.
SETTINGS
The tab settings are found in the User Interface side menu of your session properties.
Simply type a name in the Tab group to create a tab group when launching an instance. You
can see it in action in the image below
When the All group is selected, it performs no filtering. When you select another group, it hides
all the sessions that do not match with the filter. In the example below, I've adjusted two sessions
to have the same category.
OVERVIEW
Through Remote Desktop Manager's Role system, you can control access and user rights for
specific sessions and actions.
Start by creating roles and naming them accordingly to what you expect them to be able to view
and use. Then assign users to them. Now all you have to do is assign roles to entries and folders
according to your wishes.
Okay: you’re ready to deploy Remote Desktop Manager and make everyone see you as the
company hero. You’ve manually configured your data sources, specified your site license, and
defined system options. You can feel the excitement coursing through your veins. You are on a
mission!
But wait – before you go live, why not have us create a Custom Installer for you? Once we do
that, your grateful team will only need to install the resulting MSI file to access their ready-to-use
pre-configured Remote Desktop Manager installation. You will be loved by one and all, perhaps
with a parade, a state, or an award named after you.
VERSION MANAGEMENT
Here’s a familiar scenario: your team has been using Remote Desktop Manager for months or
even years, and all is well. Then along comes a new version full of cool new features, and you
think that everyone in your company should upgrade. This window below depicts the different
options at your disposal to control client versions.
Version Management
We’ve made this extremely easy. Simply open Administration – Data Source Settings
(System Settings) – Version Management. Below, a description of some of the settings;
· Disable auto update notification – This will disable the "New version is available"
message. (You’re welcome!)
· Minimal version – This specifies the minimal acceptable version. If a member of your
team runs an RDM version below this level, they’ll be prompted to upgrade.
· Download URL – This improves install speed by downloading the MSI onto your local
network, and lets all of your team members easily upgrade from this path. In short, this
saves time and avoids installing the wrong version.
The Administration – Data Source Settings (System Settings) – Serial Number section is
useful if you have a Site or Global License, and keeps you from having to manually set the key on
every client.
The general tab of the Administration – Data Source Settings (System Settings) form allows
you to easily control security aspects.
A great team feature here is the System Message, which allows an administrator to inform
users of upcoming system downtime, policy change or anything else. Each user will get the
message when they perform the next action (open, edit, refresh…) of the data source. Use it to
display company confidentially clauses or, if you wish, create chaos with a message like the one
below. A little bit of chaos is good for the soul.
System Message
Do you need Active Directory integration? Or perhaps you have off site users who need to
access the shared data source, but don’t want to use a VPN connection? Maybe you want more
security and caching? Devolutions Password Server delivers all that and much more!
You deploy Devolutions Password Server on-premises and can decide to publish the
instance only on your intranet; or go all the way and offer it online. This allows you to create an
enterprise wide high-end data store. Find out more about Devolutions Password Server at
http://server.devolutions.net/
13.8.21 Testing variables
DESCRIPTION
Remote Desktop Manager's Auto Typing Macro is really helpful to simulate user interaction. It's
mostly used to perform automatic logon on web pages, but you can run advanced shell
commands on various operating systems.
Sometimes you need to confirm exactly what will be sent when using our Variables.
A simple trick is to create a batch file that just types out whatever is sent on the command line.
Just copy the following in your favorite editor and save it as a command file, I named mine
parrot.bat
@echo off
echo.
echo.
echo %*
echo.
echo.
pause
Now its a simple matter of creating a Command Line (External Application) session and set
the command line to the path of the parrot.bat file and add the variables right after.
"C:\tools\parrot.bat" $DOMAIN$ $IP$ $USERNAME$
Now when you run the entry, you will see exactly what values are sent.
A reminder that for the password to be available as a variable, you must go in the Security
Settings of the entry and check Allow password in variable.
DESCRIPTION
You have 2 differents version of an application installed on your workstation and you want to be
able to use both versions inside Remote Desktop Manager.
SETTINGS
When you configure your application installation path in File – Options – Path, separate the
paths by a ;
Remote Desktop Manager will prompt you with the selection list and you will be able to pick the
one that you want to use.
EXAMPLE
OVERVIEW
VPN groups are defined inside each individual entries in the VPN/SSH/Gateway
section.
When multiple entries are configured to use the same VPN group, the VPN connection will stay
active until the last session disconnects.
VPN Group
The VPN close mode need to be set to On sessions close to use this feature.
The VPN group name needs to be exactly the same to ensure that Remote Desktop Manager
increments the usage counter.
13.8.23.2 VPN Routing
OVERVIEW
Establishing a VPN connection using Remote Desktop Manager is easy. Unfortunately, adding
routes has to be done manually. Wait for the adapter to connect, find the IP and add the desired
routes. Even if you use a script (such as a Power Shell script), it’s still a redundant time
consuming task – and one you can certainly live without.
SOLUTION
This feature is part of a larger concept called VPN Commands, and allows you to run any type of
script or executable post-VPN-connect and pre-VPN-disconnect.
WORKFLOW
1. Configure the VPN to wait until the adapter connects and gets assigned an IP (we'll be using
the adapter’s IP to define the routes).
3. Create a route definition by selecting “Route (Add/Remove)” radio item. Finally, set the IP
and any other required information.
13.9 Tools
13.9.1 Devolutions Localizer
Devolutions Localizer is our custom translation tool for our client applications.
So far, with the help of several generous and talented members of our community, Remote
Desktop Manager has been translated from English to the following languages:
· Chinese (Simplified) Legacy
· Chinese (Traditional, Taiwan)
· Dutch
· French
· German
· Italian
· Polish
· Russian
· Swedish
· Ukrainian
GETTING STARTED
An account is required to use the Devolutions Localizer. You can join our team
and get started by signing up here: https://devolutions.net/Home/Contribute.
If you’re interested in helping your fellow IT pros around the world, please sign up to be one of
our wonderful contributors. Our Localizer app makes the process very efficient, and you can
work at your own pace, and whenever you have time!
OVERVIEW
From the dashboard view you get a quick progress overview, simply click the “Translate”
button and start translating.
Devolutions Localizer
KEYBOARD SHORTCUTS
Devolutions Localizer also features several keyboard shortcuts to speed up the translation
process:
· CTRL+E: Mark current resource as “Use original”, this ignores any translation text and will
display the original value as is.
13.10 Troubleshooting
13.10.1 1Password
ERROR
In 1Password, click on File – Repair 1Password Vault. This should fix the issue.
ERRORS
The computer clock must be within a small error margin in order to generate the proper
authenticator code. We recommend using a NNTP server in order to keep your computer
clock synchronized.
Your Remote Desktop Manager is set to authenticate with Yubikey or Google Authenticator.
You no longer have the Yubikey key or the Google Authenticator and you want to turn off this
option to connect on Remote Desktop Manager.
If you had installed using the default settings, the configuration file is %localappdata%
\Devolutions\RemoteDesktopManager\RemoteDesktopManager.cfg
You can choose to simply delete it, obviously all of your settings will be lost, alternatively you
can open it and remove everything between the EncryptedDataSources tags. You will have
to re-register all of your data sources and point to either the file or database that you were
using.
Encrypted DataSources
ERRORS
Try to restart the Remote Management service on the mac computer. On the mac, go in System Preferences –
Sharing and uncheck/check the Remote Management service.
Activating the logging on the mac may help the Devolutions support team resolving the issue. In order to activate
the logging server side, execute the following command in Terminal:
sudo defaults write /Library/Preferences/com.apple.RemoteManagement ARDCollectLogs -bool YES
Once this is done, you can try to connect normally using Remote Desktop Manager. The log will then be located
in the /tmp folder of the Mac computer.
13.10.4 BeyondTrust
ERRORS
In the Host field of the BeyondTrust Password Safe Console entry, make sure to enter the server name like
https://beyondtserver.
Do not enter the IP address of the server. Entering the IP address instead of the server name will return this error.
In the Host field of the BeyondTrust Password Safe Console entry, make sure to enter the server name like
https://beyondtserver.
Do not enter the web URL to access the console from a web browser, example
https://beyondtserver/eEye.RetinaCS.Server/PasswordSafe.
In the Application API key field of the BeyondTrust Password Safe Console entry, make sure that you have
entered the appropriate key. Please refer to the BeyondTrust Password Safe Console entry to learn how to obtain
the application API key.
Make sure that the Enable for API access option is checked for your privileged account in
BeyondTrust.
13.10.5 Clipboard
DESCRIPTION
Some applications can affect the clipboard. Below is a list of applications that are known to
interfere with the clipboard. Please keep in mind that other applications might affect the
clipboard.
· Citrix GoToAssist
· TeamViewer 12
An option allows to revert to the legacy copy/paste method.
Navigate to File
– Options – General, in the Clipboard section and set the Clipboard copy
method option to Legacy. This should resolve the issue.
Clipboard Options
DESCRIPTION
The components of the .Net Framework are considered a core Windows feature, therefore there
are no facilities to reinstall them. However, there are tools to verify and repair system files.
DESCRIPTION
In the event of data loss due to hardware failure, it is still possible to recover data from your
storage device if it is still useable.
1. On the storage device that failed, navigate to C:\Users\%USERNAME%\AppData\Local\Devolutions and copy
the entire RemoteDesktopManager or RemoteDesktopManagerFree folder.
2. This folder will contain the local data source (SQLite or XML) as well as your configuration file.
3. Copy/Paste this folder at the same place on your new computer and you should retrieve your data.
The path mentioned in this topic are for those that have installed using the
default settings. The best way to locate your configuration folder is to use File –
Options – Advanced, in this form you will find an hyperlink near the bottom.
This opens your configuration folder.
File based data sources (XML, SQLite, etc) are by default stored in that
configuration folder. As a precaution, go through each data source in File –
Data sources and have a look at the local path (if any). Any file that is in the
configuration folder should be copied to ensure full data recovery.
DESCRIPTION
This chapter contains data source related troubleshooting. Since Remote Desktop Manager
supports such a wide array of data sources, there can be multiple causes for connectivity issues.
INITIAL TROUBLESHOOTING
For those data source types that need a host name, please ensure it is typed correctly.
THE MACHINE IS UNABLE TO RESOLVE THE NAME OF THE DATA SOURCE HOST
USING DNS
For data source types that need a host name, please ensure that the name you have provided
does resolve by the DNS server which it is linked to, not only your current network connection,
but all connections that you will use Remote Desktop Manager over.
In general, PING is a poor testing tool because the server may have been configured to ignore
PING requests. Use NSLOOKUP to help identify the issue.
A common issue in a multi-domain environment is that you must use the Fully Qualified Domain
Name (FQDN) of a server in order to reach it. (e.g. srvname.domain.loc instead of srvname)
Another common issue is that your DNS cache is corrupted, in that case you can open an
elevated command prompt and use the following commands.
ipconfig /flushdns
ipconfig /registerdns
OPENING A VPN HAS DISCONNECTED THE LOCAL LAN OR RENDERED THE DATA
SOURCE UNREACHABLE
If the network administrator has deemed necessary to tunnel ALL traffic through the connection
when a VPN is active, you will have to resort to using our Offline capabilities, ideally paired with
our options to automatically Go offline on connection as can be seen in the Advanced section of
the VPN entry type.
For a Web based VPN, ensure the routes are all valid, i.e. the path followed to reach the remote
host is indeed going through the proper interface.
This may be hard to diagnose but sadly the support department can attest that it occurs quite
often. Here are some items to monitor.
ISSUE RESOLUTION
Firewall blocks RDM - all Create a rule to allow RDM to communicate with at the very
the time least your data source host. Keep in mind that, if you use
embedded browser sessions, Remote Desktop Manager
must have access to the remote hosts on which you open
pages.
Firewall blocks RDM - The firewall rules are tied to the category of the network
specific network profile (Public/Private/DomainAuthenticated), ensure
that all your network profiles allow for connectivity. Use
ISSUE RESOLUTION
DESCRIPTION
Sometimes the support staff will ask that the database schema.
This feature is only available for data sources that are backed by a database
management system: MariaDB, SQL Azure, SQL Server and MySQL.
When requested by the Devolutions Support team during a support process, you may be asked
to send us your database schema for thorough analysis of your issue.
1. Go in File – Data Sources – Edit Data Source.
Data Sources
2. In the tab Upgrade click on Email Schema to Support.
Database Schema
OPTION DESCRIPTION
Email Enter your email address so that the support team can contact you
Name Use the same title as the one first used to report the issue
Message If you haven't described your issue before, enter a short description of it
DESCRIPTION
When attempting to connect to the data source, you receive the error message below;
On Devolutions Customer Portal in the User section, please ensure that the User is indeed
Enabled.
13.10.8.3 MySQL
ERRORS
2.1. openssl pkcs12 -export -in client-cert.pem -inkey client-key.pem -certfile cacert.pem -out
client.pfx
3.1. GRANT ALL PRIVILEGES ON test.* TO 'root'@'localhost' IDENTIFIED BY 'goodsecret' REQUIRE SSL;
4. Run certmgr.msc and import the client certificate in the user store.
5. In the Advanced settings of your MySQL data source set the following values:
When you have that type of error while attempting to edit or add a new entry on a MySQL
database the problem is because your Advanced settings have been modified.
The resolution is to Edit your database, Select the Advanced tab and go to More Settings.
ISSUES
When attempting to use a SQL Azure data source, you receive the error message below;
To resolve this issue, please have a look at the topic on SQL Azure.
When creating a user with azure active directory account authentication, you see the error
below;
Azure AD Error
You must first define your SQL Server Azure AD Admin via the Azure Portal, then login into
Remote Desktop Manager using that Azure AD account, from there you will be able to create
new Azure AD accounts (admin and non-admin). Those new admins will also be able to do the
same.
For more information, please have a look at the topic Configure SQL Azure AD Authentication.
13.10.8.4.1 SQL Azure: One or More Errors Occurred
DESCRIPTION
PROBLEM
After following the steps in Configure Azure Active Directory App Registration, you receive the
error message below:
SOLUTION
If you get this error, please send us your Azure Active Directory app manifest at
[email protected] so that we can validate your configuration.
DESCRIPTION
SQL Server is surely the most used repository within our community. Even though it is extremely
easy to put in place, some decisions have a huge impact on its operation.
CONTENT
· Login failed for user Reason: Token-based server access validation failed
· Login failed. The login is from an untrusted domain and cannot be used with windows
authentication
ISSUES
SQL Server installs with limited network connectivity. Therefore, when initially installed, the
Database Engine cannot be accessed from another device.
Allow Remote Access
On older versions of SQL Server, remote connections must be allowed manually. Follow these instructions to
enable connectivity.
Enable protocols
To connect to the Database Engine from another device, a protocol, such as TCP/IP, must be enabled.
2. Select an instance.
1. In the Start menu, type WF.msc and press Enter to open the Windows Firewall with
Advanced Security.
5. In the Protocol and Ports page, select TCP. Select Specific local ports, then type the
port number of the instance of the Database Engine. The SQL Server default instance listens on port
1433. Click Next.
6. In the Action page, select Allow the connection, then click Next.
7. In the Profile page, select the profiles that describe the computer connection environment, then
click Next.
8. In the Name page, enter a Name and Description for the rule, then click Finish.
1. Go in Help – Application Logs to see if relevant error messages are present. There's a
good chance that you will see A network-related or instance-specific error occurred...
2. Create a Universal Data Link (*.udl) file to test your SQL Connection (see Universal Data Link (.udl) file).
This will test that the instance is allowing your workstation to connect. Firewalls and anti-virus
software may still prevent Remote Desktop Manager from accessing the network even though
the Universal Data Link test is conclusive.
1. Open the Windows File Explorer.
3. Select the Home tab. Using the New item menu, create a Text Document.
A warning that changing file extensions can cause files to become unusable might
be displayed. Disregard it.
5. Double-click the *.udl file to open the Data Link Properties dialog box.
6. In the Provider tab, select the Microsoft OLE DB Provider for ODBC Drivers provider.
7. In the Connection tab, select Use connection string, and enter a custom connection string.
Example of valid connection string:
Driver={SQL Server};Server=myServerAddress;Database=myDataBase;Uid=myUsername;
8. Use the Advanced tab to view and set other initialization properties for your data.
9. Use the All tab to review and edit all OLE DB initialization properties available for your OLE
DB provider.
10. In the Connection tab, use the Test connection button to test the SQL Server connectivity.
11. Click OK to save the connection string to the Universal Data Link (.udl) file.
Finding the true reason for this is quite a process. A web search reveals so many solutions to
attempt, and it is easy to get lost is all those steps. The thing to keep in mind is that the error
message is misleading and the cause is often a simple thing.
The first step is to ensure that the issue is not unique to Remote Desktop Manager. Testing with
a Universal Data Link file as shown above will prove that the workstation configuration is not the
issue.
When granting rights to the DB using AD group membership and one of your user has that error
message, you must check privileges for ALL the AD groups that he belongs too. Anything with
an explicit DENY must be evaluated carefully. The query below will help identify these
occurrences.
Error Message
The following error message appear when you can't access Remote Desktop Manager
data source with Integrated Authentication when connected to a Dialup VPN.
SOLUTION
3. Edit the *.pkb file with a text editor and find the line UseRasCredentials=1
This error message means that the server could not be reached, the possible causes are numerous.
These steps are for Client side troubleshooting exclusively. For full guidance on this
issue please consult this article on Technet
If the error message indicates that the Named Pipes are in use and you are
accessing a remote server, ensure that the TCP IP protocol is used simply by
adding tcp: in front of the instance name, i.e. tcp:vmtxg.database.windows.net
CAUSE DIAGNOSTIC
Server name mistyped (Known as the Universal Data Link (.udl) file
Instance name).
Only server name is specified when Universal Data Link (.udl) file
there is no Default instance on that
server.
Is the SQL Server up and running. Universal Data Link (.udl) file
Anti-Virus blocking Remote Desktop Check in the Anti-Virus logs to see blocked
Manager. threats.
DESCRIPTION
Whenever the performance of queries against SQL Server decreases, check on the following:
If you transaction log file is enormous, it may be that the recovery model of the database is set to
FULL, which means that it requires regular backups in order to clean up past transactions.
13.10.9 DB Upgrades
ERROR
Presence of sizable historical or log data in the DB can cause this error to be triggered. Please consult Clean up
and prune data as you see fit.
13.10.10FIPS (Encryption)
ERROR
Remote Desktop Manager uses the AES/Rijndael encryption and SHA-256 hashing
algorithms, which are implemented by the Microsoft .NET Framework. If the local security
policy on your system enforces FIPS compliant implementations, Remote Desktop Manager
cannot run. As a result, you will receive this error message.
SOLUTION 1
To fix this error, configure the Local Security Policy on your system to allow FIPS non-
compliant algorithm implementations. Here are the steps:
1. Go to Control Panel > Administrative Tools > Local Security Policy > Open
Local Policies > Security Options
2. Disable the option “System cryptography: Use FIPS compliant algorithms for
encryption, hashing, and signing.”
Some software (i.e. Cisco VPN Anyconnect) requires the use of FIPS. If this is
your case, you must implement the alternative solution described below.
SOLUTION 2
Inside Remote Desktop Manager's installation folder, create a text file named
RemoteDesktopManager.exe.config containing the following:
<configuration>
<runtime>
<enforceFIPSPolicy enabled="false"/>
</runtime>
</configuration>
13.10.11KeePass
ERRORS
In KeePass, click on Tools -> Options, go in the Advanced tab and uncheck Remember and
automatically open last used database on startup.
ERRORS
Change the IE emulation mode in File – Options – Types – Web to use Internet Explorer
10.
IE Mode
13.10.13Microsoft Office
ERROR
Under certain conditions which we cannot identify, an Office 2013 32 bit Edition installation on a 64 bit system
may miss registry keys to allow for hosting Office Documents in ActiveX controls. This can be confirmed by going
in Help – Application Logs to view the full error message. It should be something like
System.Runtime.InteropServices.COMException: The associated COM server does not
support ActiveX Document embedding.
To resolve this, you have to create a reg file with the content below and merge it in your registry. A restart may be
required. As a preliminary step you could open the registry to confirm that the DocObject keys are indeed
missing. The keys below are respectively for : Word, Excel, PowerPoint, Visio, and Project.
[HKEY_CLASSES_ROOT\Wow6432Node\CLSID\{F4754C9B-64F5-4B40-8AF4-679732AC0607}\DocObje
[HKEY_CLASSES_ROOT\Wow6432Node\CLSID\{00020830-0000-0000-C000-000000000046}\DocObje
[HKEY_CLASSES_ROOT\Wow6432Node\CLSID\{CF4F55F4-8F87-4D47-80BB-5808164BB3F8}\DocObje
[HKEY_CLASSES_ROOT\Wow6432Node\CLSID\{00021A15-0000-0000-C000-000000000046}\DocObje
[HKEY_CLASSES_ROOT\Wow6432Node\CLSID\{74B78F3A-C8C8-11D1-BE11-00C04FB6FAF1}\DocObje
13.10.14Microsoft RDP
AUTOMATIC LOGON
ERRORS
This is a bug in the Microsoft Remote Desktop Client. The workaround is to enable the Smart
Card even if it's not required for the connection.
This most often occurs on systems that use a DPI setting of more than 100%. To disable
scaling in RDM you must adjust the compatibility settings on the Windows shortcut for RDM.
2. Select Properties.
Compatibility Tab
This issue stems from the fact that the Windows Credential repository holds only one entry
per Windows user for a remote computer. If you use the Embedded (tabbed) display mode
and store the password in the database, you'll be able to work around that limitation.
You must configure the Keyboard setting in the Local Resources tab of the session
settings. You can select "On the remote computer" or "In full screen only" according to your
personal preferences.
This issue arises when a program called RDPClip becomes unstable. You can kill its process
and launch a new instance.
1. On the affected system, load up task manager (right click in taskbar and select Task Manager).
2. Go to the Processes Tab.
3. Select rdpclip.exe.
4. Click End Process.
5. Go to the Application Tab.
6. Click New Process.
7. Type rdpclip.
8. Click Ok.
As strange as it may seem, we've isolated the issue to "Serial Ports" being enabled. Turn off
Serial port sharing and see if the performance is improved.
When you try to connect to a Windows Server 2012, you see the following result below. There
are several spaces that shouldn't be there.
To fix this issue, go in Properties – General – Advanced and change the option Enable
CredSSP support to True.
13.10.14.1Automatic Logon
DESCRIPTION
Sometimes the automatic logon does not function and your credentials are requested by the
remote system. Here are some steps to help identify the issue. Support for automatic logon was
introduced on Windows 2003/XP, so ensure you are trying to connect to these or later versions.
Windows 2000 does not support the automatic login.
This issue may be caused by a bad authentication negotiation because in some cases Single
Sign On (SSO) requires Network Level Authentication (NLA). It can happen when prompting
for credentials and when using automatic logon. Please activate Network Level
Authentication in the Connection tab of your session. You might also have to check the
Public Mode option in the Advanced tab to make it work.
See also : Network Level Authentication, Configure NLA for Remote Desktop Services
Connections.
We have discovered that enabling the Public Mode option in the Advanced tab resolves the
issue.
RDM allows for advanced credential management. Depending on your choice of: Default,
Credential repository, Embedded or Inherited ensure the credentials are properly entered.
The host server can be configured to always require the credentials to be entered in an
interactive manner by the user. Ask your system administrator to confirm if this is the case.
Choose the instructions depending on the server operating system. Note that there are often
multiple ways to configure the host (WMI, Scripting, etc), but the group policies are the preferred
method. Therefore the links are for the articles describing group policy solutions when they are
available.
APPLIES TO LINK
Windows Server 2003, Microsoft ended support for Windows Server 2003 on
Windows Server 2003 R2, July 14, 2015. This change has affected your software
Windows Server 2003 with SP1, updates and security options.
Windows Server 2003 with SP2
Windows Server 2008 Group Policy Settings for Remote Desktop Services
in Windows Server 2008
Windows Server 2008 R2 Group Policy Settings for Remote Desktop Services
in Windows Server 2008 R2
You must adjust a group policy to allow that. Please follow the directions in
http://blogs.msdn.com/b/rds/archive/2007/04/19/how-to-enable-single-sign-on-for-my-terminal-
server-connections.aspx
When you are prompted with this credential box, Remote Desktop Manager hangs.
Windows Security
PROBABLE CAUSE
The issue seems to occur with users using a Wacom Bamboo Fun Pen & Touch tablet. Latest
drivers are installed.
When users with a Wacom tablet click on a session with an expired password in the Private
Vault or a non domain joint server, forcing Remote Desktop Manager (or in fact RDP) displaying
a credential popup, Remote Desktop Manager freezes.
When the user does the very same action with a regular mouse, everything goes fine.
The problem appears to be in the Wacom settings along with some windows settings to use
Windows Ink as handwriting.
When Use Windows Ink was disabled, Remote Desktop Manager didn’t freeze anymore when
displaying a credential box.
DESCRIPTION
Please note that this setting may have been set by a group policy. If you find the
value but do not know the reason why it is set, a Domain Administrator may
have set it. We do not condone bypassing corporate policies.
Click on Start \ Run and type regedit to open the registry editor. Navigate to
HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows NT\Terminal Services\DisablePasswordSaving
key and change the value to 0.
Make sure you've checked the Store password locally feature and that you have text in the Host field.
13.10.14.3Display Issues
DESCRIPTION
Uncheck Persistent bitmap caching under the Experience tab in the properties of your RDP
session.
Bitmap Caching
We have identified the CA DSM Agent Suite for desktop management as being the culprit for
those who use this product. The remote control agent from this product seems to interfere with
the modern GUI of Remote Desktop Manager. If you stop the agent, the problem should go
away.
The taskbar on your remote system is hidden by the one from your local machine as shown
below;
Simply set this option as shown below in the properties of your RDP session under the Display
tab.
RDP Properties
DESCRIPTION
Some users have experienced issues where their keyboard would not work on the Windows 7
system.
https://support.microsoft.com/en-us/help/2923545/update-for-rdp-8-1-is-available-for-windows-
7-sp1
13.10.14.5Licensing Protocol Error
DESCRIPTION
When you connect to a remote workstation, you receive one of the errors below.
SOLUTION
2. Depending on your Windows architecture (32-bit or 64-bit) delete the specified registry
key(s);
32-bit HKLM\SOFTWARE\Microsoft\MSLicensing
64-bit HKLM\SOFTWARE\Microsoft\MSLicensing
HKLM\SOFTWARE\Wow6432Node\Microsoft\MSLicen
sing
3. Run Microsoft RDP (mstsc.exe) as an administrator to recreate the registry key (just once).
This section describes the solution for the “access denied” error which occurs when using
qwinsta.exe/rwinsta.exe or WTSOpenServer Windows API function to access to a Windows
XP SP2 PC.
The same thing happens when trying to connect to a Windows XP SP2 using Remote Desktop
Services Manager from a Windows 2003 Server. This is because qwinsta.exe command calls
WTS functions (WTSOpenServer, WTSEnumerateSessions, …), you will encounter the same
error when using either the command or the API.
Although you do not need to provide a username and a password when executing qwinsta.exe or
WTSOpenServer, Windows uses its stored credentials automatically, just like accessing a shared folder.
The easiest way to confirm the credential is to use Explorer to access remote server’s C$ share. Also, you can
use “net use” command.
For those who want to connect to a remote server programmatically using WTSOpenServer API,
WNetAddConnection2 function should be enough to make sure you got a piece of credential before calling
WTSOpenServer function.
It goes without saying that the user in the credentials needs to have enough privilege on the remote server to carry
out the operation.
An API call involves connecting to a remote machine using RPC. In most cases, the RPC service is running and
you can confirm that from the service management interface. To open RPC ports, simply enable “File and Printer
Sharing” in the Windows Firewall setting.
(Generally, if the RPC is blocked by the firewall on the remote machine, the error should be "1722 RPC server is
unavailable" rather then "5 Access denied")
You can change this option from either local security policy or registry.
Local security policy: run secpol.msc > Secuirty Settings > Local Policies > Security Options > Network
access: Sharing and security model for local accounts, and set to "Classic".
Both methods are equivalent. If this option is set to 1, remote logging in user will be impersonated as Guest
account (and if Guest account is disabled, login fails). Set it to 0 enables user logging in as themselves.
4. If you still receive “access denied” and it only happens when the remote OS is Windows
XP SP2, it is very likely akin to the following case:
When you use a sniffer to capture the SMB packets, you can see the authentication is OK (NTLM if workstation,
Kerberos if Windows 2003 domain), but the RPC gets nca_s_fault_access_denied (0×00000005) as error code.
This means the remote RPC component failed to execute the requested operation. It is because in Windows XP
SP2, it is not allowed to operate on remote desktop service (RDS) through RPC by default. To modify this setting
to enable Remote Desktop API through RPC, you need to find the following registry key:
HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server
Then add a DWORD value named “AllowRemoteRPC” and change its value to 1.
13.10.14.7Logoff Issue
DESCRIPTION
After creating and connecting to an RDP session, if you hit the 'LogOff' button in the Remote Desktop Manager
ribbon, it appears to be sending the wrong command to the RDP session. It's sending 'ashutdown /l' instead of
'shutdown /l'. It does this in both the Free and Enterprise version.
SOLUTION
Simply check this option in File -> Options -> Types -> RDP.
DESCRIPTION
YOU CAN ONLY RUN A FEW RDP SESSIONS AT THE SAME TIME IN REMOTE
DESKTOP MANAGER AND YOU WANT TO KNOW HOW TO BE ABLE TO OPEN
MORE SESSIONS.
The amount of consumed memory is dictated by the remote technology, and in the case of
RDP, by the Operating System of the remote host. Windows 8 / 2012 sessions do take
upwards of 150Mb, whereas the previous versions would consume around half of that.
This is something that we have no control over. You can look at Large Memory Aware
Application or use the 64bit edition of Remote Desktop Manager.
This situation is something that we also experience under those conditions (our testing
environment is virtualized and has minimal memory for each guests).
In the Experience tab of your RDP session, you need to disable everything that is not used.
A good method is to select the Modem connection speed, this will disable all settings that
are related to appearance. You can then turn on a single setting to see if it affects the
performance negatively. Repeat until you find the combination that works best for you.
YOU USE RDP IN EMBEDDED MODE AND THE REMOTE SESSION IS EXTREMELY
SLOW TO RESPOND. THE SESSION LOADS FINE, BUT WHEN YOU GET LOGGED-
IN THE REMOTE COMPUTER, IT BECOMES UNRESPONSIVE. MOUSE CLICKS,
KEYBOARD PRESSES AND APPLICATION LOADING ARE EXTREMELY SLOW. IN
EXTERNAL MODE, EVERYTHING IS RUNNING FINE.
1. Disable your Anti-virus and test the connection to see of this make a difference. If you use
Trend Micro Business Security, add RemoteDesktopManager.exe,
RemoteDesktopManager64.exe, and Embedded32.exe to the Process Exception List
under Preferences – Global Settings and update the Trend client. If you use Symantec
Norton Internet Security, ensure you allow Remote Desktop Manager to access the internet in
the Program Rules.
3. Check Disable display scaling on high DPI settings in the options. Consult topic
Microsoft RDP for more information.
4. Download and install Microsoft RDCMan to see if it's related to the RDP ActiveX. Remote
Desktop Manager uses the same technology and this will ensure that your workstation doesn't
have configuration issues.
There are known security updates that have broken connectivity to a host, but they have been
fixed in ulterior patches. If you keep the hosts updated then it should be something else.
Sometimes the mapping of local devices will cause issues. Uncheck all settings in the Local
Resources tab.
ERROR
Mapped network drives are not available in RDP sessions even though you have selected All
drives; or are not displayed in the dialog when attempting to add Specific Drives using the
More button.
CAUSE
This problem happens when you start Remote Desktop Manager with elevated privileges (Run
as administrator). Mapped drives are not available from an elevated prompt when UAC is configured to "Prompt
for credentials" in Windows.
This issue is not caused by Remote Desktop Manager, you will need to apply a fix on all
workstations from which you must launch Remote Desktop Manager with elevated privileges.
METHOD 1
Using the Local Group Policy Editor, locate the following Group Policy path:
Local Computer Policy\Windows Settings\Security Settings\Local Policies\Security Options
METHOD 2
Map the required drives again in the elevated session. A good solution would be to create a batch/command file
that starts by mapping the drives again, then launches Remote Desktop Manager.
13.10.14.10
Printer Redirection
DESCRIPTION
You are attempting to use printers inside your remote sessions but they seem to be missing.
SOLUTIONS
1. Ensure that the option for Printers in the Local Resources tab is enabled.
Printers
2. If you have a 64-bit Windows, you must start the Remote Desktop Manager 64-bit launcher.
By default, this launcher is located in C:\Program Files (x86)\Devolutions\Remote Desktop
Manager under the name remotedesktopmanager64.exe.
13.10.14.11
Protocol Error
ERRORS
Error message
SOLUTION 1
Try to use Remote Desktop Manager 64bit. To do so, launch Remote Desktop Manager64.exe
from the installation folder instead of Remote Desktop Manager.exe.
SOLUTION 2
Uncheck Persistent bitmap caching and Visual styles under the Experience tab in the
properties of the RDP session.
SOLUTION 3
SOLUTIONS 4
Login in to the target machine by directly going to the console of that server or by any tool like
VNC so that we can get access to that machine.
After connecting:
1. Right Click on the Desktop.
2. Select the Properties.
3. There DropDown the Themes and select the theme other than the current one.
4. Click on Apply, OK.
ISSUES
The issue resides on the server itself. You simply have to disable the option Always ask
password and enable the option Use client-provided logon information as shown below;
13.10.14.13
Remote Computer Requires Authentication to be Enabled Error
ERROR
The connection cannot proceed because authentication is not enabled and the remote computer
requires that authentication be enabled to connect.
SOLUTION
This error occurs when you try to establish a remote connection from a Windows Server 2008R1
to a Windows Server 2016. In modern versions of Windows, like Windows 10 or Windows
Server 2016, the RDP defaults have changed. The default for the Security Layer has changed
from 0 to 2.
OPTION 1
In the RDP session check mark Activate network level authentication than OK.
OPTION 2
To resolve this issue, on the Windows Server 2016, open the registry (regedit.exe) and navigate
to:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\TerminalServer\WinStations\RD
P-Tcp. Then, change the SecurityLayer to 0.
13.10.14.14
Reconnect
DESCRIPTION
When a remote connection is locked and asks for the username and password to reconnect, instead of closing
and relaunching the connection you would typically use the Reconnect feature.
However, the session doesn't reconnect properly, because the credentials are not sent to the remote session.
This is an old issue and shouldn't happen unless your selection is currently legacy or your RDM requires updating,
however if it happens nonetheless the fix remains the same.
SOLUTION
In File -> Options -> Types -> RDP in the Reconnect Mode dropdown menu, adjust the setting
and try again, we recommend trying to set it to Full.
Reconnect Mode
13.10.14.15
RD Gatew ay Credentials Prompt When Trying To Reconnect
DESCRIPTION
This problem happen when you have RD Gateway configured with some credentials and you use
the reconnect action. You get prompted for the RD Gateway credentials and the application
does not reuse the existing settings.
SOLUTION
To fix this issue, set the Reconnect mode to Full in the RDP session Advanced settings. This
will force the complete disconnect/reconnect and it will resolve the issue.
13.10.14.16
RDM Hangs w hen logging off RDP sessions
CAUSES
The two causes are RDP plug-ins and UDP usage under certain conditions.
RDP PLUG-INS
This one is quite easy to test out. You simply go in the Experience tab of your RDP sessions and set Load
plug-ins in embedded mode to False. Do this first as it has a really low impact.
UDP USAGE
There's an option in RDM to disable UDP usage. To do so, open Remote Desktop Manager as an
administrator and click on Tools -> Local RDP/RemoteApp Manager and click on Disable to disable the UDP
settings.
UDP Settings
This one is a bit trickier, some search results hint that this is caused only when going through a VPN, others
mention that it occurs only on Windows 8 paired with a Gateway server, but this solution has worked for many of
our users, so we suggest you try it.
It requires a registry change, so all the usual warnings and caveats apply here, back it up first! Consult this
Microsoft support article for more information
The fix is to disable UDP on the client workstation using these simple steps:
1. Navigate to HKLM\SOFTWARE\Policies\Microsoft\Windows NT\Terminal
Services\Client.
2. Create a DWORD named fClientDisableUDP and assign it a value of 1.
13.10.14.17
Sessions w ork using mstsc.ex e but not in RDM
DESCRIPTION
This topic describes the troubleshooting steps for when establishing a session to a remote host
reacts differently in Remote Desktop Manager than when you are using mstsc.exe.
Our Embedded (tabbed) display mode uses the Microsoft ActiveX and offers the most
customization options, but is inherently different than using mstsc.exe. When wanting to ensure
the issue is really in Remote Desktop Manager vs being an issue with the ActiveX, the
procedure is to try to replicate the scenario with Microsoft's RDCMan. You can obtain that tool
from http://www.microsoft.com/en-ca/download/details.aspx?id=44989. Simply install it, create
sessions like you have in Remote Desktop Manager, then open them concurrently or in
repetition to replicate the issue you think lies in Remote Desktop Manager.
When you choose to use the External display mode, Remote Desktop Manager will in fact
create a temporary RDP file and call mstsc.exe with the file as a parameter. It can be beneficial
to grab that file while it exists and to compare it with one created using mstsc.exe.
1. Create or duplicate a session that you want to diagnose, set the display mode to External.
2. Launch that session.
3. The file will be deleted when you close Remote Desktop Manager, you need to copy it before then.
4. Open %TMP%\RDM, copy your file in another folder.
5. Open the file in your editor of choice and compare it to a file created using mstsc.exe
We have isolated the issue and we fixed it by changing your RDP engine version to RDP 6.0 or 7.0 in File ->
Options -> Types -> RDP
RDP Engine
13.10.15Network Devices
DESCRIPTION
It's possible to manage different devices via a web interface. However, you may have some
issues to connect to the web interface using our Web Browser in the Embedded (tabbed)
display mode.
For example, you may encounter issues with the following devices:
· Nagios
· Cisco
· Dell SonicWall
SOLUTION
We use third party libraries for the integration of Firefox and Google Chrome in the Embedded
(tabbed) display Mode. For Internet Explorer, we use the Microsoft ActiveX that is installed at
the same time as the browser.
If none of the web browsers work in Embedded (tabbed) display Mode, you would need to
launch the website using the External display mode and use our Devolutions Web Login to
handle the credentials.
13.10.16Non-Admin Users Cannot View Passwords
DESCRIPTION
Normal users are no longer able to view or copy password after updating to Remote Desktop
Manager 2019+
SOLUTION
If you want to allow Users or specific Roles to be able to view the password from all your
sessions, you must configure the View Password setting found in Administration - Vault
Settings - Permissions - View Password.
"Changed the View Password to not allowed by default for non administrator"
ERRORS
During the configuration of your Password Manager Pro credential entry, make sure that the URL of your server
contain https:// and not http://. You absolutely need an https:// at the beginning of the address to communicate
properly with the server.
Service URL
Password Manager Pro can be configured to use SSLv3, TLSv1.0, TLSv1.1 and TLSv1.2. If you have configured
your Password Manager Pro server to use TLSv1.2 only, you will encounter this error message. You need to
configure your Password Manager Pro to accept TLSv1.0, TLSv1.1 and TLSv1.2.
Edit your API user in Password Manager Pro and generate a new Authentication Token, save your API user
and save this new token in Remote Desktop Manager in File – My Account Settings – Password Manager Pro.
During the creation of an API User in Password Manager Pro, a Host (Computer name) is necessary to create
the user. In Password Manager Pro it may be registered using the Fully Qualified Domain Name (FQDN) of
the computer. In Remote Desktop Manager on the other hand, you must set it exactly the same as the %
COMPUTERNAME% environment variable.
Another reason for this error we have seen is that the DNS name of the server was specified, but it would work
perfectly fine if you were using the IP address instead. Please test it with the procedure described below.
Here is a script that you can use to test your access from a client workstation. Save the following code in a file
called PMPTest.ps1. The technology used in the script is the same as is used from within Remote Desktop
Manager, therefore its the most conclusive test. If you contact Password Manager Pro support, they can provide
a Java based test fixture. It is not as useful except to prove that the server basically responds to your queries.
[CmdletBinding()]
Param(
[Parameter(Mandatory=$True,Position=1)]
[string]$PMPServer,
[Parameter(Mandatory=$True,Position=2)]
[string]$AuthToken
)
add-type @"
using System.Net;
using System.Security.Cryptography.X509Certificates;
public class TrustAllCertsPolicy : ICertificatePolicy {
public bool CheckValidationResult(
ServicePoint srvPoint, X509Certificate certificate,
WebRequest request, int certificateProblem) {
return true;
}
}
"@
$status = $content.operation.result.status
Pause
Please note that the port is hard-coded in the script to 7272, which is the default value for Password Manager
Pro. Adapt to your environment.
Test with both the DNS name of the server and the IP address and observe the results.
In some organization, IP addresses are blocked and the host name of the Password Manager
Pro server needs to be returned. In that case, the Configuration File of the application would
need to be modified.
13.10.18Performance
13.10.18.1Data sources
REFRESH
SQL Server has certain particularities that, if the default configuration is used, will cause
performance degradation as time goes by. Please consult SQL Server Performance.
Custom images need to be stored in the data source, this results in the size of the configuration becoming
problematic if there are too many entries using them. If that becomes the case it would be better to revert to built-
in images.
RTF in itself is not a real issue until you decide to embed images in the description. This results in the same
problem as using custom images, namely the size of the configuration becoming too large. If that becomes the
case, reduce the size of your descriptions.
When you enable the Offline Mode, a local file is created and is kept in sync with the data source. This file is
encrypted using the Windows built-in NTFS encryption which can cause delays in refreshing the local data file.
This is rarely the case but seems to happen on computers within a domain which has been hardened by the
network administrator. You can turn off this option by unchecking Use NTFS Encryption for offline mode in File
– Options – Advanced.
NTFS Encryption
CLASSIC UI
The new Ribbon UI is modern and allows for infinite variations of panel organization, but it does take more
calculations by the UI layer. On most system this is not a cause for noticeable performance slowdown, but on
others setting the User Interface to Classic UI (v7.x) in the general options tab will definitely help.
13.10.18.2Diagnostic
DESCRIPTION
Sometimes when a performance issue occurs while using Remote Desktop Manager, the
support personnel may ask you to send information. Here are three sources or information that
the support team requires to help diagnose your issue.
PROCEDURES
2. Click on the envelope button to send the information to our support team. In the following
dialog, ensure you specify enough information to link the report to the appropriate ticket, if the
process was started from the forum include your forum username.
DIAGNOSTIC
Diagnostic Window
1. Open Help – Diagnostic.
PROFILER
Profiler
1. Open Help – Profiler, move the window aside to clear the main window of Remote Desktop
Manager.
2. Select the Performance tab.
3. In Remote Desktop Manager, hold the CTRL key and press the refresh button.
4. Information will be added in the Performance tab.
5. Click on the Send Trace to Support button. In the following dialog, ensure you specify enough
information to link the report to the appropriate ticket, if the process was started from the
forum, please include your forum username.
13.10.18.3Startup
DESCRIPTION
The start-up performance of the application can be affected by two main events:
1. Launching the "Shell".
2. Obtaining the content of the data source.
Since getting the data involves an additional layer that may be the cause of a perceived
slowness for the application to be ready, we require that you create a new empty XML data
source to measure the application start-up time. This will in help determine if the issue lies with
the shell or with the data source.
Please consult Remote Desktop Manager Startup performance for the first step. You can then
consult Performance - Data sources if you feel that there is an issue in that area.
13.10.19Powershell
ERROR
When running PowerShell (RDM CmdLet) after deploying Remote Desktop Manager from the
*.zip file, you might see an error message like the following:
Error Message
SOLUTION
ERROR
SOLUTION
ERROR
None of the Powershell cmdlets in Remote Desktop Manager work after an update, even if they
were running correctly prior to the update.
SOLUTION
The first step is to check how many versions of the RDM snap-in are currently installed on the
computer. Just type this command in Powershell (RDM CmdLet) :
Get-PSSnapin -name Remote.Desktop.Manager.*
Get-PSSnapin commandlet
If there are more than one version of the snap-in installed, the result of the command will list them
like this :
To remove snap-ins that do not match with the actual version of Remote Desktop Manager
installed on the computer, use the Remove-PSSnapin cmdlet, ensure you specify the specific
version to remove.
Finally, verify if only the snap-in of the current version of RDM is installed with the Get-PSSnapin
command.
https://technet.microsoft.com/en-us/library/ee176961.aspx
2. Open Remote Desktop Manager as Administrator and open the Powershell module and run;
Set-ExecutionPolicy
13.10.20Putty
ERROR
Remote Desktop Manager is not able to execute Putty in embedded mode when Team Viewer's QuickConnect
button is present in the title bar.
To resolve this issue, you need to disable the QuickConnect button in Team Viewer by unchecking the option
Extra – Options – Advanced – Show advanced options – QuickConnect button – Configure – Show
QuickConnect button.
This solution can also be applied to other applications such as Filezilla or Firefox.
ERRORS
MY MAPPED NETWORK DRIVE(S) ARE NOT AVAILABLE WHEN USING RUN AS ADMINISTRATOR TO
LAUNCH REMOTE DESKTOP MANAGER
This is because of User Access Control (UAC), a built-in security layer of Windows.
Effectively you are considered a different user with different preferences, the Mapped
network drives being one such preference. In order to have the same mapped drives you
have a few options:
1. Using an elevated command prompt, recreate the same mapped drive(s) using the NET
USE {DRIVENAME} {SHARENAME} /PERSISTENT:YES command
This error is due to a corrupted Microsoft's .NET Framework installation. Please consult the Corrupted System File
topic for more information on how to resolve this issue.
This should occur only on machines with development environments or when the .net framework
have undergone multiple installs/uninstalls.
<startup useLegacyV2RuntimeActivationPolicy="true">
Webroot SecureAnywhere AntiVirus may cause the issue because of the Identity Protection module. Set
remotedesktopmanager.exe to Allow and it will let you paste again in the application.
Please consult topic Hung Remote Desktop Manager troubleshooting for more information.
All your sessions open in a display mode that is undesirable and you can't seem to set it the way you want by
default. This can be changed by going in File -> Options -> User Interface -> Navigation Pane
13.10.21.1Caching
DESCRIPTION
You are not seeing the content that you're expecting to see in the Navigation Pane.
SOLUTION
This issue can be caused by a corruption of the local cache. There's several methods to refresh
the local cache in Remote Desktop Manager.
METHOD 1
METHOD 2
Hold the CTRL key on your keyboard and click on the refresh button in the Quick Access
Toolbar.
METHOD 3
You can manage the local cache by doing a Vaccum, a Repair or a Delete. Please consult
Manage Cache topic for more information.
13.10.21.2Debugging
DESCRIPTION
Sometimes when an issue occurs while using Remote Desktop Manager, the support personnel
may ask you to turn on debugging and send the information back. Here are two procedures that
you can follow.
Any debug level other then zero will slow down the application and write a lot of
information in the application logs. As soon as you have completed the
diagnostics you should revert back the debug level to zero.
PROCEDURES
Use the in-depth debugging method whenever you need to diagnose the startup or initial
connection.The Ad-hoc debugging method is much easier to follow and is sufficient in most
cases.
AD-HOC DEBUGGING
1. Open Help – Profiler, move the window aside to clear the main window of Remote
Desktop Manager.
2. In the Debug only tab, click on the ellipsis button and activate the proper debug
categories.
3. In Remote Desktop Manager, perform the action that is under investigation. For timing
session load times, please press CTRL-F5 to invalidate the cache and perform a full
refresh. You should see debug information appear in the profiler window.
4. Click on Send trace to support. In the following dialog, ensure you specify enough
information to link the report to the appropriate ticket, if the process was started from the
forum include your forum username.
IN-DEPTH DEBUGGING
1. Open File – Options – Advanced, click on the Debug level ellipsis button and activate
the proper debug categories.
2. In the Information section below, you will see a hyperlink to your configuration folder, press
on it to have an explorer window opened in that folder.
4. As a preparatory phase, it would be best to clear existing logs to limit the scope of what
will need to be analyzed. Delete or rename files named RemoteDesktopManager.log,
RemoteDesktopManager.log.db and RemoteDesktopManager.debug from your
configuration folder.
9. Package the *.log, *.log.db and *.debug files from your configuration folder and send
them to us.
DESCRIPTION
Since the release of Remote Desktop Manager 13, some users have experienced high CPU
usage on their systems, especially in Remote Desktop Services (RDS) environment. This is
caused by the entry state verification feature.
SOLUTION
Disable the option Allow entry states (Lock, Running, Checkout) in Administration – Data
Source Settings (System Settings) – General to improve performance on your servers and
your workstations.
System Settings
To resolve these issues, we will elaborate on two methods. One in Remote Desktop Manager and another using a
built-in Windows functionality.
METHOD 1
First, in Remote Desktop Manager, go in File – Options – User Interface and please uncheck “Disable display
scaling on high DPI settings.”
HDPI Scaling
If you cannot see the setting because of display issues, you can add the line in your config files directly. To locate
your config file please refer to Configuration File Location. Once you have found the right folder, please open
RemoteDesktopManager.cfg with your preferred text editor. Under the line “<CreationDate>2016-11-
14T00:00:00-05:00</CreationDate> please add, “
<DisableHDPIAutoScaling>false</DisableHDPIAutoScaling>
METHOD 2
Right-click on your Remote Desktop Manager icon. Go to Properties and in the Compatibility tab check Disable
display scaling on high DPI settings.
When applying this change, you must log off and log back in with your user for
changes to take effect.
DPI Settings
DPI Settings
DESCRIPTION
Remote Desktop Manager integrates with many different technologies and we do our best to
isolate our main process from others, but it is not always possible.
SYMPTOMS
Remote Desktop Manager hangs while you were not even using it or you were not using any other technology from
within it. This makes it hard to identify the culprit. Advanced users can follow Hung Remote Desktop Manager
Dump file creation.
DESCRIPTION
There are no guarantees the we can identify the issue, but following this procedure may guide
Devolutions towards identifying the root cause.
Please refrain from sending more than two dump files. We will simply not be
able to analyze all of them.
PROCEDURES
AD-HOC METHOD
Perform this only when the application becomes unresponsive, meaning that it stops refreshing
its screen and that the operating system adds the Unresponsive label in its title bar.
1. Launch the Task Manager.
2. Identify Remote Desktop Manager in the Apps list.
3. Right-click and choose Create dump file.
4. This will generate a file that cannot be transferred by email. There are multiple free online services to send large
files, please contact us if you need a suggestion for such a service.
The following procedure makes use of a tool offered by Microsoft's Technet, namely the
Sysinternals suite. The tool that we need is procdump. It is easier because the tool will monitor
the application and create a dump file automatically.
If the application becomes unresponsive, the tool will handle everything. Simply locate the dump
file and send it to us.
13.10.21.6Large Memory Aw are Application
DESCRIPTION
Remote Desktop Manager 32 bit version is limited in the amount of memory it can use. This is
limited to 2 GB. This didn't cause issues until the release of Window 8 and Windows Server
2012, RDP connections to these OS's consume a large amount of memory, typically 140-160
Mb per connection.
Remote Desktop Manager 64 bit version allow the application to use as much memory as is
available, in the mean time, we've modified Remote Desktop Manager to allow it to access
more memory, but this must be paired with a modification to your operating system.
You can perform this only if you have more then 2 GB of RAM.
INSTRUCTIONS
1. Right-click My Computer and select Properties. The System Properties dialog box will
appear.
3. In the Startup and Recovery area, click Settings. The Startup and Recovery dialog
box will appear.
4. In the System startup area, click Edit. This will open the Windows boot.ini file in
Notepad.
5. In the [Operating Systems] section, add the following switches to the end of the startup
line that includes the /fastdetect switch: /3GB
7. Click OK two times to close the open dialog boxes, and then restart the computer for the
change to take effect.
The memory parameter can be any value between 2048 (2 GB) and 3072 (3 GB).
If you have 3GB of RAM you must reserve some for your system. If you have 3 GB
of ram, allocate 2560 Mb, for 4 GB systems use 3072.
DESCRIPTION
Several panes are missing in Remote Desktop Manager and you seem unable to bring them
back.
· Navigate to %localappdata%\Devolutions
· RemoteDesktopManager.ext
· Connections.db
· Navigate to %localappdata%\Devolutions
· RemoteDesktopManagerFree.cfg
· RemoteDesktopManagerFree.ext
· Connections.db
13.10.21.8Missing Sessions
DESCRIPTION
SOLUTION 1
Refresh the local cache. Please consult the Caching topic for more information.
SOLUTION 2
Click on Window -> Reset Layout to bring back the Name column.
Reset Layout
13.10.21.9Offline Mode
ERRORS
Your offline cache may be out of sync with the content of the data source. Press CTRL + F5
to refresh the local cache.
13.10.21.10
Profiler
DESCRIPTION
DESCRIPTION
There is a huge Red "X" in the Navigation Pane or in the Credential List
SOLUTION
There are a few things you can try to get rid of the red X.
First, try going to the Window tab and click Reset Layout
If that doesn’t work, you can try to close RDM, then navigate to %localappdata% -> Devolutions -
> RemoteDesktopManager and delete every file with the .lyt extension.
If neither of those methods does the trick, you will have to move the RemoteDesktopManager
folder from localappdata to your desktop, then uninstall RDM, reboot your computer and reinstall
RDM. Once you reopen RDM, the red X should be gone.
13.10.21.12
Root Is Empty Error
DESCRIPTION
After upgrading to Remote Desktop Manager 13.5.x, you may receive the error below;
at
Devolutions.RemoteDesktopManager.Managers.RootConnectionManager.get_RootConnection
()
at
Devolutions.RemoteDesktopManager.Frames.ConnectionViews.FreConnectionTreeListView.c
e5f4c5875531b613e87da05d31efd852(ConnectionViewMode
cfa8984eaceb595fb57911c4e0ee96824)
at
Devolutions.RemoteDesktopManager.Frames.ConnectionViews.FreConnectionTreeListView.L
oadConnectionList(Connection[] connections, ConnectionViewMode viewMode)
at
Devolutions.RemoteDesktopManager.Forms.FrmMainRibbonBase.LoadAllConnectionView(Bo
olean saveState)
at
Devolutions.RemoteDesktopManager.Forms.FrmMainRibbonBase.RefreshAllConnectionView(
Boolean saveState, Boolean checkOnline)
at Devolutions.RemoteDesktopManager.Managers.MainFormManager.DoFirstLoad(IMainForm
mainform)
at
Devolutions.RemoteDesktopManager.Forms.FrmMainDocumentManager.cae3b4c7c167cf0d9
at System.Windows.Forms.Timer.OnTick(EventArgs e)
at System.Windows.Forms.Timer.TimerNativeWindow.WndProc(Message& m)
SOLUTION 1
Many issues related to it have been addressed in the latest version which you can download
here;
https://remotedesktopmanager.com/home/download
SOLUTION 2
The other solution is to simply switch between data sources or delete and recreate the data
source in File -> Data Sources.
13.10.21.13
Session Focus Issue
DESCRIPTION
There are two settings in File -> Options -> User Interface -> Tree View that you can
enable/disable to resolve this issue. Those are Auto focus tab on item select and Auto
select item on tab focus.
13.10.21.14
SQL Server Data Source Connection Refused
DESCRIPTION
When you try to connect from either Remote Desktop Manager and/or Password Vault Manager,
you receive the following message;
You will need to access the database via SQL Server Management Studio and execute the
following statement on the database;
UPDATE dbo.DatabaseInfo
UPDATE dbo.DatabaseInfo
DESCRIPTION
If you experience slow startup times, there are a few things to try in order to reduce the time
before the application is available for use.
For your security, we "sign" our program with a code signature. This results in the validity of
the signature being checked at application startup. If the machine is not connected to the
internet the application will wait for a response until a timeout occurs. For detailed
explanations please read the following:
· https://blogs.technet.microsoft.com/markrussinovich/2009/05/23/the-case-of-the-slow-
keynote-demo/
The workaround is to create a text file in Remote Desktop Manager installation folder,
named RemoteDesktopManager.exe.config that must contain the following:
<configuration>
<runtime>
<generatePublisherEvidence enabled="false"/>
</runtime>
</configuration>
Every time you start Remote Desktop Manager, the application will try to connect on
https://remotedesktopmanager.com/clientinternal/enterprisenews. You should prevent all internet
access from the application.
RemoteDesk topManager.cfg
Remote Desktop Manager is a .NET application. This means that the code is delivered in an
intermediate format. It is then processed on your local machine in order to generate what is
called a Native Image. Sometimes, this process can be slow. It can also reoccur after certain
conditions are met. For these reasons, we deliver a batch file to process all of our files at once.
You will find this file in the installation folder of Remote Desktop Manager. It is called
OptimizeRDM.bat. Please open a Command Window using Run As Administrator and launch
that script.
ANTIVIRUS
If your antivirus application allows it, simply turn off monitoring of Remote Desktop Manager's
installation folder. If you are comfortable with turning of the whole antivirus protection, do this to
test the startup time.
There is sadly nothing we can do in this case. It is only a step that helps in isolating the cause.
13.10.21.16
Unable to install or upgrade
DESCRIPTION
When you install or upgrade Remote Desktop Manager, you receive this error message below;
You simply have to deploy the *.zip file of Remote Desktop Manager in Remote Desktop
Manager's installation folder.
When the *.zip file is downloaded, extract or copy/paste the content of the *.zip file in the C:
\Program Files (x86)\Devolutions\Remote Desktop Manager folder. When you restart
Remote Desktop Manager, the latest version will be installed.
ERROR
To fix issues that you may encounter with the installation, removal of the application or missing MSI file, please
run the Microsoft Troubleshooting tool on your computer.
https://support.microsoft.com/en-us/mats/program_install_and_uninstall
If the installer still reports an error, please run the installer from the command line using these
parameters:
msiexec /i "{Name of msi package" /L*V "Name of log file"
Please adapt to your environment and the folders that you use. Here is an example:
msiexec /i "Setup.RemoteDesktopManager.11.7.6.0.msi" /L*V "C:\log\RdmInstall.log"
DESCRIPTION
You seem unable to uninstall Remote Desktop Manager from Programs and Features in
Windows. In the Event log; you see the following error message;
STEP1
Your settings and local data for RDM are by default under %LOCALAPPDATA%
\Devolutions\RemoteDesktopManager, our installer doesn’t touch this at all. You must
preserve this folder in its current state.
STEP 2
THE RIBBON HAS BEEN HIDDEN AND I DON'T KNOW HOW TO MAKE IT
VISIBLE
You have two options: Use the Alt + F11 shortcut or using the system menu of the application
you can check the "Top Pane" command. Please see Top Pane for more information.
The Navigation Pane can be displayed in many modes. You can select the tree view with View – Vault – Tree
View or use the default shortcut F7.
Use the Reset Layout option to revert back to the default UI layout in the Window tab.
The reset layout might not resolve all the issues. Close the application and delete
the layout files (*.lyt) in %LocalAppData%
\Devolutions\RemoteDesktopManager to completely restore the layout.
Only your favorites are displayed, the root node is also entitled "Favorites".
You may have inadvertently enabled a filter. Click on the ellipsis button of the search filter box and deselect the
Show Only Favorites menu item. Simply Vault or whichever view you expected at the bottom of the pane.
13.10.21.20
Unable to communicate w ith Passw ord Vault Manager
ERROR
When trying to retrieve a credential using your Password Vault Manager credential entry in
Remote Desktop Manager, the loading times out and you receive the following error message;
Error Dialog
SOLUTION
2. Navigate to %LOCALAPPDATA%/Devolutions/RemoteDesktopManager
<EnsurePasswordVaultManagerPresent>false</EnsurePasswordVaultManagerPresent>
4. Save the file & restart Remote Desktop Manager. You should now be able to successfully
communicate with Password Vault Manager.
13.10.21.21
Prox y Authentication Required Error
DESCRIPTION
When opening Remote Desktop Manager, you receive the following error message;
SOLUTION 1
SOLUTION 2
For those using our cloud solutions, please also add https://cloud.devolutions.net.
13.10.22RPC
ERRORS
This error may occur in the normal operation of RDM. The root causes are network connectivity or stopped
Windows services.
1) Ensure the host is properly identified (Name or IP address) and it is indeed running and accepting network
traffic.
2) Ensure the host firewall allows inbound traffic for Windows Management Instrumentation.
3) Ensure the following services are started and are set to automatic startup type.
13.10.23Secret Server
DESCRIPTION
Here is a script that you can use to test your access from a client workstation.
Change the script as needed to match your Secret Server and username/password/domain.
This will allow you to test the connectivity between your workstation and your Secret Server
server.
$url = 'http://mysecretserver/webservices/sswebservice.asmx'
$username = 'myusername'
$password = 'mypassword'
$domain = 'mydomain' # leave blank for local users
$searchterm = 'VPN'
$proxy = New-WebServiceProxy -uri $url -UseDefaultCredential
# if ($result2.SecretSummaries.length -gt 0) {
# $result2.SecretSummaries[0]
# }
13.10.24Secure Note
ERROR
SecureNote
Change the IE emulation mode in File – Options – Types – Web, set the IE Mode to use
Internet Explorer 10.
IE Mode
13.10.25Session Tools
When you attempt to use Computer Management, you receive the error below.
To get this working, you need to check this option in the Tools tab of the RDP session.
If this doesn't solve your issue, it is likely that your session has User Specific Settings enabled.
Please check your session for these settings.
This can be useful when you are using tools such as:
· Hyper-V
· Event Viewer
· Computer Management
· Windows Services
If this is often needed, we recommend you to change the Default Settings of the entry type. With this modification,
all your new sessions will use the specified credentials when a tool is launched!
13.10.26SSH
Only SSH v2 is supported. SSH v1 has inherent design flaws which make it vulnerable and it
has been generally considered obsolete. Putty can be used for situations where SSH v1 is
required.
When trying to use the keypad in SSH, it does not send the correct characters when you type.
In the Terminal tab, please set the Disable application keypad mode to True so that the option
works globally on all your sessions;
13.10.27Synchronizers
13.10.27.1Active Directory Synchronizer
GENERAL
This is a problem caused by Multimaster replication of directory objects. When there are
name collisions, the system automatically renames one of the accounts by appending CNF
to indicate conflict resolution and a GUID which is guaranteed to be unique.
HOST NAME IS APPENDED WITH CNF, AND THE ENTRY NAME ALSO CONTAINS A
GUID SUFFIX
ERRORS
VMware tools make assumptions that their scripts are run in an interactive
session and also present warnings the first time that they are run. As it stands
today, you have to run commands interactively after you've installed or
upgraded their tools.
This error message is displayed for various reasons. For a quick diagnostic, launch the VMware
vSphere PowerCLI shortcut of the same bitness (32/64 bit) as your Remote Desktop Manager.
Some commands will be listed in the table below to diagnose issues in sequence
STEP COMMAND
Remote Desktop Manager ultimately sends a few commands in an encoded script, you can
open a PowerShell window and type the following commands sequentially. This way you will
have time to see the error messages.
The first command connects with the server, a password prompt will appear:
The second command lists the virtual machines present on the server. It displays the Name
and the ID.
As described in their message, it will be the default value in a coming release. Please
consult their documentation and make an informed decision, but most users should accept
the Multiple option.
CAUSE
This error occurs because the PowerCLI modules are not linked with PowerShell or the
PowerCLI Module for the Connect-ViServer command is missing.
SOLUTION
Running 'Get-Module VM* -ListAvailable' in PowerShell shows the list of VMware modules
installed.
VMware PowerCLI
You should see 4 VMware modules listed in PowerShell as shown in the image above.
VMware PowerCLI
By typing the command, we see that PowerShell doesn't have the proper module installed.
In the PowerShell Window, install the PowerCLI modules by using the 'Install-Module'
command. Many step by step instructions can be found on Google.
Then type the 'Get-Module VM* -ListAvailable' command again, we can see that the PowerCLI
modules are now listed.
VMware PowerCLI
A Final test with the 'Connect-ViServer' command, by typing it in PowerShell, the connection is
established and the issue should be resolved.
VMware PowerCLI
ADDITIONAL TROUBLESHOOTING
If try on a new computer and have an issue with VimAutomation.Core, you can install it with the
command:
Install-Module -Name VMware.VimAutomation.Core -AllowClobber -Scope CurrentUser
VMware PowerCLI
If you restart RDM with the current user (not running as admin) and open the VMware Dashboard
entry, after 30 seconds, you should see all your servers.
If this does not work, create a PowerShell entry, the blue one ,
select Embedded Script and type the script below:
Import-Module VMware.PowerCLI;
Connect-ViServer "SERVER_IP";
Get-View -ViewType VirtualMachine | select -Property Name, {$_.Moref.Value};
But you can resolve the issue with the following command;
Set-ExecutionPolicy Unrestricted -Scope CurrentUser
Please refer to your administrator to ensure this command is allowed to be used within your
infrastructure.
13.10.28.1Advanced Troubleshooting of the Pow erCLI
DESCRIPTION
Remote Desktop Manager calls PowerCLI's cmdlets and presents the results in its user
interface. Here are steps to help isolate issues when the integration is not working as expected.
GETVMS.PS1
Param(
[Parameter(Mandatory=$true)]
[string]$viServer,
[Parameter(Mandatory=$true)]
[string]$userName,
[Parameter(Mandatory=$true)]
[string]$password
) #end param
EXAMPLE USE
Name $_.Moref.Value
---- --------------
MACHINE1 18
MACHINE2 19
CONNECTVMRCFROMPOWERCLI.PS1
Param(
[Parameter(Mandatory=$true)]
[string]$viServer,
[Parameter(Mandatory=$true)]
[string]$userName,
[Parameter(Mandatory=$true)]
[string]$password,
[Parameter(Mandatory=$true)]
[string]$morefId = ""
) #end param
EXAMPLE USE
You must send the MoRef.Value which was obtained using Script A, in our example, let's start
MACHINE2 which has 19 for ID.
.\ConnectVMRCFromPowerCLI.ps1 [SERVER_NAME] [USER_NAME] [PASSWORD] 19
The VMRC should appear and allow you to interact with it.
13.10.29VPN
13.10.29.1Missing Opened VPN from List
The opened VPN is not listed in Remote Desktop Manager. Unfortunately, there is no way for
us to detect an already opened VPN session.
13.10.29.2FortiClient
DESCRIPTION
Fortinet removed the feature to inject credentials in FortiClient 5.4 and above.
However, they still left the feature with FortiSSL
Company terminology:
SOLUTION
The CLI for FortiSSL is not included anymore with the download of FortiClient. You need to
download the tools related to the current version of FortiClient here.
You need to have a support plan with Fortinet to download the tools. If you don't
have a support plan, try to contact Fortinet directly and ask them to send you the
file.
ERRORS
Remote Desktop Manager simply calls the command line interface (CLI) with supported
parameters. At this time (v4.9), the executable can be found in:
The CLI must be able to connect, Remote Desktop Manager doesn't perform anything
additional to make it work.
13.10.29.4Microsoft VPN
DESCRIPTION
These types of VPNs can use either the RASDIAL or RASPHONE applications
for establishing the connection. Please consult Microsoft's article on their
differences and usage.
You can refer to this Microsoft TechNet article for more information on RASDIAL:
https://technet.microsoft.com/en-us/library/bb490979.aspx.
GENERAL
Sometimes you need to accept a message or make a choice upon first use, but that typically
occurs only the first time. Sadly this makes running the command manually once mandatory on
all machines.
If you have elected to store the PBK in Remote Desktop Manager, we simply extract it to %TMP
%\RDM upon usage. After trying to establish a connection once, you should see your
phonebook in that folder, is it present?
By default, it uses RASDIAL, what happens if you run the following at the command prompt?
rasdial <connectionname> <username> <password> /phonebook:<phonebookpath>
or if the Use rasphone (ConnectionManager Administrator Kit) option is checked, it will use
RASPHONE. What happens if you run the following at the command prompt?
rasphone -d <connectionname> -f <phonebookpath>
ISSUES
Ensure that within the phonebook, the vpn definition name does contain a space character.
Quotation mark (") is not a valid character and should not be used in the password of a Microsoft
VPN entry.
13.10.29.5Cisco AnyConnect
DESCRIPTION
The Cisco AnyConnect add-on doesn't send the proper information like the password or the
group number to the vpncli.exe DOS window to establish the VPN connection.
For example, only the half of the password is sent to the Cisco AnyConnect window.
SOLUTION
The Cisco AnyConnect add-on use sendkeys to send information to the vpncli.exe window. The
issue that we encounter is caused by the Windows UAC feature. Enabling/Disabling UAC on
your computer should resolved the issue.
On your computer, go in Control Panel – User Account – User Account Control Settings:
· Select Never Notify to turn off the option.
· Select Notify me or Always notify to turn on the option.
13.10.30Web Browsers
13.10.30.1Internet Ex plorer
When you launch a Web Browser (http/https) in Internet Explorer directly (external mode), the script errors are
handled by the browser, so they are not displayed. In embedded mode, you need to enable the Hide script error
in the properties of your session.
IE Embedded
This issue occurs when a specific option is unchecked for IE in Tools -> Internet Options ->
Advanced
The option is called Enable third-party browser extensions. After enabling this option, IE must be restarted.
IE Advanced Options
RENDERING
By default Remote Desktop Manager does not use the latest IE version (emulation mode).
This can be changed in File – Options – Type – Web, IE Mode.
When a crash occurs in Remote Desktop Manager while using some ActiveX in IE, it's
often caused by Data Execution Prevention (DEP). DEP is a security feature included in
Windows. It is used to prevent an application or service from executing code from a non-
executable memory region.
To fix this, simply change the DEP settings for the application as follows:
You may have noticed that when you launch items such as IE windows from within RDM,
they pop-up in the background.
The ForegroundLockTimeout registry value for the User’s Profile has to be modified
from the default of 200000 down to 0:
[HKEY_CURRENT_USER\Control Panel\Desktop]
"ForegroundLockTimeout"=dword:00000000
Please note that some programs that have an extensive library of add-ons (Like MS Word)
may take the focus every time the add-on performs an action. You have to observe the
reaction of your most used programs and judge what is the setup that works best for you.
13.10.30.2Google Chrome
ISSUES
5- Create an embedded Chrome web session and use the following link https://get.adobe.com/flashplayer/about/ to
verify that it works.
Remote Desktop Manager starts Google Chrome in a separate application (Embedded32.exe) and then re-
parents the application inside Remote Desktop Manager.
To resolve this issue, you need to check the option Ignore certificate errors in the properties of the Web
Browser (http/https) session.
13.10.30.3Firefox
ISSUES
Remote Desktop Manager starts Firefox in a separate application (Embedded32.exe) and then re-parents the
application inside Remote Desktop Manager.
Firefox does not work when the Team Viewer QuickConnect button is present in the title bar.
To resolve this issue, you need to disable the QuickConnect button in Team Viewer by unchecking the option in
Extra – Options – Advanced – Show advanced options – QuickConnect button – Configure – Show
QuickConnect button.
13.10.30.4Web Authentication
DESCRIPTION
For some websites, the auto fill function does not work out of the box.
It requires some steps in order to properly send the username and password. Depending on the
website, the process can be simple or may require additional tweaks.
METHOD 1
1. In the Login tab of the Web Browser entry, select the Form Authentication mode, and enter
the credentials. Then, verify that the Autofill login and Auto submit options are enabled.
OPTION DESCRIPTION
OPTION DESCRIPTION
Autofill login Automatically fills in the credential fields when opening the
web page.
Autofill delay Set a delay between opening the web page and attempting
the auto fill feature.
Auto submit Automatically submit the credentials and try connecting to the
website.
2. In the Html Control ID tab, click the Discover button to define the appropriate fields.
The Discover command searches the web page to find the fields that correspond to those in the
entry. This allows the application to find the appropriate fields to fill when connecting to the
website.
3. Once all the necessary steps have been completed, upon launching the session, the
credentials will automatically be entered and logged into the site.
METHOD 2
The second method requires to manually identify the IDs corresponding to the logon fields on the
login web page.
For this example, we will be using Google Chrome to inspect the logon fields.
For both the Username & Password fields, do a right-click inside the field and click on Inspect;
You will see the corresponding IDs to be used in the HTML Control ID tab of the Web session in
Remote Desktop Manager;
13.10.31WebDav
ERRORS
Make sure that the appropriate domain is configured in the Host field (ex: domain.com) and that you have
“/remote.php/dav/files/USERNAME/“ in Start location.
If you have a HTTPS website, check the Use SSL checkbox and configure the port to be 443.
You can always refer you to the ownCloud documentation for more details on
WebDav.
13.10.32Web traffic
DESCRIPTION
Do not use this without a specific request from Devolution's support personnel.
The trace file must NOT have a path specified, this requires that RDM be installed
in a folder other than Program Files. (Running with elevated privileges doesn't
circumvent the UAC.)
PROCEDURE
<system.diagnostics>
<trace autoflush="true" />
<sources>
<source name="System.Net" tracemode="protocolonly" maxdatasize="1024">
<listeners>
<add name="MyTraceFile"/>
</listeners>
</source>
</sources>
<sharedListeners>
<add
name="MyTraceFile"
type="System.Diagnostics.TextWriterTraceListener"
initializeData="System.Net.trace.log"
/>
</sharedListeners>
<switches>
<add name="System.Net" value="Verbose" />
</switches>
</system.diagnostics>
ADVANCED MODE
13.10.33Welcome Page
DESCRIPTION
We added a new Getting Started page at the opening of Remote Desktop Manager but you
don't want to see it every time you open our application.
1. If you haven't closed it yet, simply click on Don't show again in the upper left corner.
2. Go in File -> Options -> User Interface and uncheck Show Welcome page at start-up.
It is possible to display your own welcome page at startup. Under Administration in the ribbon,
choose Data Source Settings (System Settings). Then, in Applications, under the Welcome
Page section, enter the URL that points to your custom welcome page.
13.10.34WMI
DESCRIPTION
https://msdn.microsoft.com/en-us/library/aa389290.aspx
we basically run winrm quickconfig on all our machines, for those not joined to a
In our environment,
domain we also add them to the TrustedHosts list. For machines not joined to a domain, there's
an added difficulty if you are using the IP address instead of the Host name, it definitely offers a
few challenges.
A good strategy is to get remoteWMI to work, then we integrate it in RDM. We like to use WMIC.
https://msdn.microsoft.com/en-us/library/aa394531(v=vs.85).aspx
Ensure the user account has the necessary permissions to access a computer remotely
Securing a Remote WMI Connection (Windows).
Invalid Class WMI or WMI class not found on Windows Server 2003. On Windows Server 2003,
Win32_Product is not enabled by default. You can enable it by following the steps provided in
the link below:
https://social.msdn.microsoft.com/Forums/vstudio/en-US/6fb0d3ea-1ccf-4554-bdf1-
79c9e24388af/invalid-class-wmi-windows-2003-server
The WMIC command is used to test if you have access to the machine through WMI. You need
to enter the following command below;
13.11 Tutorials
DESCRIPTION
Our tutorials are published on Devolutions YouTube channel. We have three main categories of
tutorials:
· Overview: Brief presentation of a product.
· Getting Started: Procedure to get up and running in a quick fashion.
· Spotlight On...: Detailed presentation of a specific aspect of our products.
Obviously some tutorials will not fit in one of these categories, but our focus is to deliver quality
information as soon as possible after the release of a new or modified feature.
Please use our forums if documentation is missing or plain wrong, we will do our best to correct
the situation.
13.11.1 Overview
DESCRIPTION
Overview videos present a brief presentation of a product, there is no step-by-step but only explanation of a
certain part of our product.
Create Users and Assign Take a quick look at how to create users for
Permission your data base and how to assign specific
permission to each user.
organization
Choose your data source An overview at our multiple data sources and
how to select the proper one for you and your
enterprise.
DESCRIPTION
Getting Started videos present a step-by-step sequence to start using a product. They differ
from our "Spotlight On..." series in that they are targeted on significant feature of the product,
rather than on a piece of a whole.
Remote Desktop Manager Learn how to perform the initial setup for
Jump allowing usage of Remote Desktop Manager
Jump to connect to remote devices through a
jump host.
Remote Desktop Manager Upon first launch learn how to create your first
Step 1: Register your data source and your first database.
Data Source
Remote Desktop Manager Learn how to set up your options to make your
Step 2 Options for Team environment more fitting for teams.
Environment
Remote Desktop Manager Taking a quick look at our options and what
Step 3: Default Settings are the best default settings for your team
environment before creating your entries.
Remote Desktop Manager Learn how to create and manage your entries
Step 5: and also taking a quick look at Security Group
Management.
How to create your
entries
DESCRIPTION
This video category is destined to contain a number of short tutorials that provide information on
more specific aspects or features of Remote Desktop Manager.
Ultimately, all longer videos will be replaced by a series of Spotlight on... tutorials.
Our Getting Started topic contains a sequence of steps to follow to go through the initial setup
under various conditions. Please refer to it for the best sequence for your environment.
Execute Report Learn how to execute and export same reports multiple
through times by exporting reports through a command line.
Command Line
Index -S-
Service host 21
-2- Silent install 45
-B- -U-
Bastion server 21
Unattended 45
update 82
-C-
Citrix 78
-J-
Jump box 21
Jump server 21
-M-
MFA 1182
MSSQL 195
-P-
parameters 1004
Password analyzer 768
Password strength 768
-R-
RASDIAL 510
RASPHONE 510
RDS 78
Remote Desktop Services 78
RemoteApp 78