![]() ![]() But it does at least give us the first step so that if somebody says, "Hey, why were you in my machine?" we can produce documentation that says why. ![]() We've started putting in notes saying things like, "I went in to update Windows software," or, "I went in to fix a bug," or, "I went in to update our own software." We have not gone to the next step of reporting on, analyzing, reviewing, or using those comments as a way to drive additional follow-up. The other thing that we're beginning to use more is the feature where, at the end of each session, you can type a quick note as to why you were logging in to that device. Now, please do that." We can actually guide the client through what they need to do, even for applications that don't allow a remote-control user to modify them. We can log in with TeamViewer, view the screen, and then leave instructions in the text chat that say, "Okay, please do this. There are circumstances we've seen where certain applications don't respond because they've got some sort of security built into them so that a remote user isn't able to control them. We occasionally use the integrated text chat. Remote desktop control is what we use in TeamViewer for 99.999 percent of what we do. Some are desktops, some are tablets, and the latter range from a Surface Pro to a more substantial, military-ruggedized type of tablet. ![]() The vast majority of our users use TeamViewer on Windows machines. It makes it easier for IT security to approve us and it makes it easier for the client to get us in, particularly in circumstances where there's some urgency around that. It is a tool that allows us to access our devices on somebody else's network under their supervision, without needing our own unfettered access. So whenever they have a problem with our software, we open a TeamViewer session from a desktop inside their network to our tech support group, and that person gives us access to the server so that we can maintain our software.Īgain, that use case is a technical-support-type application, but it's a little bit different than us managing our own devices in the field. What we've found is that when a client has our company's software on one of the servers in their network, sometimes they don't want to give us access to their network to maintain our software. The other use case, which is a little bit weird, is that all of our clients are in healthcare so they are very particular about who gets into their network and who has access to their network. We have TeamViewer host clients running on devices, some wired in offices, some connected to WiFi or even cellular, and we use it to get quick access to the devices for technical support. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |