Actions that you can perform on the target
- Inject Ctrl + Alt + Del
- Injects Control, Alt, and Delete keys. The resulting action is
system dependant.Note: When you inject Ctrl +Alt +Del and you are using Windows™ 7 operating system, complete the following steps:
The two scenarios that ensure that the logon window pops up are as follows:
- UAC on and Secure Attention Sequence set to Services
- UAC off and Secure Attention Sequence set to Services
- To start Microsoft™ Management Console, click .
- To add Group Policy Object Editor Snap-in, select .
- Expand Local Computer Policy.
- Expand Computer Configuration.
- Expand Administrative Templates.
- Expand Windows Components.
- Select Windows Logon Options.
- Double-click Disable or enable software Secure Attention Sequence.
- Select Enabled.
- Select Services.
- If Ease of Access applications was already selected, choose Services and Ease of Access applications.
- Select OK.
Note: The Inject Ctrl+Alt+Del menu is unavailable during a session with an on-demand target when you are using Windows XP or Windows Server 2003 operating systems. - Inject Alt + F4
- To close the active window on the target computer.
- Inject Alt + Tab
- To switch between active windows on the target computer.
- Inject Alt + Enter
- To run a command-line window on the target in full screen mode. Select Inject Alt + Enter again to change the command-line window to normal mode.
- Inject Control + Esc
- To open and close the Start menu on the target computer.
- Drawing Tool
- To draw basic colored lines on the target's screen. For example, to point to a particular area on the target screen by drawing a circle around the area. For more information about the drawing tool, see Using the guidance tool.
- Highlight tool
- To select and highlight a specific area on the target's screen. For more information about highlighting, see Using the highlight tool.
- Clear Instructions
- To remove all guidance drawings or highlighted areas from the target screen.
- Lock Workstation
- To lock the target workstation.
- Open URL
- To type in a URL that is opened in the target computer's default web browser. Type in the URL and click OK. The target default browser opens at the specified URL.
- Screens
- To select which of the target screens is shown in the controller window, if the target is configured with multiple screens. For example, if the target is configured with two screens, there are two entries in the submenu, Screen 1 and Screen 2. You can toggle the remote view between the two screens.
- Enable Privacy
- To hide the target screen from the target user. The target screen is blacked out with a message that the system is being serviced by IBM BigFix Remote Control, is displayed. However, you can work with the target system on your screen. The local input and display are locked for the target user and they are not able to do anything on the target while privacy is enabled. Enable privacy is useful when you are working on systems with sensitive information.
- Lock target input
- To lock the target user 's mouse and keyboard during a remote
control session. This menu item is available only when the Allow
input lock policy is enabled for the session. The target
screen is still visible to the target user. Note: If the option to Enable Privacy is selected, the remote user input is automatically locked. It is not possible to enable privacy without also locking the input.
- Registry Keys
-
Available only if the Allow registry key lookup or View registry key list policies are enabled for the session. When you click Registry Keys, a list of registry keys might be displayed and an Enter key item, depending on the policies that are set for the session. For more information about editing policies, see the IBM BigFix Remote Control Administrator's Guide.
- When a list of defined registry keys is displayed.
Click one of the listed keys to see the current value for it, on the target. The keys are defined in the trc.properties file and the names that are listed correspond to a specific registry key on the target. For more information about editing the properties files, see the IBM BigFix Remote Control Administrator's Guide.
For example,
when you click Registry keys you might see Services listed.
If you click Services, a new window opens that displays all of the
services on the target.- To enter a specific registry key.
Use the Enter key item to enter a specific registry key you want to know the value for by completing the following steps:
- Type in a key value in the Registry key field.
For example,
HKLM\SYSTEM\CurrentControlSet\Services\TRCTarget
Note: Make sure that you enter the exact path to the registry key. - Click View.
- Type in a key value in the Registry key field.
For example,
- Keep Session Log
- The Keep Session Log option is available during an on-demand session.
Determines whether you can save the session log to the target computer, when the session ends.
Select Keep Session Log to save the log to the target computer in the user 's
working directory, at the end of the session. The log is saved in the following
format:
trc_odt_trace_yyyymmdd_hhmmss.log.
For example, trc_odt_trace_20130531_130300.log.
If you do not select Keep Session Log, the log file is deleted at the end of the session. However, if the session is interrupted by a non-user event, for example, a network failure, the log file is also saved.