Actions that you can perform on the target

Use the Perform action in target menu to perform various actions on the target system during an active or guidance remote control session. The following actions are available depending on the type of remote control session that is running. The full list is available during an active session and a limited number of actions are available during a guidance session. Depending on controller properties that are set, you might also see menu items for running tools or injecting key sequences on the target. For more information about controller properties, see Configuring controller properties.
Note: The Screens action is also available during a Monitor session if the target is a multi-monitor system.
Inject Ctrl + Alt + Del
Injects Control, Alt, and Delete keys. The resulting action is system dependant.
Note: When you inject Ctrl +Alt +Del and you are using Windows™ 7 operating system, complete the following steps:

The two scenarios that ensure that the logon window pops up are as follows:

  • UAC on and Secure Attention Sequence set to Services
  • UAC off and Secure Attention Sequence set to Services
  1. To start Microsoft™ Management Console, click Start > Run > mmc.exe .
  2. To add Group Policy Object Editor Snap-in, select File > Add/Remove Snap-in.. > Group Policy Object Editor > Add > Finish > OK.
  3. Expand Local Computer Policy.
  4. Expand Computer Configuration.
  5. Expand Administrative Templates.
  6. Expand Windows Components.
  7. Select Windows Logon Options.
  8. Double-click Disable or enable software Secure Attention Sequence.
  9. Select Enabled.
  10. Select Services.
  11. If Ease of Access applications was already selected, choose Services and Ease of Access applications.
  12. Select OK.
Note: The Inject Ctrl+Alt+Del menu is unavailable during a session with an on-demand target when you are using Windows XP or Windows Server 2003 operating systems.
Inject Alt + F4
To close the active window on the target computer.
Inject Alt + Tab
To switch between active windows on the target computer.
Inject Alt + Enter
To run a command-line window on the target in full screen mode. Select Inject Alt + Enter again to change the command-line window to normal mode.
Inject Control + Esc
To open and close the Start menu on the target computer.
Drawing Tool
To draw basic colored lines on the target's screen. For example, to point to a particular area on the target screen by drawing a circle around the area. For more information about the drawing tool, see Using the guidance tool.
Highlight tool
To select and highlight a specific area on the target's screen. For more information about highlighting, see Using the highlight tool.
Clear Instructions
To remove all guidance drawings or highlighted areas from the target screen.
Lock Workstation
To lock the target workstation.
Open URL
To type in a URL that is opened in the target computer's default web browser. Type in the URL and click OK. The target default browser opens at the specified URL.
Screens
To select which of the target screens is shown in the controller window, if the target is configured with multiple screens. For example, if the target is configured with two screens, there are two entries in the submenu, Screen 1 and Screen 2. You can toggle the remote view between the two screens.
Enable Privacy
To hide the target screen from the target user. The target screen is blacked out with a message that the system is being serviced by IBM BigFix Remote Control, is displayed. However, you can work with the target system on your screen. The local input and display are locked for the target user and they are not able to do anything on the target while privacy is enabled. Enable privacy is useful when you are working on systems with sensitive information.
Lock target input
To lock the target user 's mouse and keyboard during a remote control session. This menu item is available only when the Allow input lock policy is enabled for the session. The target screen is still visible to the target user.
Note: If the option to Enable Privacy is selected, the remote user input is automatically locked. It is not possible to enable privacy without also locking the input.
Registry Keys

Available only if the Allow registry key lookup or View registry key list policies are enabled for the session. When you click Registry Keys, a list of registry keys might be displayed and an Enter key item, depending on the policies that are set for the session. For more information about editing policies, see the IBM BigFix Remote Control Administrator's Guide.

When a list of defined registry keys is displayed.

Click one of the listed keys to see the current value for it, on the target. The keys are defined in the trc.properties file and the names that are listed correspond to a specific registry key on the target. For more information about editing the properties files, see the IBM BigFix Remote Control Administrator's Guide.

For example,
when you click Registry keys you might see Services listed.
If you click Services, a new window opens that displays all of the
services on the target.

To enter a specific registry key.

Use the Enter key item to enter a specific registry key you want to know the value for by completing the following steps:

  • Type in a key value in the Registry key field. For example,
      HKLM\SYSTEM\CurrentControlSet\Services\TRCTarget
    Note: Make sure that you enter the exact path to the registry key.
  • Click View.
A new window opens and displays the current values for the specified key, as defined on the target.
Keep Session Log
The Keep Session Log option is available during an on-demand session. Determines whether you can save the session log to the target computer, when the session ends. Select Keep Session Log to save the log to the target computer in the user 's working directory, at the end of the session. The log is saved in the following format:

trc_odt_trace_yyyymmdd_hhmmss.log.

For example, trc_odt_trace_20130531_130300.log.

If you do not select Keep Session Log, the log file is deleted at the end of the session. However, if the session is interrupted by a non-user event, for example, a network failure, the log file is also saved.

Note: The Perform action in target menu is a dynamic menu that changes depending on which operating system is being used and the session connection mode. It might also be disabled depending on the operating system and policies in the session.