TRCuserguide
TRCuserguide
TRCuserguide
Version 5.1.2
SC23-6541-01
Tivoli
Version 5.1.2
SC23-6541-01
Note
Before using this information and the product it supports, read the information in Notices, on page 121.
Contents
Preface . . . . . . . . . . . . . . vii
Who should read this guide . . . .
Publications . . . . . . . . .
IBM Tivoli Remote Control Library
Related publications . . . . .
Accessing publications online . .
Accessibility . . . . . . . . .
Tivoli technical training . . . . .
Contacting software support . . .
Conventions used in this book. . .
Typeface conventions . . . . .
Additional information. . . . . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
vii
vii
vii
vii
vii
viii
viii
viii
viii
. ix
. ix
. . . .
. . . .
on screen
. . . .
. . . .
. . . .
. . . .
. . . .
. 22
. 22
23
. 23
. 23
. 25
. 25
. 29
. . . . 33
37
37
38
38
38
39
40
40
40
40
41
41
41
42
43
43
44
44
45
iii
.
.
.
. 55
. 56
. 56
.
.
.
. 56
. 57
. 58
. 59
. 60
. 61
.
.
.
.
61
62
62
63
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
65
65
65
66
.
.
.
.
.
.
. 67
. 67
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
75
75
75
76
77
. 78
87
88
88
89
90
90
91
. 93
.
.
.
.
101
101
101
102
. 102
. 103
. 103
. 107
. 107
86
87
111
. 123
Bibliography . . . . . . . . . . . . 127
Contents
vi
Preface
The IBM Tivoli Remote Control Users Guide explains how the Remote Control
application works and describes how to use the functions of the application.
Publications
Read the descriptions of the IBM Tivoli Remote Control library to determine which
publications you might find helpful. After you determine the publications you
need, refer to the instructions for accessing publications online.
Related publications
The Tivoli Software Library provides a variety of Tivoli publications such as white
papers, datasheets, demonstrations, Redbooks, and announcement letters. The
Tivoli Software Library is available on the Web at: http://publib.boulder.ibm.com/
infocenter/tivihelp/v3r1/index.jsp
The Tivoli Software Glossary includes definitions for many of the technical terms
related to Tivoli software. The Tivoli Software Glossary is available, in English only,
from the Glossary link on the left side of the Tivoli Software Library Web page
http://publib.boulder.ibm.com/infocenter/tivihelp/v3r1/index.jsp
vii
To locate product publications in the library, click the Product manuals link on the
left side of the library page. Then, locate and click the name of the product on the
Tivoli software information center page.
Product publications include release notes, installation guides, users guides,
administrators guides, and developers references.
Note: To ensure proper printing of PDF publications, select the Fit to page check
box in the Adobe Acrobat Print window (which is available when you click
File Print) .
Accessibility
Accessibility features help a user who has a physical disability, such as restricted
mobility or limited vision, to use software products successfully. You can use
assistive technologies to hear and navigate the product documentation. You also
can use the keyboard instead of the mouse to operate some features of the
graphical user interface.
The following keys can be used for navigating through the graphical user interface
v F12 - Enable / disable the keyboard functions
v TAB - To navigate right and left through the menus
v Spacebar - To activate a menu
v Up / Down arrow keys - Navigate through the menu items
v Spacebar - Select a menu item on an active menu
v Esc - Closes an active menu.
viii
Typeface conventions
The following typeface conventions are used in this reference:
Bold
Italic
Monospace
Additional information
You can obtain additional information about the IBM Tivoli Remote Control
program from the following web site:
http://publib.boulder.ibm.com/infocenter/tivihelp/v3r1/index.jsp?topic=/
com.ibm.itrc.doc_5.1.2/welcome.htm
The IBM Tivoli Remote Control Users Guide might be updated periodically. The
updated versions will be made available at this Web site.
Preface
ix
3. Type in a valid ID and password ( invalid or missing IDs and passwords will
generate an error message)
v If you are an Administrator, and this is your first time into the program the
default Admin ID is admin and password is password. Type this into the
logon screen and you will then be allowed to change the password to your
own requirements.
Note: Password rules are set in the trc.properties file in the set of variables
starting with password. see the IBM Tivoli Remote Control Server
Administrators Guide for details
4. Click Logon
Note: On clicking Cancel , the Userid and password fields will clear and logon
to the application will not be achieved
5. The IBM Tivoli Remote Control Server GUI will now be displayed
v If you are an Administrator you will see the following available menu
options
Targets
Copyright IBM Corp. 2009
Target Groups
Users
User Groups
Sessions
Reports
Admin
Options
Tools
Help
Notes:
a. Your ID with (A) denoting Administrator is displayed on the right of the
screen.
v If
you are a User, you will see the following available menu options
Targets
Users
Sessions
Reports
Options
Tools
Help
Notes:
a. Your ID with (U) denoting User is displayed on the right of the screen.
Forgotten Password
If you have forgotten your password, there is a forgotten password function which
will generate an email providing a temporary password . This function will only
be available on the logon screen when email has been setup and enabled in the
system . Email can be enabled at installation (see the IBM Tivoli Remote Control
Installation Guide for more details) or by editing the trc.properties file (see IBM
Tivoli Remote Control Server Administrators Guide).
Note: If email is enabled AND LDAP is enabled, the forgotten password function
will not be available.
To obtain a temporary password complete the following steps: At the Logon screen type in your ID.
Click the Forgotten password check box.
Click Logon.
The following message will be displayed - A new password has been sent to
your registered email address
5. The email will be sent to the email address that is defined for the User who is
trying to logon.
6. When the temporary password is retrieved from the email, logon with your ID
and the temporary password.
1.
2.
3.
4.
7. The Edit details screen will be displayed allowing you to change the password .
8. Type in and confirm your new password
9. Click Submit
Note: When email is enabled, the logon screen will also display a message and a
link to allow the User to contact the System Administrator.
browse for targets complete the following steps: Log on to the IBM Tivoli Remote Control Server with a valid ID and password.
On the IBM Tivoli Remote Control Server menu bar click Targets> Browse
Click on the selector button to display the list of target groups.
Select the required target group.
If you have permission to access the target members, the list of available targets
is displayed on the right. If not , no targets are displayed.
6. Select the required target by selecting the radio button next to the target then
clicking the selector button.
7. Click Submit
8. The target details are now displayed and if the target is selected a list of
available actions is displayed. These actions are explained in other sections of
this document
Note:
Chapter 3. IBM Tivoli Remote Control Server Web Interface
2) If IBM is entered into the search field then all targets whose
manufacturer is IBM will be displayed
3) If 2373 is entered into the search field then all targets with model no.
2373 and any targets that have 2373 as part of their serial no. , Computer
name or IP address will be displayed.
Note: The information entered is not case sensitive - for example Test will
also match on test
v If no matching targets are found , a message will be displayed and the target
list will be blank
10
Notes:
1. Clicking Reset on the Search screen will clear or change back to previous
values any changes made to the input screen
2. Clicking Cancel on the Search screen will return to the previously displayed
screen
3. Not entering anything into the field and clicking Submit will give the list of all
targets
11
v OR select Remove from favourites from the Action list on the left
6. The target(s) are now removed from the list
Note: You may have to click the Refresh link on the right to show the updated
list
12
13
In the IBM Tivoli Remote Control Server menu bar, click Targets > All
Targets
Select the required target
3. Now do one of the following steps
v Select Targets >View effective policies
v OR select View effective policies from the Action list on the left
4. The Show Effective Policies screen is displayed with the selected target shown
5. To select a user , click the selector button next to user
6. On the left, select the required group ( in this example select Default Group)
then on the right, select the required user
7. Click the - Select a User - selector button
8. The expanded Show Effective Policies screen is displayed showing Considered
Policies and scrolling down the screen you will see Resolved Policies.
Note: Clicking Cancel will return to the previously displayed screen
14
In the IBM Tivoli Remote Control Server menu bar, click Targets > All Targets
Select the target to connect to
Click Start session
The start session screen is displayed. This screen gives the details for the
selected target including the version of target software installed and the policies
and permissions that will be assigned for the session.
6. Click the relevant session mode button that corresponds to the session type that
you want to start.
7. When the Open or Save dialog is displayed, select open
8. The controller will start to run and the session will either be accepted of
refused.
If the session is accepted then the connection is established and the controller
window will be displayed showing the target screen. You will also see the
IPaddress of the target that you are connected to in the heading of the
controller window. This is helpful for keeping track of who you are connected
to if you have multiple sessions running at the one time.
If the session is refused a message will be displayed .
Session refusal can occur for a number of reasons
v The target user has clicked refuse on the acceptance dialog if user acceptance
was required for the session.
v The target user has not accepted the session within the given time,
determined by the acceptance grace time policy and if the acceptance timeout
policy was set to abort.
v The target is already in a remote control session, in which case a message
will be displayed showing who is connected to the target.
See the IBM Tivoli Remote Control Server Administrators Guide for details of
policies.
Notes:
1. If the Session mode buttons are not displayed on the Start Session screen and
an error message is displayed the following may be the reason for this.
v If the user or target are not a member of any groups
v If no permissions links were defined for any of the groups that the user and
target belong to.
v If the target is offline
v If none of the session mode policies have been set to Yes
Also see the IBM Tivoli Remote Control Server Administrators Guide for
details of groups , policies and permissions
15
v You have been notified of a problem on a target or targets which are not
members of any of the target groups that you have permission to access and you
need to establish a connection to be able to solve the problem.
v The permissions that you do have to allow you to access these target(s) have
now expired or do not allow you to do what it is you require for the session.
v You are not a registered user in the IBM Tivoli Remote Control Server. See
Making a request as a user not a registered in the IBM Tivoli Remote Control
Server. on page 17 for details of this procedure.
Log on to the IBM Tivoli Remote Control Server with a valid ID and password.
On the IBM Tivoli Remote Control Server menu bar click Targets >All targets.
Select one or more targets.
Now complete one of the following actions : v Select Targets > Request Access.
v OR select Request Access from the Actions list on the left.
16
End date
Select from the calendar or type the date, in the format yyyy-mm-dd,
on which you want the access to end.
End time
Type in a time, in the format hh:mm:ss , that you want the access to
end.
email address
Type in your email address. This address is used for sending a
response back to when the access request has been actioned by an
administrator.
Note: This value is mandatory.
7. Click Submit.
Your request will now be sent to an administrator who will decide whether to
allow you temporary access to the selected target(s). You will receive an email
notifying you of the outcome of the request. If your request has been granted you
will now have access to the selected target(s) within the specified dates and times.
If your request has been denied you will NOT be allowed access to the selected
target(s).
Request access at start of session: If you try to start a remote control session with
a target that you do not have permission to access, a request access option will be
available on the create new session screen if the trc.ticket.allow.access property has
been enabled. This property is set in the trc.properties file by an administrator. See
the IBM Tivoli Remote Control Server Administrators Guide for details of editing
the properties files.
Note: If the property has not been enabled, request access will not appear as an
option on the screen.
To request temporary access to a target from the Create new session screen
complete the following steps : v On the Create new session screen click Request Access
v Go to step 5 on page 16 above and complete the steps required to create the
request.
Your request will now be sent to an administrator who will decide whether to
allow you temporary access to the selected target(s). You will receive an email
notifying you of the outcome of the request. If your request has been granted you
will now have access to the selected target(s) within the specified dates and times.
If your request has been denied you will NOT be allowed access to the selected
target(s).
17
To request temporary access to one or more targets complete the following steps : 1. Type the following URL into your browser
http://servername/trc/requestAccessAnon.do
where servername is the address of your IBM Tivoli Remote Control Server
2. Go to step 5 on page 16 above and complete the steps required to create the
request.
Note: It is important to note here that you should give details of the targets
required in the Admin Notes field to allow the administrator who deals
with the request to determine which targets to select.
When you click Submit an email containing the request will be sent to the
administrator. When this request is actioned you will receive an email detailing the
outcome of the request. If the request has been granted there will be a link
available in the email that will take you to the Create new session screen from
where you will be able to start a session with the selected target(s) within the
specified date and times. If your request has been denied you will NOT be
allowed access to the selected target(s).
18
b. If the User logged on is an Admin User, the screen will also display the
User groups that are defined to allow the Admin User to select or deselect
required groups.
5. Click Submit
search for a session complete the following steps:Log on to the IBM Tivoli Remote Control Server with a valid ID and password.
In the IBM Tivoli Remote Control Server menu bar, click Sessions > Search
The Search Session screen is displayed .
4. The input field is used to enter information about the target that was taken
over in the session and will be used as the search criteria .
v To search for sessions, all or part of any of the following target information
can be used ,
manufacturer
model
serial number
computername
Note: The information entered is not case sensitive - for example Test will
also match on test
5. Click Submit
6.
19
v If any matching targets are found within the session information, the session
details for these will be displayed
v If no matching targets are found , a message will be displayed and the
sessions list will be blank
view session details for a specific session complete the following steps :Log on to the IBM Tivoli Remote Control Server with a valid ID and password.
In the IBM Tivoli Remote Control Server menu bar, click Sessions
Select either My Session History, All Session History or Search (follow steps
in search sessions to generate the report when selecting search)
4. Select one of the targets from the list
5. Now do one of the following steps
v Select Sessions > Session details
v OR select Session details from the action list on the left
6. The remote control session information screen is displayed giving details of the
controller system, the policies and permissions that were applied to the session
and , if the Force Session Audit policy was set to Yes, any audit entries that
were saved for the controller and target are also shown. If the Force Session
Recording policy was set to Yes there will also be a link to play back the
recording of the session. See the IBM Tivoli Remote Control Server
Administrators Guide for details of setting policies and permissions.
Note: Clicking Back from the Remote Control session information screen will
return the application to the previously displayed screen
Playing back a Recording
To Playback a recording complete the following steps : 1. On the Session Details screen click the Play the recording of this session link
2. The Session Recording Player window opens and the recording begins to play.
The following buttons and functions are available during the playback
Pause To pause the recording while playing
Stop
20
Reports Menu
The Reports Menu is used to create or run reports and the content of the menu is
dependant on the authority of the user who is logged on. This section describes
the functionality available to a user with user authority. A user with Super User or
Admin authority will have more functionality and this is explained in the IBM
Tivoli Remote Control Server Administrators Guide in the reports chapter.
The Reports menu for a user will show all Standard and Custom Reports that the
user has access to run.
Note: If you do not have access to any Custom Reports, the Reports menu will not
contain any items and therefore clicking it will have no effect
Options Menu
The options menu gives you a selection of actions that can be carried out on any
reports that are produced. There are various actions that can be performed from
this menu and this section details those options which are available to users, super
users and administrators. See the IBM Tivoli Remote Control Server
Administrators Guide for additional options which are available to super users
and admin users only. This section details the options that will allow you to set
your homepage , choose page display options or provide ways to format the data
for output to other applications.
Chapter 3. IBM Tivoli Remote Control Server Web Interface
21
Note: On screens which are not in a report format, for example search screens or
input screens, the Options menu will not be visible in the menu bar.
To work with the Options menu complete the following steps
1. Log on to the IBM Tivoli Remote Control Server with a valid ID and password.
2. In the IBM Tivoli Remote Control Server menu bar, click Options then select
from the following options: v Set Current Report as Homepage- see Setting your homepage
v Reset to Default Homepage Report - see Resetting your homepage
v Refresh Results - see Refreshing the data that is displayed on screen on
page 23
v Page Options - see Setting page display options on page 23
v Output - see Exporting data in various formats on page 23
22
Example1: The All targets report is defined as the default homepage and you had
selected the Favourites report as your homepage, if there are no default homepages
set for any of the groups that you belong to and you select Reset to Default
Homepage Report, if you logoff and logon you will see that the All targets report
is now the first page that you see.
Example2: You are a member of user group testtargets and a default homepage of
targets manufactured by companyX has been set for the group. If you select Reset
to Default Homepage Report then logoff and logon again, this time it will be the
targets manufactured by companyX that is the first page that you see.
23
24
Tools menu
Downloading utilities
The Downloads page provides the User with various items that can be
downloaded for use with IBM Tivoli Remote Control Server and includes the
following
v Launch the TRC Session Player
v Download the Session player
v Agent Downloads
Selecting Run will launch the Session Player. See Recording section for
more details of playing a local recording.
Save
25
Selecting Run will start the install shield wizard for installing the target
software. See the IBM Tivoli Remote Control Installation Guide for
details of installing the target software.
Note: If the target software is already installed on the system , an
upgrade prompt will be displayed , click Yes to continue to the
install shield wizard.
Save
26
Selecting Run will start the install shield wizard for installing the target
software.
a.
b.
c.
d.
e.
Selecting Run will start the install shield wizard for installing the
command line software.
a. Click Next at the install program welcome screen.
b. Accept the license agreement, click Next.
c. Accept or change the location for the installation files, click Next.
d. On the server address screen type in the required information then
click Next :-
27
Save
You should now have the following executable files located in the directory
defined in step 5c on page 27.
v wrc.exe
v wrcmdpcr.exe
See Chapter 21, Using remote control commands from the command line, on
page 85 for details of using these tools.
Downloading the Linux command line files:
1. Log on to the IBM Tivoli Remote Control Server with a valid ID and password.
2. Click Tools > Downloads
3. Click Agent Downloads
4. On the Agent Downloads screen select ibm-trc-cli-5.1.2.i386.rpm. The item with
description Linux CLI command set.
5. On the file download window select Save to save the rpm file to the required
location.
6. At a command prompt use the following command to install the command line
software
$ rpm -ivh ~/IBM/Tivoli_Remote_Control/RCTarget/ibm-trc-cli-5.1.2.i386.rpm
7. When the installation is complete edit the ibmtrc.conf file and set your
required configuration.
28
v Set the value of ServerURL to the hostname or IP address of your IBM Tivoli
Remote Control Server
v If you require FIPS compliancy set the value of FIPSCompliance to Yes.
8. Save the file.
Note: After you have installed the CLI command set on the target you must
uninstall this before installing the target software by running the following
command
$ rpm -e ibm-trc-cli
Accessing help
The Help menu allows you to find out the version of IBM Tivoli Remote Control
Server that you are using and gives you access to the online documentation by
using the following options :On-Line Documentation
This option will take you to the IBM Tivoli Remote Control information
center where you can view the latest documentation.
About Tivoli Remote Control
This option will display the version number of the currently installed
server software.
29
30
31
32
Monitor
Guidance
Active
Reboot
File Transfer
33
This is a feature which gathers information about the target system. See
Chapter 8, Retrieving Target System Information, on page 51 for more
details.
Open Chat Window
Opens the Tivoli Remote Control Chat Window to allow you to chat to the
target user during a remote control session. See Opening a chat window
during a remote control session on page 39 for more details.
Collaboration
Allows you to invite multiple participants into the remote control session .
See Chapter 10, Inviting multiple participants into a remote control
session., on page 55 for more details.
Controller Tools
Allows you to input text and capture the screen of the target machine. See
Chapter 11, Controller Tools, on page 59 for more details.
Record Session
Allows you to transfer the contents of the clipboard to or from the target.
See Chapter 14, Copying Clipboard Information, on page 67 for more
details.
34
Allows you to scroll the view of the targets desktop without having to use
the scroll bars. See Chapter 15, Enabling and Disabling Autoscroll, on
page 69 for more details.
Enable/Disable Scaled View
Allows you to re size the view of the remote desktop to fit within the
controller window. See Chapter 16, Enabling and Disabling Scaled View,
on page 71 for more details.
Enable/Disable TrueColour
Allows you to change the colour depth of the view of the remote machine
by toggling between 8 and 24 bit colour. SeeChapter 17, Enabling and
Disabling True Colour, on page 73 for more details.
Configure Controller
Allows you to remotely install peer to peer enabled target software. See
Pre requisites for remote target installation on page 75.
Help
Opens the IBM Tivoli Remote Control Help URL which provides help and
an About screen with details of the product. See Obtaining help on page
103 for more details.
35
36
37
4. The start session screen is displayed giving details of the selected target and the
policies and permissions that will be assigned for the session.
5. Click Active.
6. When the Open or Save dialog is displayed, select open.
7. The controller will start to run and when the connection is established the
controller window will be displayed showing the target screen.
Notes:
1. If an error message is displayed the following may be the reason for this.
v The user or target are not a member of any groups.
v No permissions links were defined for any of the groups that the user and
target belong to.
v The target is offline.
v None of the session mode policies have been set to Yes.
v The target may already be in another remote control session, in which case
you will also see the id of the user that is logged on to the target.
Also see the IBM Tivoli Remote Control Server Administrators Guide for
details of groups, policies and permissions
38
Note: You can also use a custom report for accessing the required target. See
the IBM Tivoli Remote Control Server Administrators Guide for details
of creating custom reports.
2. Select the target you want to connect to.
3. Click Start session.
4. The start session screen is displayed giving details of the selected target and the
policies and permissions that will be assigned for the session.
5. Click Chat.
6. When the Open or Save dialog is displayed, select open.
7. A chat session will be established. Type your message in the lower window
then click the Send button. This will send the message to the target and the
target user will see the message on their screen. The message will also be
displayed in the view area above the input window in your chat window.
Clicking Clear will remove any message sent, from your view only and the
chat history will still be visible on the target screen. .
. These options
There are also options to Copy Selected text and Paste
allow you to copy text from the chat area to be pasted to another location and
paste already selected and copied text into the chat area.
Copy selected text
1. Select the required text within the chat window.
2. Click Copy selected text. This text can now be pasted into another
location on the controller system. For example to be added to an email.
Paste
1. Select and copy ( using CTRL+C) text that is not in the chat window.
For example from a open document.
2. In the controller window click Paste. The text is now pasted into the
input field of the chat window.
3. Click Send to forward the text to the target user.
39
40
session mode is often used in training situations, and in workplaces of very high
sensitivity. For example financial institutions.
Note: When opening a guidance session with a Linux target the Clear instructions
function will not remove any drawings or instructions from the target
machine. Maximising a window on the target or performing something
which requires a repaint of the target screen may remove them.
41
Guidance Tool
Allows you to direct the target user by placing symbols on the screen
which tell them what and where to click . See Using the guidance tool
for more details.
Drawing Tool
Allows you to draw simple coloured lines on the target screen. For
example to circle something for them to note.
Highlight Tool
Allows you to highlight parts of the target screen.
Clear Instructions
Allows you to clear all guidance instructions from the targets screen.
By using the on-screen guidance symbols and the Opening a chat window during
a remote control session on page 39 capability you can guide the target user
through any task they may have to perform on the target machine.
42
The following table shows the relevant actions and their symbols.
Table 1. Mouse Action Symbols
Single Click
Left Hand
Single Click
Right Hand
Drag Stop
The mouse button that you click will determine which mouse button on the
guidance symbol will be shaded to indicate to the target user which button to
press. The following table gives examples of the symbols showing how each mouse
button action will look.
Table 2. Mouse action symbols
Left Hand button
Middle button
All symbols placed on the remote screen can be removed by using Clear
Instructions on page 44
43
Clear Instructions
The clear instructions function allows you to remove any guidance symbols, drawn
lines or highlighted areas that you have placed on the remote control session
screen.
To use clear instructions complete the following steps:1. Click Perform action in target > Clear Instructions
All guidance symbols will now be removed from the screen.
Note: When in a guidance session with a Linux target the Clear instructions
function will not remove any drawings or instructions from the target
machine. Maximising a window on the target or performing something
which requires a repaint of the target screen may remove them.
44
Copy one or more files from the target to the controller complete the following :
Files and directories can be deleted from both the controller and the target.
To Delete one or more files or directories complete the following : 1. Select the left pane to delete from the controller OR select the right pane to
delete from the target
2. Navigate to and select the required the required files or directories (hold the
Ctrl key and click the left mouse button to select multiple )
3. Click Delete
4. At the prompt click Yes to delete
New Directory
A new Directory can be created on the controller or target by completing the
following :1. Select the left pane for the controller OR select the right pane for the target
2. Navigate to the required the location for the new directory
3. Click New Directory
4. Type in a name for the directory and click OK
Refresh
Clicking the Refresh button will refresh the display of the selected pane and clear
any selections.
45
46
47
48
49
Enable Privacy
This action allows you to hide the target screen from the target user. The
target screen is blacked out with a message saying that the system is being
serviced by Tivoli Remote Control but you are still able to work with the
target system on your screen. This functionality is useful when working on
systems with sensitive information.
Registry Keys
This menu item will only be available if the Allow registry key lookup or
View registry key list policies are enabled for the session When you click
this menu item there may be two options available to you depending on
the policies that have been set for the session. See the IBM Tivoli Remote
Control Server Administrators Guide for details of editing policies. The
two options that can be available for selection are : A list of defined registry keys
You can click on one of the listed keys to see its current value on the
target. The keys are defined in the trc.properties file and the names that
are listed correspond to a specific registry key on the target. See the IBM
Tivoli Remote Control Server Administrators Guide for editing the
properties files.
For example:When you click Registry keys you may see Services listed,
if you click on Services a new window will open listing all of the
services on the target.
Entering a specific registry key
You can click on the Enter key item to allow you to enter a specific registry
key that you want to know the value for by completing the following steps
:v Type in a key value in the Registry key field
for example HKLM\SYSTEM\CurrentControlSet\Services\TRCTarget
Note: Please make sure you enter the exact path to the registry key.
v Click View
v This will open a new window showing the current values for the
specified key
Note: This is a dynamic menu which will change dependant upon which
operating system is being controlled and the connection mode. This option
might be disabled depending on the Operating system and policies in the
session.
50
51
52
2. The Tivoli Remote Control Chat Window opens on the controller system and
the chat area is opened in the target window.
3. Type your text in the text input box and click Send or press Enter.
4. Click Clear to remove any text which has been typed in the Tivoli Remote
Control Chat Window.
5. To close the chat window click the X in the top left hand of the window.
Note: The Clear button will only remove the text from the chat window on the
controller screen, and not the target.
53
54
5. The Collaboration Control Panel opens and you are now the master controller
for the session. Click Start.
55
You now have the ability to allow other participants to join this remote control
session. See Joining a collaboration session for details of requirements for
allowing others to join. When other participants have joined the session you can
use the functions within the Collaboration Control Panel to control the activity
within the session. SeeControlling session activity as the master controller for
more details. You can also accept or reject requests for control of the session from
the other participants. See Controlling session activity as a participant on page
57 for more details.
If the master controller clicks Yes the remote control session will be
established but you will have no control over the session. The master
controller will now see you listed in the participants list in the
Collaboration Control Panel.
Note: If the policy for Allowing chat in session and for allowing local
recording have been enabled for the session they will be
available for use. This would allow you to chat to the master
controller if required ( see Opening a chat window during a
remote control session on page 39 ) or to make a recording of
the session ( see Recording a session locally on page 62) .
No
If the master controller clicks No you will not be allowed to join the
session and you will receive a message that the target has refused the
session. Click OK.
When you join a collaboration session you can request control of the session by
using the collaboration icon in the toolbar. SeeControlling session activity as a
participant on page 57 for more details.
56
Give control
Allows you to select a participant to allow them to take control of the
session
1. Select a participant from the participants list.
2. Click Give control.
The selected participant now has control of the session and the target and
is able to use the tools and actions that are available in the controller
window toolbar. They can also change the session type by selecting from
those available in the session pulldown.
Note: The master controller will no longer have control of the session and
parts of their controller toolbar will be inactive.
Revoke control
When control has been granted to a participant you can take back control
of the session at any time. To take back control complete the following
steps :1. Select the participant from the list.
2. Click Revoke control.
Control now passes back to the master controller, whose controller toolbar
becomes available for use, and the selected participant no longer has
control.
Disconnect
You can disconnect selected participant(s) from the session at any time by
completing the following steps :1. Select the required participant(s).
2. Click Disconnect.
The selected participant(s) will receive a message that the session has been
cancelled and when they click OK the session is ended.
Disconnect all
You can disconnect all participants from the session at any time by clicking
Disconnect all. All participants will receive a message that the session has
been cancelled.
Participants limit
This value determines the maximum number of participants who are
allowed to join the session. The number is in the range of 1 to 10 and set
to 3 as default whenever a collaboration session is established. You can
change this value at any time during a session. When a controller tries to
join a session, if the limit has already been reached they will receive the
following message when they click Join. Session rejected because the
limit has been reached.
57
You can use the Request control option to ask the master controller for control of
the collaboration session. To request control complete the following steps :1. Click the Open the collaboration panel for multiple controllers in the
controller window toolbar. The Collaboration control panel will open.
2. Click Request control. The master controller will now receive the following
message with the option to accept of reject the request.
Do you want to accept the request from user XXXXX at aaa.aaa.aaa to get control
where XXXXX is the user id of the participant who is requesting control
and aaa.aaa.aaa is the IP address of the participants machine.
The outcome of the request will be dependant on the master controller and the
action that they choose.
Yes
If the master controller clicks Yes you will now have control of the
session.
No
If the master controller clicks No, you will receive the following
message and will not have control of the session. Click OK to continue.
Request for session control has been denied.
Returning control
After you have requested control of a collaboration session you can return the
control to the master controller by clicking Return control in the collaboration
control panel. The master controller now has control of the collaboration session
and you will no longer have control.
Note: If the collaboration control panel is not open, click the Open the
collaboration panel for multiple controllers in the controller window
toolbar.
Note: Clicking the Close dialog button will close the Collaboration control panel.
58
59
60
61
file extension
This can be .mov or .avi.
.mov
62
2. The Save session to file window opens. Save the recording to the default
location by clicking Save or browse to the required directory then click Save.
Note: You can accept the file name and extension given for the recording file or
you can change the name and extension to your own requirements.
3. The Record session icon in the menu will turn to a Blue Square icon indicating
that the recording is in progress. To stop the recording press the Blue Square
icon .
Note: Local recording can not be posted to the Server.
Pause To pause the recording while playing. When this button is clicked it
changes to the Play button.
Stop
Open file
v Browse to the required recording file.
v Select the required file then click Open for the recording to start playing.
Enable Auto Scrolling View
As the recording is playing, if the mouse pointer reaches the edge of the
player window, the viewing area will scroll in the relevant direction to
bring the non visible parts of the recording into view. The function works
in both the Vertical and Horizontal directions.
Enable Scaled View
This option will scale down the display of the recording to fit fully inside
the playback window
63
64
65
66
67
68
As the mouse pointer reaches the edge of the session window the non
visible area of the target desktop will scroll into view. This function works
in both the horizontal and vertical directions.
Note: Autoscroll is off by default
69
70
71
72
73
74
75
Windows Vista
Password protected sharing must be disabled. To disable password protected
sharing on Windows Vista systems, perform the following steps:
1. Click Control Panel > Networking and Internet >Sharing and Discovery.
2. Click the down arrow that is next to Password protected sharing.
3. Click Turn off password protected sharing.
4. Click Apply and exit the control panel.
The new User Account Control feature in Windows Vista requires users to perform
several steps before the remote install utility can communicate with Vista targets. If
you have a domain user account, ensure that the controller and the target machine
are both members of a Windows domain. You can select the File and Printer
Sharing box and the remote registry box in the Exceptions tab of the Windows
Firewall configuration to allow access if the firewall is enabled. If you are a
member of a local administrators group and you use a local user account, complete
the three steps below to be able to perform administrative tasks on the target
machine:
1. Enable the built-in Administrator account and use it to connect.
a. Open the Windows Control Panel.
b. Click Administrative Tools > Local Security Policy > Security Settings >
Local Policies > Security Options.
c. Double-click on Accounts: Administrator account status and select enable.
d.
2. Disable User Account Control if a different Administrator user account is to be
used to connect to the Vista target. To disable User Account Control complete
the following steps :a. Open the Windows Control Panel.
b. Click Administrative Tools > Local Security Policy > Security Settings >
Local Policies > Security Options.
c. Double-click User Account Control: Run all administrators in Admin
Approval Mode and select disable. Changing this setting requires a system
reboot.
3. Disable User Account Control when you administer a workstation with a local
user account (Security Account Manager user account). Otherwise, you will not
connect as a full administrator and will not be able to perform administrative
tasks. To disable User Account Control complete the following steps :a. Click Start, click Run, type regedit, and press ENTER.
b. Locate and then click the following registry subkey:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\
CurrentVersion\Policies\System
c. If the LocalAccountTokenFilterPolicy registry entry does not exist, follow
these steps:
1) On the Edit menu, point to New, and then click DWORD Value.
2) Type LocalAccountTokenFilterPolicy, and press ENTER.
d. Right-click LocalAccountTokenFilterPolicy, and click Modify.
e. In the Value data box, type 1. Click OK.
f. Restart your computer.
Alternatively, you can modify the registry entry manually by typing the
following command :
76
77
78
Chapter 18. Remotely installing the target software in a peer to peer session
79
80
Select this item to access the online IBM Tivoli Remote Control
documentation via your default browser.
About A window will open displaying the product name and version number.
Click the window or any key to return to the IBM Tivoli Remote
Control application.
81
82
83
84
Linux Edit the ibmtrc.conf file and update the value of the JavaHome
property.
v If logging needs to be enabled when running the wrcmdpcr command ensure
that the DebugTrace property is set to yes, in the target settings, to allow a text
file, cli_trace.txt, to be created in the same location as the target log files.
Note: The wrc and wrcmdpcr commands do not work if launching the remote
controller or the commands on machines where you need to establish the
connection through TRC gateways.
85
user:password
Type in here a valid userid and password that you would use to logon
to the IBM Tivoli Remote Control Server.
Action
The action defines which type of remote control session that you want
to establish.
v rc - Used in conjunction with option -S. Using this action will start a
remote control session whose type is determined by the value
assigned to option -S
v filexfer or filetransfer - Use either of these if you want to start a file
transfer session with the target.
v active - Used to start an active session with the target.
v reboot - Used to reboot the target.
v guidance - Used to start a guidance session with the target.
v monitor - Used to start a monitor session with the target.
v chat - Used to start a chat session with the target.
Rctarget
Specifies the computername or the IP address of the target that you
want to start a session with. It has the following syntax:
@Endpoint:<computername or ipaddress>
Rccontroller
If you want the controller to be run on a different machine you can
type in here the computername or IP address of the other machine. If
you do not specify a value for this parameter then the controller will be
launched from the machine that the command is being issued from.
The parameter has the following syntax:
@Endpoint:<computername or ipaddress>
The ability to launch the controller to start a session is subject to the
following conditions being met:
v The target software must be installed on the machine where you
want the controller to run.
v A Java Runtime Environment supported by TRC 5.1.2 is installed on
the controller machine.
86
v The machine that you are issuing the command from must be able to
establish a TCP connection (on the remote control port set at
installation) to the machine where you are launching the controller.
options
-S
Examples of usage
The examples listed here use target ipaddress 9.169.67.23, controller computername
testcontroller, userid newuser1 and password newuser100.
1. The command below activates a guidance session between the target and the
machine that the command is being issued from.
wrc newuser1:newuser100 guidance @Endpoint:9.169.67.23
2. Either of the commands below will activate an active session between the target
and the machine that the command is being issued from.
wrc newuser1:newuser100 rc @Endpoint:9.169.67.23 -S:A
wrc newuser1:newuser100 active
@Endpoint:9.169.67.23
3. Either of the commands below will activate a monitor session between the
target and controller testcontroller .
wrc newuser1:newuser100 rc @Endpoint:9.169.67.23 @Endpoint:testcontroller -S:M
wrc newuser1:newuser100 monitor @Endpoint:9.169.67.23 @Endpoint:testcontroller
user:password
Type in here a valid userid and password that you would use to logon
to the IBM Tivoli Remote Control Server.
Rctarget
Specifies the computername or the IP address of the target that you
want to start a session with. It has the following syntax:
@Endpoint:<computername or ipaddress>
command
Specifies a command that runs from a command prompt. For
Chapter 21. Using remote control commands from the command line
87
commands that are built into the operating systems shell and do not
have a binary executable file, for example dir or tree in windows and
cd or echo in Linux you must also add the command shell command.
Windows
You must type cmd /c before the command - see Examples of
usage
for example
cmd / c dir
Examples of usage
The examples listed here use target ipaddress 9.169.67.23, userid newuser1 and
password newuser100.
1. The command below displays a directory listing, of the temp directory, on the
machine that is issuing the command.
To display the contents of temp of a windows target
wrcmdcpr newuser1:newuser100 9.169.67.23 cmd /c dir \temp
To display the contents of temp of a linux target
wrcmdcpr newuser1:newuser100 9.169.67.23 ls /temp
2. The command below will copy a file from the test directory to the match
directory of a windows target
wrcmdcpr newuser1:newuser100 9.169.67.23 cmd /c copy c:\temp\1.csv c:\match
3. The command below will show the network statistics of a windows target
wrcmdcpr newuser1:newuser100 9.169.67.23 cmd /c netstat
88
Message
Reason
Error {0}
(RC_SERVER_CONN_ERROR):
Unable to connect to the Server
Error {0}
(RC_CREATE_SESSION_ERROR):
Unable to create RC session
Error {0}
(RC_LOCAL_LAUNCH_ERROR):
Unable to launch the Java Web Start controller
10
Error {0}
(RC_REMOTE_CONNECT_ERROR):
Unable to connect to the remote controller to
launch the session
16
Error {0}
(RC_REMOTE_LAUNCH_ERROR):
Unable to launch controller on the remote
machine
Message
Reason
Chapter 21. Using remote control commands from the command line
89
Message
Reason
10
16
17
Mapping of arguments, for the command line tools, from TRC 3.8.1 to
TRC 5.1.2
wrc argument mapping
The mapping between the TRC 3.8.1 wrc arguments and the TRC 5.1.2 wrc
command is detailed in the following table:
Table 5. Mapping between the TRC 3.8.1 and TRC 5.1.2 wrc command arguments
TRC 3.8.1
TRC 5.1.2
Comments
RemoteControlName
user[:password]
@Endpoint:<endpoint_label>
@Endpoint:<computername or IP address>
[@Endpoint:<endpoint_label>]
[@Endpoint:<computername or IP address>]
-B:(Y|N)
-C:(0|4|8)
-D:<WSTID>
-J:<Y|N>
90
Table 5. Mapping between the TRC 3.8.1 and TRC 5.1.2 wrc command arguments (continued)
TRC 3.8.1
TRC 5.1.2
Comments
-G:(0|5..|480|960)
-P:(Y|N)
-R: (50)
-T: (Y | N)
-Z: (Y | N)
-I: (0..)
-S: (A | M)
-S: (A | M) -S: (A | M)
Start-up state
A (Active)
If rc is specified as the Action, it gets
mapped to starting the session in
active mode
M (Monitor)
If rc is specified as the Action, it is
mapped to starting the session in
monitor mode.
-Y: (Y | N)
TRC 5.1.2
Comments
RemoteControlName
user[:password]
@Endpoint:<endpoint_label>
@Endpoint:<computername or IP address>
command
command
[argument list]
[argument list]
Chapter 21. Using remote control commands from the command line
91
92
2. At the Open Connection window type in the IP address of the target that you
want to start a session with. Select use proxy if you require to use a proxy,
select the required protocol and supply the information required.
Server Type in here the hostname or IP address of the proxy server
Port
93
b. A user acceptance dialog may be presented to the target user to allow them
to accept or reject the session, depending on the policies set on the target.
When the session is accepted, it will be established and the policies set locally on
the target will determine what actions can be carried out during the session.
94
95
96
97
98
99
100
101
Connection info
Selecting this action will display the computername, IP address list and
FIPS status of the target machine. Click OK to continue.
Report status to server
Selecting this action will cause the target to call home to the server to
report its status.
Who is connected
Selecting this action will display the user ID of the controller user and the
IP address and MAC address of the controller machine that has established
the remote control session. Click OK to continue.
Note: This option is only available during a remote control session.
Transfer folder
Selecting this action will allow you to view the contents of the directory
that has been defined as the file transfer directory. This will show all files
which have been transferred from the controller to the target.
Send file to controller
Selecting this action will allow you to select a file on the target machine
and transfer it to the controller machine. SeeChapter 13, Transferring
files, on page 65 for more details on transferring files.
Clear chat history
Selecting this option allows you to clear the chat history area of the target
interface. A window will open which will give you the option of accepting
to clear the chat area by clicking Yes or clicking No to leave the chat
history displayed.
Hidden Windows
Selecting this option allows you to re display any running applications on
the target which were hidden before the session was established. See
Chapter 27, Hiding applications, on page 107 for more details of hiding
running applications.
102
You can view a targets system info by clicking the Get system info icon
.This action generates a file called sysinfo.txt which contains information about the
target such as computername, vendor, model, IP address, running processes. The
file is displayed in notepad and can be sent to the controller via email to assist in
troubleshooting.
Obtaining help
The help menu
require.
provides you with three options for obtaining the help you
About This option will display the version number of the currently installed
target software.
Note: This is useful to note when reporting connectivity issues.
Online help
This option will take you to the IBM Tivoli Remote Control information
center where you can view the latest documentation.
103
104
105
the IBM Tivoli Remote Control Server Administrators Guide for details of
how policies are derived for a Remote Control session.
106
107
108
109
110
111
112
113
114
115
remote control session on that target or a service other than the TRC target is
listening on that port. The IP address of the target is substituted for the {0}.
Error initializing the local FIPS certified cryptographic provider. The session to
{0} cannot be established. :- This error message is used when FIPS compliancy has
not been setup on the controller correctly. The controller is not running on a FIPS
capable Java Runtime Environment. The IP address of the target is substituted for
the {0}.
The target does not support FIPS certified encryption. The session to {0} cannot
be established. :- This error message is used when FIPS compliancy is not
supported on the target. The session to {0} cannot be established. The IP address of
the target is substituted for the {0}.
Session rejected because of acceptance timeout :- This error message is used
when session has not been accepted by the target user in the time specified by the
acceptance grace time policy and the acceptance timeout action has been set to
abort.
The network connection to {0} timed out :- This error message is used when the
network connection attempt fails with a time out. Usually this occurs when the
connection is stopped by a firewall that is configured to not give any kind of
response to the connection attempts it rejects. The IP address of the target is
substituted for the {0}.
The network connection to {0} was refused :- This error message is used when the
network connection attempt fails because it was rejected. Usually this happens
when the host is not listening for connections on the port or a firewall is
intercepting the connection and is configured to explicitly reject the connections to
that port.
Note: this is not related to a TRC Session refusal, which happens once the basic
network connection has been established.
Unable to resolve the address for host {0} :- This error message is used when a
hostname is provided in the connection details and it cannot be resolved to an IP
address.
Failed to connect to {0} :- This error message is a generic connection failure
message, it is only displayed if the code cannot figure out why the connection
failed so it cannot display any more information than this generic failure message.
Unable to listen for incoming connections :- This error would be displayed if the
controller is not able to start listening for connections from other controllers in
collaboration mode.
116
117
118
Part 5. Appendixes
119
120
Appendix. Notices
This information was developed for products and services offered in the U.S.A.
IBM may not offer the products, services, or features discussed in this document in
other countries. Consult your local IBM representative for information on the
products and services currently available in your area. Any reference to an IBM
product, program, or service is not intended to state or imply that only that IBM
product, program, or service may be used. Any functionally equivalent product,
program, or service that does not infringe any IBM intellectual property right may
be used instead. However, it is the users responsibility to evaluate and verify the
operation of any non-IBM product, program, or service.
IBM may have patents or pending patent applications covering subject matter
described in this document. The furnishing of this document does not give you
any license to these patents. You can send license inquiries, in writing, to:
IBM Director of Licensing
IBM Corporation
500 Columbus Avenue
Thornwood, NY 10594
U.S.A
For license inquiries regarding double-byte (DBCS) information, contact the IBM
Intellectual Property Department in your country or send inquiries, in writing, to:
IBM World Trade Asia Corporation
Licensing
2-31 Roppongi 3-chome, Minato-ku
Tokyo 106, Japan
The following paragraph does not apply to the United Kingdom or any other
country where such provisions are inconsistent with local law:
INTERNATIONAL BUSINESS MACHINES CORPORATION PROVIDES THIS
PUBLICATION AS IS WITHOUT WARRANTY OF ANY KIND, EITHER
EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES OF NON-INFRINGEMENT, MERCHANTABILITY OR FITNESS
FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer of express or
implied warranties in certain transactions, therefore, this statement may not apply
to you.
This information could include technical inaccuracies or typographical errors.
Changes are periodically made to the information herein; these changes will be
incorporated in new editions of the publication. IBM may make improvements
and/or changes in the product(s) and/or the program(s) described in this
publication at any time without notice.
Any references in this information to non-IBM Web sites are provided for
convenience only and do not in any manner serve as an endorsement of those Web
sites. The materials at those Web sites are not part of the materials for this IBM
product and use of those Web sites is at your own risk.
IBM may use or distribute any of the information you supply in any way it
believes appropriate without incurring any obligation to you.
Copyright IBM Corp. 2009
121
Licensees of this program who wish to have information about it for the purpose
of enabling: (i) the exchange of information between independently created
programs and other programs (including this one) and (ii) the mutual use of the
information which has been exchanged, should contact:
IBM Corporation
2Z4A/101
11400 Burnet Road
Austin, TX 78758
USA
Such information may be available, subject to appropriate terms and conditions,
including in some cases, payment of a fee.
The licensed program described in this information and all licensed material
available for it are provided by IBM under terms of the IBM Customer Agreement,
IBM International Program License Agreement, or any equivalent agreement
between us.
Customers are responsible for ensuring their own compliance with various laws
such as the Graham-Leach-Bliley Act, the Sarbanes-Oxley Act, and the Health
Insurance Portability and Accountability Act. It is the customers sole responsibility
to obtain advice of competent legal counsel as to the identification and
interpretation of any relevant laws that may affect the customers business and any
actions the customer may need to take to comply with such laws. IBM does not
provide legal, accounting or auditing advice, or represent or warrant that its
products or services will ensure that customer is in compliance with any law.
Any performance data contained herein was determined in a controlled
environment. Therefore, the results obtained in other operating environments may
vary significantly. Some measurements may have been made on development-level
systems and there is no guarantee that these measurements will be the same on
generally available systems. Furthermore, some measurement may have been
estimated through extrapolation. Actual results may vary. Users of this document
should verify the applicable data for their specific environment.
Information concerning non-IBM products was obtained from the suppliers of
those products, their published announcements or other publicly available sources.
IBM has not tested those products and cannot confirm the accuracy of
performance, compatibility or any other claims related to non-IBM products.
Questions on the capabilities of non-IBM products should be addressed to the
suppliers of those products.
All statements regarding IBMs future direction or intent are subject to change or
withdrawal without notice, and represent goals and objectives only.
This information contains examples of data and reports used in daily business
operations. To illustrate them as completely as possible, the examples include the
names of individuals, companies, brands, and products. All of these names are
fictitious and any similarity to the names and addresses used by an actual business
enterprise is entirely coincidental.
If you are viewing this information softcopy, the photographs and color
illustrations may not appear.
122
Trademarks
The following terms are trademarks or registered trademarks of International
Business Machines Corporation in the United States, other countries, or both:
AIX
DB2
DB2 Universal Database
IBM
IBM logo
Lotus
SmartSuite
Tivoli
Tivoli logo
Microsoft, Windows, Windows NT, and the Windows logo are trademarks of
Microsoft Corporation in the United States, other countries, or both.
Intel, Intel Inside (logos), MMX and Pentium are trademarks of Intel
Corporation in the United States, other countries, or both.
Java and all Java-based trademarks and logos are trademarks or registered
trademarks of Sun Microsystems, Inc. in the United States and other countries.
Linux is a trademark of Linus Torvalds in the United States, other countries, or
both.
UNIX is a registered trademark of The Open Group in the United States and other
countries.
Other company, product, and service names may be trademarks or service marks
of others.
Appendix. Notices
123
124
Index
A
about TRC 81
access requests
creating 16
viewing 18
accessibility viii
active session
changing to 38
starting 37
Appendix A
Notices 121
Trademarks 122
applications
hiding 107
unhiding 107
auto scrolling
disabling 69
enabling 69
C
chat session
changing to 39
starting 38
clipboard menu
receiving text 67
sending text 67
collaboration session
controlling 56
disconnecting participants 56
ending 58
giving control 56
joining 56
limiting participants 56
requesting control 57
returning control 57
revoking control 56
starting 55
command line software
downloading
Linux 28
Windows 27
command line tools
using 85
wrc command 86
wrcmdpcr arguments mapping 91
wrcmdpcr command 87
controller
establishing sessions 37
help 81
remote target install 78
target
remotely installing in a peer to
peer session 75
controller actions
open chat window 39
controller interface 33
capture screen 60
clipboard menu 67
controller tools 59
Copyright IBM Corp. 2009
D
direct connection to a target
establishing 93
downloads
agent download 25
download trc player 25
launch trc player 25
drawing tool
using 43
E
entering text on the target screen 59
error messages
wrc command 88
wrcmdpcr command 89
exporting data 23
F
favourite targets list
creating 11
removing targets 11
viewing 11
file transfer directory
changing the location 66
file transfer menu
open file transfer directory 66
receiving a file 65
sending a file 65
files
changing the file transfer
directory 66
Open file transfer directory 66
receiving a file 65
sending a file 65
G
guidance session
changing to 41
clear instructions 44
drawing tool 43
guidance tool 42
highlight tool 43
starting 41
H
Help
server 29
Help Menu
server 29
highlight tool
using 43
homepage
resetting 22
setting 22
How does IBM Tivoli Remote Control
Work? 5
I
IBM Tivoli Remote Control Server Web
Interface
options menu 21
reports menu 21
sessions menu 19
targets menu 9
tools menu 25
Users Menu 18
IBM Tivoli Remote Control User Guide
TRC Server Web Interface 7
L
local input
disabling 45
enabling 45
local recording
making 62
playing 63
logging off 9
logging on
forgotten password 8
logging on to IBM TRC server
M
monitor session
changing to 40
starting 40
O
options menu
exporting data 23
output 23
refresh results 23
reset to default homepage report
22
125
22
P
password
forgotten password 8
peer to peer session
starting 93
Preface vii
Q
quick text input
enabling 59
R
recordings
launching the session player 25
registry keys
looking up values 49
viewing 49
remote control session
accepting 105
collaboration session 55
disconnecting 107
ending 83
inviting multiple participants 55
recording 61
refusing 105
starting 14
remote control sessions
active session 37
chat during a session 39
chat session 38
establishing 37
file transfer 44
guidance session 40
monitor session 40
reboot 45
types of 37
remote install
pre reqs
Linux 77
UNIX 77
Win XP 75
Windows Server 2008 75
Windows Vista 76
reports
custom
running 21
standard
running 21
S
scaled view
disabling 71
enabling 71
screen data
refreshing 23
session details
playing a recording 20
126
T
target
functionality 99
overview 97
remote install from controller
pre reqs 75
remotely installing in a peer to peer
session 75
target installation
remotely
pre reqs 75
target interface 101
actions 102
connection status 101
help 103
session type 101
show chat area 101
show file transfer area 102
view system information 103
target menu
add to favourites 11
target policies
viewing 13
target software
downloading
Linux 26
Windows 26
remotely installing
pre reqs 75
target status
viewing 13
targets
browsing for 9
capturing the screen 60
getting system information 51
rebooting 45
requesting temporary access
anonymous user 17
at start of session 17
request access 16
targets (continued)
searching 10
view access requests 18
viewing 10
targets menu 9
all targets 10
browse targets 9
recently accessed 12
remove from favourites 11
request access 15
search 10
session history 12
Start Session 14
target status 13
view effective policies 13
view favourites 11
temporary access to a target
requesting 15
tolls menu
downloads 25
transferring files 44
TRC Server Web Interface
accessing 7
logging off 9
logging on 7
troubleshooting 113
auditing 113
viewing current data 117
Troubleshooting Appendix
Error messages 115
true colour
disabling 73
enabling 73
U
user details
viewing 18
users groups
viewing 19
users menu
my details 18
my groups 19
Using IBM Tivoli Remote Control as a
controller user 33
Using remote control commands from the
command line 85
W
wrc command
arguments mapping 90
error messages 88
using 86
wrcmdpcr command
arguments mapping 91
error messages 89
using 87
Bibliography
v IBM Tivoli Remote Control Installation Guide (GI11-8173-01)
Explains how to install and configure the Tivoli Remote Control software.
v IBM Tivoli Remote Control Quick Start Guide (GI11-8182-01)
Provides a Quick Start procedure for the Tivoli Remote Control software.
v IBM Tivoli Remote Control Administrators Guide (SC23-6542-01)
Explains how to manage and configure the Tivoli Remote Control program.
127
128
Printed in USA
SC23-6541-01