RDM2022 2
RDM2022 2
RDM2022 2
2
2 Remote Desktop Manager
Table of Contents
Part I Overview 8
1 Remote Desktop
...................................................................................................................................
Manager 9
2 Security ................................................................................................................................... 10
3 System Requirements
................................................................................................................................... 12
Prerequisite
..........................................................................................................................................................
Software 14
4 The Devolutions
...................................................................................................................................
Platform 14
Remote ..........................................................................................................................................................
Desktop Manager Agent 16
Remote ..........................................................................................................................................................
Desktop Manager Jump 18
Style .......................................................................................................................................................... 88
Theme .......................................................................................................................................................... 91
2 Top Pane ................................................................................................................................... 92
Quick Access
..........................................................................................................................................................
Toolbar 93
3 Navigation Pane
................................................................................................................................... 94
Favorite..........................................................................................................................................................
Entries 97
Most Recently
..........................................................................................................................................................
Used Entries 100
Navigation
..........................................................................................................................................................
Pane Key Mapping 102
4 Content Area................................................................................................................................... 102
Embedded
..........................................................................................................................................................
Sessions 102
Dashboard
.......................................................................................................................................................... 105
5 Status Bar ................................................................................................................................... 106
Search/Filter
.......................................................................................................................................................... 107
Grab Input
.......................................................................................................................................................... 110
6 Tray Icon ................................................................................................................................... 110
3
4 Remote Desktop Manager
7 Manage Cache
................................................................................................................................... 234
8 User Vault ................................................................................................................................... 236
.........................................................................................................................................................
Dynamic Credential Linking 353
.........................................................................................................................................................
Entry Credentials Options 356
Edit .......................................................................................................................................................... 358
.........................................................................................................................................................
Play List 358
Create and .........................................................................................................................................
Edit a Play List 358
Play List Management
......................................................................................................................................... 366
Setting..........................................................................................................................................................
Overrides 367
.........................................................................................................................................................
Specific Settings 367
Batch .......................................................................................................................................................... 370
.........................................................................................................................................................
Batch Edit 370
6 View ................................................................................................................................... 374
Panels .......................................................................................................................................................... 378
......................................................................................................................................................... 379
Vaults
.........................................................................................................................................................
Opened Sessions 380
PAM.........................................................................................................................................................
Dashboard 384
.........................................................................................................................................................
Task List 386
......................................................................................................................................................... 389
Search
Multi Vault.........................................................................................................................................
Search 391
Advanced.........................................................................................................................................
Search 395
Documentation .........................................................................................................................................
Search 398
View .......................................................................................................................................................... 400
.........................................................................................................................................................
Quick Connect 404
.........................................................................................................................................................
Activity Logs 406
Logs .......................................................................................................................................................... 409
Layout .......................................................................................................................................................... 411
.........................................................................................................................................................
Grouped Tab Bar 412
......................................................................................................................................................... 415
Attachments
......................................................................................................................................................... 417
Logs
......................................................................................................................................................... 419
Task
7 Administration
................................................................................................................................... 421
Management
.......................................................................................................................................................... 425
.........................................................................................................................................................
User Management 425
User Types ......................................................................................................................................... 434
Integrated.........................................................................................................................................
Security 436
.........................................................................................................................................................
User Groups Management 437
.........................................................................................................................................................
Vaults Overview 439
.........................................................................................................................................................
Licenses 451
Assign Licenses......................................................................................................................................... 453
Reports.......................................................................................................................................................... 455
......................................................................................................................................................... 455
Reports
Export Reports ......................................................................................................................................... 457
.........................................................................................................................................................
Deleted Entries 460
Settings
.......................................................................................................................................................... 462
.........................................................................................................................................................
Vault Settings 462
Default security
.........................................................................................................................................
for entries 462
.........................................................................................................................................................
System Settings 463
General ......................................................................................................................................... 463
Security ................................................................................................................................... 466
Allow Password ...................................................................................................................................
Access From External System 468
Application ......................................................................................................................................... 471
Offline ................................................................................................................................... 474
Type availability
................................................................................................................................... 475
Version Management
................................................................................................................................... 476
5
6 Remote Desktop Manager
.........................................................................................................................................................
System Permissions 477
.........................................................................................................................................................
Security Providers 483
Clean up
.......................................................................................................................................................... 490
.........................................................................................................................................................
Clean Up Deleted History 490
.........................................................................................................................................................
Clean Up Entry History 492
.........................................................................................................................................................
Clean Up Activity Logs 494
.........................................................................................................................................................
Pack Data Source (Optimize) 495
Import/Export
.......................................................................................................................................................... 496
.........................................................................................................................................................
Import Multiple Vaults 496
.........................................................................................................................................................
Export All Vaults 497
8 Tools ................................................................................................................................... 497
Generators
.......................................................................................................................................................... 499
.........................................................................................................................................................
Password Generator 499
.........................................................................................................................................................
SSH Key Generator 507
.........................................................................................................................................................
Certificate Generator 509
.........................................................................................................................................................
Port Generator 513
Tools .......................................................................................................................................................... 514
.........................................................................................................................................................
Devolutions Localizer 514
.........................................................................................................................................................
Entry Security Analyzer 517
.........................................................................................................................................................
Key Agent Manager 520
.........................................................................................................................................................
PowerShell (RDM CmdLet) 526
.........................................................................................................................................................
More Tools 527
Chocolatey
.........................................................................................................................................
Console 527
Local RDP/RemoteApp
.........................................................................................................................................
Manager 530
Playback (Ansi)
......................................................................................................................................... 536
RDM Agent......................................................................................................................................... 539
9 Help ................................................................................................................................... 548
Support
.......................................................................................................................................................... 550
.........................................................................................................................................................
Application Log 550
.........................................................................................................................................................
Diagnostic 553
.........................................................................................................................................................
Profiler 557
.........................................................................................................................................................
Record 560
Keyboard
..........................................................................................................................................................
Shortcuts 598
7
Overview
Part
I
Overview 9
1 Overview
1.1 Remote Desktop Manager
DESCRIPTION
Windows
macOS
Linux
iOS
(Free App)
Android
(Free App)
1.2 Security
DESCRIPTION
All passwords stored in the data sources are encrypted using a strong encryption
algorithm, to the extent that if a user attempts to access the data directly in the
database, it will be considered unreadable.
If you choose to store passwords locally, Remote Desktop Manager will use the same
mechanism used by mstsc.exe (Remote Desktop Manager client), which stores the
passwords in the Windows Credential Manager. It must be noted that the password will
not be able to be viewed due to being encrypted by Windows. For obvious reasons,
this choice also means that credentials stored in this fashion are not shared.
TIPS
· Use an Advanced Data Source and grant user access by assigning permissions.
· Use the Security Provider to encrypt entries completely instead of just the
password.
· If using the offline mode, add your own password for an additional layer of
protection to the local cache. Go to File - Options - Security.
· If your data source supports it, choose not to save password in the data source,
which will prompt for the credentials on the first connection.
DESCRIPTION
MINIMUM REQUIREMENTS
Windows Desktop:
· Windows 11
· Version 21H2
· Windows 10
· 8.1
· 7 SP1
Windows Server:
· Windows Server
· Version 20H2
· 2016
· Version 1607
· 2012 R2
· 2012
4GB RAM
Remote Desktop Manager can be installed on Remote Desktop Services and thin
client.
MANUAL/PORTABLE DEPLOYMENT
Deploying manually using our zip file is documented as being a Portable (USB)
deployment. In this case, the prerequisites will need to be handled manually as well.
Please consult Prerequisite Software for details.
DESCRIPTION
SETTINGS
The following package must be installed prior to proceeding with the Remote Desktop
Manager installation:
DESCRIPTION
Our platform offers multiple products to help managing all of the aspects of an IT
infrastructure.
DESCRIPTION
The Remote Desktop Manager Agent can run commands on remote hosts, but what is
really useful is that it can send commands to multiple hosts at the same time. Since
Remote Desktop Manager uses a secure RDP channel to communicate with the
Remote Desktop Manager Agent, it can only operate against Windows-based hosts.
RDM Agent
SCENARIOS
The Remote Desktop Manager Agent can be used to run scripts from another Remote
Desktop Manager installation. Since it uses an RDP channel for communication, it
saves you from remote management headaches such as opening various ports in your
firewall. This requires the lightweight installation model of just the agent package
(Methods 2-4 below).
It is also used by Remote Desktop Manager Jump for supporting many technologies.
However, it does require a full Remote Desktop Manager installation on the remote
host for those features.
INSTALLATION
1. Install Remote Desktop Manager and select Tools – More Tools – RDM Agent. It will
launch and auto-register the Agent to automatically start with Windows.
Many new users using this technology wonder why a full installation of Remote Desktop
Manager is required. There are three factors that make this a good solution:
· Remote Desktop Manager on the remote host does not require a data source, it’s an
empty shell.
DESCRIPTION
Remote Desktop Manager Jump connects to a remote host, often called a Jump Box,
Service Host, or a Bastion Server, which in turn connects to other hosts. Remote
Desktop Manager Jump is actually an RDP in an RDP.
This can be compared to RD Gateway from Microsoft and to some extent SSH port
forwarding.
The Remote Desktop Manager Jump feature does not allow you to
circumvent the need to properly license your remote host to allow
more than two RDP connection at a time. There is no other way
except for installing remote desktop session host role on the server
and purchasing RDS CAL (per user) for the remote connection. For
more information please consult this Microsoft link: Activate the
Remote Desktop Services license server.
Both instances of Remote Desktop Manager Jump or Remote Desktop Manager and
RDM Agent running on the Jump Host communicate through an RDP channel.
Commands are sent securely over the RDP channel and are then executed on the
Service Host. Commands include running a script or opening a remote session of any
type. It can even launch a VPN client on the Service Host prior to running the remote
session.
· Usage Scenarios
· Pro Tips
USAGE SCENARIOS
This allows you to have a strict firewall policy that allows connections only from a
specific IP address. This configuration only grants you access to hosts that are
accessible from the Jump Box. Let's imagine you have the following infrastructure:
You need to access the remote hosts, but you want to limit risks and expose only the
Jump Host to the internet traffic. This allows you to create strict firewall rules and to
open only a single port. Therefore, it forces you to connect to the Jump Host before
hopping to a remote host.
Remote Desktop Manager Jump helps achieve that goal simply and efficiently.
These limitations make it impossible to use multiple VPN clients concurrently on the
same workstation. In this case, you can have multiple virtual machines, each running a
single VPN client. Using these virtual machines as jump boxes allows you to connect to
the virtual machine, launch the VPN client, then launch the remote session.
For Jumps to work, you need to supply the credentials via the Jump
Host session. If the RDP sessions prompt you for the credentials after
the start, the Jump will fail.
4. Click OK.
The Jump Host acts as a relay between the local and the remote
systems, allowing to use the Remote Desktop Manager license that
has been used on the local workstation to register the application on
the Jump Host.
7. Confirm Remote Desktop Manager Agent is started and set to Auto Start.
Auto Start must only be activated for the Remote Desktop Manager
Agent or Remote Desktop Manager but not for both. In the case
where Remote Desktop Manager is set to Auto Start please make
sure to delete the shortcuts form either/both the following locations:
· Run: shell:startup
c. Click OK.
d. Click Yes.
9. Adjust the user interface of the Jump Host to maximize the area to display remote
sessions.
o To show the Ribbon again, click the Remote Desktop Manager icon at the top
left corner.
2. Set the Jump Host by clicking on the RDM Jump settings button.
Or
3. Click OK twice.
4. Launch the RDP session. The Remote Desktop Manager Jump opens automatically
and it looks like a session in a session.
All should be working correctly. If any of the steps fails, it is where you need to
investigate.
PRO TIPS
· To gain more space for the dashboard, in the View tab, hide the Ribbon and
Navigation Pane since the menus are not needed.
· Use the same Remote Desktop Manager license on the local and the remote
instances. The Jump Host acts as a relay between the local and the remote
systems, allowing to use the Remote Desktop Manager license that has been used
on the local workstation to register the application on the Jump Host.
· There is no need to create a data source on the Jump Host. Remote Desktop
Manager will open for the first time with a default SQLite Local Data Source. This
is sufficient because the application on the Jump Host only acts as an intermediate
between the local and the remote hosts.
Part
II
28 Remote Desktop Manager
2 Getting Started
2.1 Using Remote Desktop Manager
DESCRIPTION
Remote Desktop Manager is highly flexible and can work for both individuals and
teams. Please follow the checklist that applies to your environment:
· Checklist for Individuals: For individuals but also for teams of three users or less
that do not want to implement security.
· Checklist for Teams: For a team environment that wishes to implement security.
DESCRIPTION
Here's a checklist to help you get started with Remote Desktop Manager for
individuals.
CHECKLIST DESCRIPTION
FOR
INDIVIDUALS
(ENTERPRISE
EDITION)
Step 1 - Register
your license: Remote Desktop Manager Enterprise Edition grants you
a 30-day trial. If you decide not to register by the end of
· Enterprise the trial, your data will not be altered or erased, and you
Registration will have full access to it once you provide a license key.
CHECKLIST DESCRIPTION
FOR
INDIVIDUALS
(ENTERPRISE
EDITION)
Step 5 - Create Top level folders are at the foundation of a solid security
your folder structure. Your folder structure (folder entries) should
structure. represent your company structure.
CHECKLIST DESCRIPTION
FOR
INDIVIDUALS
(ENTERPRISE
EDITION)
DESCRIPTION
This topic is primarily intended for individuals, but also for teams of three (3) users or
less who do not wish to set up security.
To help you select a data source, here is a set of concerns and the list of data sources
that can serve in such context. If you have multiple concerns, simply create the
intersection of all sets to isolate a list of choices.
SHARED
BETWE
DATA SELF- CLOUD- EN WORKS MULTI-
LOCAL
SOURCE HOSTED BASED YOUR OFFLINE USER
COMPU
TERS
Devolutions X
Password Hub
Personal
SQLite X X
XML X X
Devolutions X X X
Online Drive
Dropbox X X Note 1
NOTES
NOTE 1
There is no protection against data contention issues. The data source is designed for
one user to access the data from multiple computers. It is therefore impossible for
several users to use the data simultaneously.
NOTE 2
The master XML is maintained by a single user and synchronized by Remote Desktop
Manager to a web site that is hosted as per your requirements. Accessing the data
through a URL ensures it is read-only for other users.
DESCRIPTION
Here's a checklist to help you get started with Remote Desktop Manager when working
in a team environment.
CHECKLIST DESCRIPTION
FOR TEAMS
Step 1 - Register
your license:
Remote Desktop Manager Enterprise Edition grants you
· Enterprise a 30-day trial. If you decide not to register by the end of
Registration the trial, your data will not be altered or erased, and you
will have full access to it once you provide a license key.
· Trial
Registration
Step 4 - Create Top level folders are at the foundation of a solid security
your folder structure. Your folder structure (folder entries) should
CHECKLIST DESCRIPTION
FOR TEAMS
DESCRIPTION
This topic is for teams that use the functionality offered by our Enterprise Edition.
To help you select a data source, here is a set of concerns and the list of data sources
that can serve in such context.
AD group membership X
used to assign
permissions
Activity Logs X X X
NOTES
NOTE 1
Administrators can create accounts for end users without divulging the passwords. A
locked data source definition is imported for each end user. This requires a lot of
manual operations by the administrator.
NOTE 2
Our SQL Server data source offers a third authentication option, namely the Custom
(Devolutions) user type. It allows for the user to be impersonated and therefore not be
made aware of the credentials used to connect to the database. Please consult User
Management for details.
NOTE 3
You should not expose a Devolutions Server instance to the Internet without being able
to protect it from DDoS attacks. Strong passwords must be used as well as obscure
account names that are not easily inferred using social data mining.
NOTE 4
You can indeed expose a database to the Internet, but you must use SSL/TLS to
encrypt traffic and also protect against DDoS attacks. Cloud services like Azure have
that concern in the forefront. The default settings of the firewall should be to block
everything and then add exceptions and rules. It is also necessary to open the minimum
number of required ports, add the numbers of these ports to the exception list and filter
all future requests based on their origin.
DESCRIPTION
You must create a team folder on a server drive to store your default settings templates
in order to share them with your team.
SETTINGS
1. Start by accessing your server drive (such as \\servercommon) and create a new
team folder to hold all your team default settings templates.
2. Go to File - Options - Path and enter the path of your newly created folder stored
on your server drive. All your default templates will then automatically be saved in that
folder.
3. If you have remote workers, ensure they have access to the shared server in offline
mode. Map your network drive and then follow the instructions here for the offline mode
access when using Windows 11/10.
DESCRIPTION
Depending on your organization's security policies, there are multiple ways of handling
credentials. We can manage a wide range of scenarios; the most popular are listed
below. It is critical to understand that these are the credentials used to connect to
remote hosts, not the ones you use to launch Remote Desktop Manager.
Below are a few key points that the admin of the solution must be aware of:
Credentials Our folders can have defined credentials. This is useful because,
set on folders in most cases, the same credentials are reused for an entire
branch of the network infrastructure. To use credentials defined
in a folder, child sessions must be adjusted to use inherited
credentials.
Entry When storing entries in the tree view, users with the View
location permissions on that entry (or folder by inheritance) will be able to
use them. This is how you would share credentials with other
members of your team. A User Vault exists for users to store
personal information that should be seen by no one else.
Credentials stored in this manner can still be accessed in the
public area of the system by referencing them or through the
User Specific Settings feature described below.
User Specific User Specific Settings are partial overrides for your entry
Settings settings, including credentials. When you apply such an override,
Here are the most common scenarios and ways to resolve them. In the majority of
cases, we prefer sessions to use inherited credentials, which means they climb the
tree until they have access to a set of credentials, whether defined, linked, or
overridden in an entry.
SCENARIO STRATEGY
One set of credentials is used by Set the credentials on the Vault Settings. All
all of the staff, be it for the whole children use inherited credentials.
system or for a branch in your tree
view (customer, department, etc.).
Each user has their own Make use of the User Specific Settings on
credentials for many different each branch. All children use inherited
branches (often corresponding to credentials.
customers/departments, etc.).
Each user has its own credentials This solution involves a little more work. The
managed by an administrator. administrator must create a folder for each
user, then grant permissions only to that
user. The user will then use User Specific
Settings to specify that the credentials
stored in that folder are used to override
what is defined in the entries.
Each team uses the same As above, but all team members have
credentials. access to the folder. They all have to use the
User Specific Settings.
Part
III
Installation 41
3 Installation
3.1 Client
DESCRIPTION
INSTALLATION
Depending on the downloaded media, either run the setup, or extract the files from the
archive in any folder and launch the executable. If you wish to use a portable device, or
run multiple independent copies of the application, please consult Portable (USB).
LICENSE
Remote Desktop Manager Enterprise Edition comes with a 30 day-trial. If you possess
a purchased license of the Enterprise Edition, please follow the instructions at Register
Enterprise Edition. To register the Free Edition, please refer to the Register Free
Edition.
DATA SOURCE
By default, a local data source is created using the SQLite format. You can add as
many data sources as needed. Please consult Data Source Overview for more
information.
EXTERNAL APPLICATIONS
Configure your installation path for all external applications you intend to utilize such as
RealVNC, Putty, Filezilla, etc. Set the paths in File – Options – Path.
DESCRIPTION
Remote Desktop Manager generates ancillary files on your workstation. The table
below lists out an example of ancillary files and their locations.
As described in Configuration File Location, the default path for most of these files are
customizable. For this reason, we use the [CONFIG] token in this documentation to
denote when a file is stored in a configuration folder that can be relocated, or the
[PROFILE] token to indicate that they are stored in the local profile. By default, these
point to the same exact folder. The only method to separate them is by using a
customized configuration.
Since you can also deploy on a portable device, sometimes known as using the
XCOPY deployment model, we will use the [INSTALLDIR] token to indicate that the
file is in the same location as Remote Desktop Manager.
The Override Source column indicates if an available mechanism can relocate the
files of that category elsewhere.
SUMMARY
Offline and local play list options can be accessed by navigating to File - Options -
Advanced.
Options - Advanced
DEFAULT LOCATION
Options - Advanced
There are two ways to change the folder where the configuration file is stored:
EXAMPLES
DESCRIPTION
The Custom Installer Service, offered through our Devolutions Customer Portal
services, replicates the configuration from a Remote Desktop Manager instance. This
configuration is used to create an installer file (*.rdi), which will be used to create the
installation package intended for distribution. The configuration can contain the license
serial, data sources, credentials, database templates and more. It is best practice to
have a Remote Desktop Manager installation used specifically to create the installation
package.
The Custom Installer Service can be found in with the Devolutions Account tools,
located in File - Devolutions Account - Tools. You must be signed in to access it.
The following topics will help you get started to set up your customized installers with
Remote Desktop Manager.
DESCRIPTION
When creating an installation package with the Custom Installer Manager, an installer
file is necessary to determine what to include in the installation configuration. It is risky
to create an installer file for each new version since you have to repeat the process
manually every time. Instead, it is possible to create the configuration once, save the
resulting file (*.rdi), and reuse it as many times as needed.
2. Select which data sources to include. You can also include the name and serial key
for the registration.
This file can be used in the Custom Installer Manager when creating an installation
package.
For more information on how to create a custom installer package, please consult our
Custom Installer Manager topic.
DESCRIPTION
When generating the installer file, you must decide what to include in the configuration.
This process will replicate the configuration of the Remote Desktop Manager instance
currently used, and will generate an installer file (*.rdi). Once it has been generated, the
installer file can be used as many times as needed to create custom installers. For
security reasons, some settings that may contain credentials, such as Saved
Templates, are disabled by default. Enable these at your own risk.
SETTINGS
You can open the Installer File Generator from File - Devolutions Account -
Installer File Generator.
REGISTRATION INFORMATION
OPTION DESCRIPTION
MISCELLANEOUS
OPTION DESCRIPTION
OPTION DESCRIPTION
Include data Includes the credentials for all selected data sources below.
source Please, consult security warning above.
credentials
Force always Will allow the administrator to force the users to use this new
retrieve new configuration file.
registration
DATA SOURCES
Select the data sources that must be included in the configuration. In the description
column, you will see details about each data sources. You should ONLY share data
sources that are either using Integrated Security, or that are using an environment
variable for the username. Passwords for accessing a data source should NEVER be
shared.
DESCRIPTION
2. Click on Custom Installer Manager to create a new custom installer with specific
settings.
4. Select the application version, enter a name for your package and click on Create.
You can either create a new configuration or use an existing Remote Desktop
Manager Installer (*.rdi) file. For more information, please consult our Installer File
Generator topic.
When choosing to create a new configuration, select what to include in the custom
installer, then click on Generate.
5. Once the installation package has been created, the request is submitted to our
online service. A confirmation dialog window appears if successful.
6. The Custom Installer Manager will display an hourglass icon indicating that the
package is being processed. When the package has been successfully generated,
the Custom Installer Manager will display a green check mark . Note that this
process can take a while.
From here, there are two ways of downloading the package. You can download it
directly from the Custom Installer Manager, or you can log in to the Devolutions
Account you created the installer with.
From the Devolutions Customer Portal you created the custom installer with,
navigate to the Custom Installer section. Click on .msi to download the custom
installer on your computer.
DESCRIPTION
Remote Desktop Manager's current installation package does require to install with
elevated privileges, as well as making the application available to all users of the
computer where you are installing. That being said, feedback has shown that it does
complete successfully across a wide spectrum of our community's environments.
Follow this procedure to reduce deployment issues in the future.
PROCEDURE
1. Copy the installer to a folder available for all users of the workstation. e.g. c:\Deploy.
2. Open an Elevated Command prompt (right click on the shortcut and select Run as
administrator).
3. Run the following command, adapted for the version that you are installing
msiexec /i Setup.{APPNAME}.{VERSION}.msi /Quiet /Passive INSTALLMODE=Complete
If you wish to proceed with upgrades from within Remote Desktop Manager, it must
have been started using Run as administrator.
NOTES
The Microsoft installer technology copies the installer package under a new
randomized name as well as register it in a database. Our experience shows that this
copy has a way of disappearing and that the database becomes corrupted. We often
have to direct our community to use https://support.microsoft.com/en-
us/mats/program_install_and_uninstall
The Quiet and Passive parameters are just to ensure that you do not have to make a
choice during the installation. We found that this reduces the risk of errors.
DESCRIPTION
Remote Desktop Manager can be used as a portable application. Here are the steps
required to ensure that it runs correctly:
PROCEDURE
3.3. A tools folder (optional, only if you intend to use external tools like Filezilla).
5. Create a text file named override.cfg in the installation folder. Set the content of the
file to .\config
6. Open Remote Desktop Manager and display the data sources window using File -
Data sources.
7. Create a new data source of a type that can be stored on your portable device. i.e.
SQLite, XML, etc.
8. Configure the data source using a relative path so it is stored on the portable
device: .\Data\Connections.db
9. Configure your portable applications (FileZilla, UltraVNC, etc.) in the same manner
(relative to the installation folder). Click on Configure Installation Path to select
your preferred portable application.
10.You can now delete the pre-existing Local data source that had been created
automatically.
3.1.6 Registration
DESCRIPTION
Please refer to the Enterprise Edition section to properly register your version. If you
decide not to register at the end of the 30-day trial, your data will not be altered or
erased and you will have full access to it once you provide a valid license serial.
REQUEST A TRIAL
Remote Desktop Manager Free Edition is similar to the Enterprise edition. It must be
registered following the 30-day trial period to ensure continued use. Registration is free.
Please refer to the Free Edition section to properly register your version.
DESCRIPTION
When the license serial is stored in an Advanced Data Source, there is no need to
register Remote Desktop Manager as the license serial is retrieved directly from it.
When launching the application for the first time, simply add the data source containing
the serial.
4. Optional: Check the Auto assign new users, to automatically provide the RDM
serial to all newly created users.
6. Click Assign All or select in the Assigned column who should have an RDM serial
access.
This step will automatically assign the license to the selected users,
removing the need to interact with each user.
DESCRIPTION
Some of our Remote Desktop Manager Enterprise users could wonder, what will
happen when my license expires. Here is a breakdown depending on your purchase
model.
PERPETUAL
When you purchase a perpetual license, you always receive 1 or a 3 year maintenance
with it. After that period, Remote Desktop Manager will continue to work indefinitely
with the latest version available at the moment of the maintenance expiration.
If you discover a bug, a security issue or you want to have access to newest features
and that you would like to upgrade, you would need to purchase a maintenance plan
for your perpetual license.
SUBSCRIPTION
You need to renew your subscription agreement upon expiry. If you don’t renew your
subscription, access to your data will be limited.
DESCRIPTION
Remote Desktop Manager Free Edition requires a free registration after 30 days to be
able to continue the use of the application.
The Register the Application window will display at each Remote Desktop Manager
launch until you have registered the product license. It shows the number of remaining
days and your registration choice.
Every owner of a Devolutions Account is assigned a free license serial for Remote
Desktop Manager in their Customer Portal.
To get a Devolutions Account, click on Create a Free Account in the register window.
2. Click Ok.
In the event that you need to register the application without an internet connection, the
information must be entered manually. You will need the license serial from your
Customer Portal.
Copy the license serial for the Free Remote Desktop Manager Edition.
Paste the license serial, enter an email address and press Ok.
Register Manually
DESCRIPTION
When launching Remote Desktop Manager for the first time, the application registration
window is displayed. If you are not ready to buy Remote Desktop Manager, you must
request a trial to use the application. The trial is valid for 30 day, after which the
application cannot be used unless a valid Remote Desktop Manager Enterprise Edition
license serial is provided.
STEPS
1. Request from our website your Free 30 day trial or click in the Register the
Application window the Request Trial link.
2. Paste the trial license serial that you will receive in a confirmation email from
Devolutions.
3. Click OK.
DESCRIPTION
Remote Desktop Manager has an excellent support for running under a Remote
Desktop Services environment. A master configuration file can be created to distribute
settings for all new users of the system or even to update existing user's configuration.
https://docs.microsoft.com/en-us/windows-
server/administration/performance-
tuning/role/remote-desktop/session-hosts
PROCEDURE
1. Install by following the procedure For All Users. This ensures that the Microsoft
Installer Database does contain all of the needed information for all user profiles of
the host.
b. To limit the memory consumption of RDP entries, please see Memory Tuning of
RDP Sessions.
4. When Remote Desktop Manager is configured to your liking, use File – Options –
Export Options. This will allow you to choose exactly the data sources to include,
as well as the various categories of settings. Please refer to Export Options for
further details. Save the file with the name default.cfg.
5. Move the default.cfg file in the installation folder of Remote Desktop Manager, if
you have used the default installation settings, it is under the %appdata%
\Devolutions\RemoteDesktopManager directory.
WORKFLOW
NEW USERS
Whenever a new user creates a profile on the system, Remote Desktop Manager
detects the presence of the default.cfg file and uses it as a template to create the
user's configuration file.
EXISTING USERS
Whenever Remote Desktop Manager is started and it detects a new default.cfg file, the
following dialog will appear:
By selecting Use New Configuration (Lose Mine), the user's configuration is simply
overwritten. If you only wish to update the Remote Desktop Manager license key after
a renewal, choose Retrieve New Registration Only.
DESCRIPTION
This topic applies to installations with data sources that are using a database as their
data store.
Some Remote Desktop Manager releases must alter the database structure. These
are performed automatically for you but it is best practice to perform a backup of your
data source beforehand. Additionally, If you are in a team environment you must be
the sole user connected to the database during the upgrade.
STEPS
1. Ensure you are the sole user of the database during the upgrade process. If you
environment allows for offline use, have your team switch to the offline mode; or
have them switch to another data source.
3. Install the desired version of Remote Desktop Manager, using the Portable
(USB) deployment model may be desirable if you are doing this on your personal
workstation.
5. You may be prompted with an upgrade message when your data source is
accessed. If so accept the upgrade.
or
Using File – Data sources, locate your data source to upgrade and open its
property window. Switch to the Upgrade tab, then click on Update Database
8. Ensure your Remote Desktop Manager application is currently using that data
source.
10. Validate the content and perform a check of the technologies that are critical in
your environment.
DESCRIPTION
INSTRUCTIONS
Remote Desktop Manager does not install anything in the Windows System directory.
The only registry settings created are for the auto-run functionality and the installation
path. As a result, which simplifies the uninstallation of Remote Desktop Manager.
You can run the uninstaller if it was installed with the default setup file or delete the
installation folder directly if it was installed from the binaries.
3.4 Update
The Update feature prompts the user to update to a newer version of the application
and displays the release notes. The user's choice for the previous update is shown as
selected.
Update
OPTION DESCRIPTION
Skip this version Do not update the application with this version.
Download this version Download the version and wait for the application to be
and install when the closed before installing.
application is closed
OPTION DESCRIPTION
Download this version Immediately download the new version and install it.
and install now
Part
IV
User Interface 85
4 User Interface
4.1 UI Customization
4.1.1 Docking
DESCRIPTION
Customizable styles (default Ribbon and default Menu) have dockable panes that can
be rearranged to your liking. Simply left-click then drag the sub-components to reveal
drop zones. This allows you to drop the sub-component anywhere you want, even
outside of the main form if you wish.
Panes can also be docked into another dockable pane using the same drag & drop
method. In the following example, the Navigation Pane is dropped in the Description
pane.
DESCRIPTION
Illustrated below is the default Remote Desktop Manager main screen. Go to File –
Options – User Interface to change the current style. We have various settings for
you to customize your experience, such as different themes, shortcuts and more!
With the Menu user interface style, the Ribbon is been replaced by a standard menu,
and the Quick Access toolbar is not present. This setting can be found in File –
Options – User Interface – Ribbon Interface.
4.1.3 Style
DESCRIPTION
Remote Desktop Manager supports different User Interface Styles (sometimes known
as skins). These greatly influence the visual aspect of the User Interface as well as its
mode of operation. Three styles currently exist:
· Ribbon
· Menu
CONFIGURATION
To select the User Interface style you must go in File – Options – User Interface and
modify the Main header.
EXISTING STYLES
RIBBON
The latest style sports a ribbon. Icons and text makes it easy to explore features.
MENU
4.1.4 Theme
The themes will modify the color and shade of Remote Desktop Manager.
OPTION DESCRIPTION
Default - Light Use the default theme, which is the Light theme.
Light Use a clear theme with tones of white, gray, and blue.
The Top Pane contains the Quick Access Toolbar and the Ribbon / Menu.
If you end up confused by your modified settings and would like to reset it to its original
layout, navigate to the Windows tab and select Reset Layout.
The Quick Access Toolbar, which is found at the top of the application, It is
composed of multiple parts:
· Favorite commands.
· Lock command.
FAVORITE COMMANDS
Commands contained in the ribbon can be added in the quick access toolbar. These
are the favorite commands. To add a command to the quick access toolbar, right-click
any icon in the ribbon the select Add.
Favorite Commands
COMM DESCRIPTION
AND
Right-Click on any command to display the contextual menu. To remove an item from
the quick access toolbar, right-click on the item and select Remove. To add an item to
the quick access toolbar, right-click an item in the ribbon and select Add. Use this to
customize your workspace with your preferences.
This command will minimize the application. When you attempt to restore it you will be
prompted for the password. Applies only to data sources protected by a password.
4.3 Navigation Pane
DESCRIPTION
The Navigation Pane is one of the main components of the Remote Desktop Manager
user interface. It lists all available entries in the current data source and allows to switch
to another data source or Vault.
Navigation Pane
ELEMENT DESCRIPTION
Entry list Displays the content of the current data source, depending
on the selected tab. It allows to select entries and perform
action on them.
ELEMENT DESCRIPTION
COLUMN CHOOSER
Choose the columns to display in the tree view. Right-clicking on the column name in
the Navigation Pane and select Column Chooser.
For more information on each tab, please consult the following topics:
· Vault
· User Vault
· Opened Sessions
· Favorite Entries
DESCRIPTION
The Favorites tab contains entries flagged as favorite by the current user. Favorites
are not shared and they roam with the user profile.
This is useful when the number of managed entries becomes too great or when a strict
directory structure must be maintained.
Favorites UI
The favorites view can be personalized to show the sub-connections. Click on and
select Show Sub-Connections. You can also Import and Export favorites by clicking
on the corresponding option.
A shortcut to the Favorites tab of the Navigation Pane is located in the Panels
section of the View tab.
Favorites do not necessarily replicate the folder structure of the Vault. Add folders in
the favorite view to organize your favorite entries.
ICON OVERLAY
If desired, an icon overlay can be displayed in the Vault over favorite entries. To display
the icon overlay, navigate to File - Options - User Interface - Favorites, then enable
the Show favorite icon in navigation tree option.
DESCRIPTION
This tab shows the most recently used/modified items in the selected vault. It is
accessible in the Navigation Pane.
The Recent view can be customized in the same way as the tree view. Click on the
button to select your preferred view (Tiles or Details).
To delete the most recently used entries history, select Clear Recent Entries.
By default, ten items will be kept in the Recent history. This setting can be changed in
File - Options - Application - Recent.
The Recent tab can also be accessed from the Ribbon in View - Panels - Recent.
DESCRIPTION
Remote Desktop Manager, being a Windows application, supports key mapping in its
navigation pane.
DESCRIPTION
The content area contains the various dashboards to manage RDM, as well as
embedded sessions. There is a single dashboard active at a time, depending on the
currently selected node in the Navigation Pane.
· Sessions.
· Information Entries.
· Folders.
· Credentials.
· Macros/Scripts/Tools.
4.4.1 Embedded Sessions
DESCRIPTION
The Embedded (tabbed) display mode allows you to open multiple sessions as tabs
withing Remote Desktop Manager, similar to the tabs in your standard web browser.
Embedded sessions are one of the 3 available display modes, the other 2 being
External and Undocked.
SPLIT WINDOWS
Within a Remote Desktop Manager embedded session is the option to display multiple
tabbed windows simultaneously. As illustrated below, select and hold down on a tab
and drag it towards the center of the screen to access the four-sided directional control.
Aim the directional control to anchor the tab to the top, bottom, left or right of the
adjacent tab.
4.4.2 Dashboard
DESCRIPTION
The Dashboard displays commands and information related to the selected entry. The
dashboard contents depend on the type of the selected entry.
The tabs can be hidden if they are not necessary for a user.
Simply right-click any tab, then select an item to toggle the visibility of
its relative tab.
The status bar rests at the bottom of the application. It is composed of multiple parts
· Search / Filter.
Status bar
SEARCH / FILTER
This feature is indicated by the green globe between the version label and the Grab
input toggle. Clicking it will change your connection between offline and online (for
RDM only). You can tell which connection state you are currently using by the color of
the globe. Green is online and orange is offline.
It is possible to apply a filter in the Navigation Pane tree view by typing some
characters in the filter box. The filter is applied using the specified settings in the
application File – Options – User Interface – Filter.
ELLIPSIS BUTTON
Ellipsis button
The filter expression is matched against fields as selected in the filter options such as:
It's possible to exclude results by choosing to display entries that match certain criteria:
In Navigation options, you can limit the search parameters to specific entry types. Such
as Sessions, Data Entries, etc.
Search Types
The Search Options offers the chance to customize your search, such as including
shortcuts or favorites, making it case sensitive, and more!
Search Options
KEYBOARD SHORTCUT
Use the keyboard shortcut CTRL+F to quickly have access to the Search / Filter
control. This can be disabled in File - Options - User Interface - Keyboard.
You can set the focus back on the Navigation Pane by using the keyboard shortcut
Ctrl+L, this also can be disabled in the options.
BOOLEAN FILTER
· Evaluated left-to-right
· No parentheses matching
· Double-quotes (") are not required or removed, they are part of the text filter, do not
use them unless you are looking for a double-quote.
· Boise&&Laptop
- Will work but filter for the string "Baton Rouge" and not the string Baton Rouge
- Will work but filter for Laptop and the string (Baton Rouge || Boise)
DESCRIPTION
The grab keyboard input is used to capture the keyboard shortcuts when a session is
running. It can be disabled momentarily to ensure that the shortcut is sent to the running
session.
Ctrl+F is a shortcut that often interferes. It is used to focus Remote Desktop Manager's
search/filter toolbar. However, it is almost always present in applications in the remote
session and when you use the shortcut, Remote Desktop Manager sets the focus in the
search/filter toolbar instead. This conflict can be avoided by disabling the feature.
DESCRIPTION
Remote Desktop Manager allows the user to control the application from the Windows
system tray. You can also customize its content.
Right-click on the Windows tray menu bar to access the context menu. You can launch
sessions, change data source, use the Quick Connect feature, and more.
OPTION DESCRIPTION
Sessions List Displays the sessions from the current data source. Sessions are listed by
default. It is possible to show only those marked as favorites.
Play List Allows the user to launch a Play List from the tray icon.
Data Sources Lists the available Data sources and allows the user to switch from one to
another. This section appears only if enabled and more than one data source is
OPTION DESCRIPTION
configured.
Prompts for the Quick Connect dialog to open an add-hoc connection with a
Quick specific type, or a selected template.
Connect
The application options contain many settings that allows for customizing the system
tray icon preferences. To change these, Navigate to File – Options – User Interface –
Trayicon/Taskbar.
Part
V
114 Remote Desktop Manager
5 Data Sources
DESCRIPTION
The data sources are at the heart of Remote Desktop Manager, they are the container
that holds entries.
SETTINGS
A data source can be a local file or a database (either local or shared). Multiple data
sources can be managed at the same time as seen below.
Data Source
Please consult our Create a new data source topic for more information.
Multiple data sources can be configured, but there is only one active at a time.
Switch from one data source to another by using the data source drop down list.
You may assign a data source to open automatically when Remote Desktop Manager
starts.
OPTION DESCRIPTION
Use default Select the data source to connect to when the application
data source starts.
Prompt for data Prompt the user to for a data source to connect to.
source
Advanced Data Sources can manage a lot more settings related to the database and
security. Those settings are saved directly in the database. For more information,
please consult the Data Source Settings (System Settings) topic.
DESCRIPTION
If one of the components is missing or supplied incorrectly, the user's identity is not
established with sufficient certainty and then access to the data source will remain
blocked.
It is set at the Data Source level and Remote Desktop Manager supports Authenticator
(TOTP), Yubikey, and Duo.
5. Click Change.
· Authenticator (TOTP)
· Yubikey
· Duo
DESCRIPTION
SETTINGS
2. Click Save.
5. Click Validate.
5.1.2 Yubikey
DESCRIPTION
Remote Desktop Manager allows you to use a Yubikey to provide an additional security
layer when opening a data source.
SETTINGS
2. Click Save.
4. Hold the gold button on the Yubikey to have the code filled in the field
5. Click Save.
5.1.3 Duo
DESCRIPTION
SETTINGS
1. In your Duo account, you will need to protect the application Web SDK.
4. All the information necessary to fill in the Duo Settings fields will be generated by
your Duo account.
8. If you have more than one device connected to your Duo account, select the device
you wish to use for your 2-Factor authentication.
9. Select the method by which you would like to receive your Duo Passcode.
· Send SMS: You will receive the code by SMS on your registered phone number.
· Phone: You will receive a phone call and a computer generated voice will dictate
the code to you.
Once you have completed all the steps, you will be prompted with the Duo
Authentication every time you connect to your secured data source.
5.2 Caching
DESCRIPTION
The caching mode will determine how the client will refresh the content of the data
source when changes are detected. On large data sources caching is essential as it
increases performance significantly.
SETTINGS
The Caching mode option can be access via the File – Data Sources – Edit Data
Source – Advanced tab of an Advanced Data Source.
Caching Mode
OPTION DESCRIPTION
Intellige Intelligent cache has the ability to handle many more sessions without
nt experiencing performance degradation.
When first opening the data source Remote Desktop Manager will
loaded the session from the offline file then refresh to get the up-to
date information.
LOCATION
If using a version of Remote Desktop Manager prior to 11.2, the default engine will be
the SQLite, in that case the database is encrypted using a non-portable computed key
hash.
If using version 11.2 or newer of Remote Desktop Manager the default cache engine
will be the Microsoft Compound Document Format (MCDF) files.
SETTINGS
4. Configure the connection settings. To validate the information, click the Test
Server or Test Connection (depending on the type of data source being creating).
5. Once created, select the new data source by selecting it from the data source drop
down list at the top of the Navigation Pane.
DESCRIPTION
Remote Desktop Manager supports multiple types of data source. First decide which
data source you are going to use.
Cons:
· No possibility of sharing.
· No security management.
Cons:
· No offline mode.
· No possibility of sharing.
· No offline mode.
Cons:
· Installation required.
Cons:
· No security management.
Cons:
Cons:
Cons:
· No possibility of sharing.
· No security management.
· No installation.
Cons:
· No possibility of sharing.
· No security management.
DESCRIPTION
To simplify deployment for multiple users, it is possible to export and import data
source configurations. The generated .rdd file contains all the information to recreate
the configuration. Please note that the .rdd file does not include the database content.
Only the configuration is exported. Use the entries's Export functionality to backup or
copy the database's content.
DESCRIPTION
Advanced Data Sources are highly configurable data sources, typically running on an
advanced management system, such as a database management system or our own
online services.
They greatly increase the set of managing features available to administrators, such as:
· Offline mode.
· 2-Factor Authentication.
· Devolutions Server.
DESCRIPTION
HIGHLIGHTS
Enter a name of the data source and the URL for the Host. Ensure you use the correct
protocol if SSL is required by the server (https).
Export the data source, then import the file in your client workstations as described
Import/Export Data Source.
SETTINGS
GENERAL
OPTION DESCRIPTION
Example: http://<hostname or IP
address>/<instance name>
Use Windows Use the same credentials are your current Windows user.
authentication
Use Office365 Use the same credentials as your current Office365 user.
authentication Choose an authentication option:
OPTION DESCRIPTION
Always prompt for Always ask for the username and password when
credentials connecting to the data source.
Always ask Always ask for the password when connecting to the data
password source.
Test Connection Test the connection with Devolutions Server to validate the
credentials.
SETTINGS
OPTION DESCRIPTION
Remote tools Select whether the Remote Tools will be accessed locally
access mode or through the host.
Manage Cache Manage the data source cache. On large data sources
caching is a must and will increase performance
significantly. For more information, please consult the
Manage Cache topic.
USER VAULT
OPTION DESCRIPTION
VPN
Open a VPN to access your data prior to connecting to your Devolutions Server.
ADVANCED
OPTION DESCRIPTION
Caching mode Determines how the entries will be reloaded in the data
source. For more information, please consult the
Caching topic.
Ping online method Indicate the preferred ping online method. Select
between:
· None
· Web request
· Only Administrator(s)
· Disabled
OPTION DESCRIPTION
Prompt for offline Ask to use the data source in offline mode when the
mode on startup user connects to the data source.
Auto go offline Use the data source in offline mode when the ping
method does not respond.
Disable lock Disable the option to lock the data source directly. The
application still can be locked but the user is not
prompted for the data source password when unlocking
the application.
DESCRIPTION
With the Microsoft SQL Server data source, Remote Desktop Manager
uses the power of Microsoft SQL Server to save and manage entries.
· Clustering.
· Log Shipping.
· Database mirroring.
HIGHLIGHTS
CONFIGURATION
Consult the Configure SQL Server topic for more information on the configuration.
SETTINGS
GENERAL
OPTION DESCRIPTION
· Custom Login
OPTION DESCRIPTION
Always Prompt for the password when a user connects to the data source.
ask
password
Test Test the connection with the server to validate if the proper
Server information has been provided.
Test Test the connection with the database to validate if the proper
Database information has been provided.
SETTINGS
OPTION DESCRIPTION
Root filter Enter the name of a root level folder to display only the entries
contained in that folder.
Ping online Indicate the preferred ping online method. Select between:
method
· None
· Ping
· Port Scan
Auto go offline Use the data source in offline mode when the ping method
does not respond.
OPTION DESCRIPTION
Disable lock Disable the option to lock the data source directly. You can still
lock the application but you won't be prompted for the data
source password if this option is disabled.
USER VAULT
OPTION DESCRIPTION
OPTION DESCRIPTION
UPGRADE
OPTION DESCRIPTION
Test Server Test the connection with the server to validate if the proper
information has been provided.
OPTION DESCRIPTION
Test Database Test the connection with the database to validate if the proper
information has been provided.
VPN
Open a VPN to access your data prior to connecting to your Microsoft SQL Server.
ADVANCED
OPTION DESCRIPTION
Caching mode Determines how the entries will be reloaded in the data source.
For more information, please consult the Caching topic.
Prompt for Ask to use the data source in offline mode when the user
offline mode connects to the data source.
on startup
OPTION DESCRIPTION
Allow beta Allow beta upgrade of the database (when using a beta version
database of Remote Desktop Manager).
upgrade
Manage Cache Manage the data source cache. On large data sources caching
is a must and will increase performance significantly. For more
information, please consult the Manage Cache topic.
DESCRIPTION
2. Follow the steps in the Create a data source topic. On Step 4, before testing server
or otherwise verifying the connection, continue with the steps below.
3. Select the Upgrade tab and click the Create Database button. If the database is
already created on the Microsoft SQL Server, click the Update Database button to
add the appropriate tables to the database.
Upgrade Tab
4. Once the database is created, create an administrator account for the database via
the Administration - Users menu.
5. Connect to the Microsoft SQL Server database with the Remote Desktop Manager
administrator account. To do so, edit the data source used to create the database and
change the login information for the administrator account created with Remote
Desktop Manager.
DESCRIPTION
Microsoft SQL Server backup and restore operations occur within the context of the
recovery model of the database. Recovery models are designed to control transaction
log maintenance. A recovery model is a database property that controls how
transactions are logged, whether the transaction log requires (and allows) backing up,
and what kinds of restore operations are available. Three recovery models exist:
simple, full, and bulk-logged. Typically, a database uses the full recovery model or
simple recovery model. A database can be switched to another recovery model at any
time.
DESCRIPTION
To ensure that the communication between Remote Desktop Manager and the
Microsoft SQL Server database is encrypted, an extensive procedure must be followed
on the Microsoft SQL Server instance.
Please consult this Microsoft technet article that provides detailed instructions:
Encrypting Connections to SQL Server (technet).
After it has been properly configured, the only modification to perform in Remote
Desktop Manager is to set a property in the More Settings of the data source.
PROCEDURE
1. Create or edit an Microsoft SQL Server data source, access the Advanced tab and
click the More Settings button.
DESCRIPTION
With the Microsoft Azure SQL data source, Remote Desktop Manager
uses the Microsoft cloud platform to save and manage entries.
· Clustering
· Log shipping
· Database mirroring
Microsoft Azure SQL offers different service tier in their purchase model for DTUS.
HIGHLIGHTS
CONFIGURATION
Consult the Configure Azure SQL topic for more information on the configuration.
SETTINGS
GENERAL
OPTION DESCRIPTION
· Custom login
OPTION DESCRIPTION
Always ask Prompt for the password when a user connects to the data
password source.
Test Database Test the connection with the database to validate if the
proper information has been provided.
SETTINGS
OPTION DESCRIPTION
Root filter Enter the name of a root level folder to display only the entries
contained in that folder.
Ping online Indicate the preferred ping online method. Select between:
method · None
· Ping
· Port Scan
Auto go offline Use the data source in offline mode when the ping method
does not respond.
Disable lock Disable the option to lock the data source directly. You can still
lock the application but you won't be prompted for the data
source password if this option is disabled.
USER VAULT
OPTION DESCRIPTION
UPGRADE
OPTION DESCRIPTION
Test Database Test the connection with the database to validate if the proper
information has been provided.
VPN
Open a VPN to access your data prior to connecting to your Microsoft Azure SQL
database.
ADVANCED
OPTION DESCRIPTION
Caching mode Determines how the entries will be reloaded in the data source.
For more information, please consult the Caching topic.
Prompt for Ask to use the data source in offline mode when a user
offline mode connects to the data source.
on startup
OPTION DESCRIPTION
Allow beta Allow beta upgrade of the database (when using a beta version
database of Remote Desktop Manager).
upgrade
Manage Cache Manage the data source cache. On large data sources caching
is a must and will increase performance significantly. For more
information, please consult the Manage Cache topic.
DESCRIPTION
1. Make sure that you have a valid Microsoft Azure SQL subscription to be able to
create your database.
2. Follow the steps in the Create a data source topic. On Step 4, before testing server
or otherwise verifying the connection, continue with the steps below.
3. Select the Upgrade tab and click the Create Database button. If the database is
already created on the Microsoft Azure SQL Server, click the Update Database button
to add the appropriate tables to the database.
Upgrade Tab
4. Once the database is created, create an administrator account for the database via
the Administration - User Management menu.
5. Connect on the Microsoft Azure SQL database with the Remote Desktop Manager
administrator account. To do so, edit the data source used to create the database and
change the login information for the administrator account that you have created.
DESCRIPTION
To enable SQL Server Azure Active Directory Authentication you must first configure
the Azure Active Directory admin of the server.
It may take a few minutes for this change to propagate. You might
experience a time delay before being able to connect with this Active
Directory account.
You can use an existing Microsoft Azure account if you already have
one created. It is not necessary to create another to perform the
following steps.
Azure AD Portal
1. Has show in the Overview tab the Active Directory admin is set to Not
configured.
4. Type the admin name in the Search field, click on the admin in the list provided and
then Select.
6. Copy the Active Directory admin email, it is essential for the next steps.
DESCRIPTION
To be able to use the Active Directory Interactive (with MFA Support) authentication
method in Remote Desktop Manager, a new app registration needs to be registered in
the Microsoft Azure SQL console (Azure Active Directory) with the appropriate API
permissions.
SETTINGS
App Registration
6. Select APIs my organization uses, then type Azure and select Azure SQL
Database.
user_impersonation
8. The API permissions should look like this. You will see the new permission we just
added and the preexisting Microsoft Graph.
9. Optional step: Click on the Authentication section and switch to Yes, if you desire
the Integrated Windows Authentification (IWA) option
Authentication
Application (client) ID
DESCRIPTION
This topic is for Remote Desktop Manager version 2022.1 and higher.
If you are using an older version please follow this topic instead.
Active Directory Interactive (with MFA Support) allows you to authenticate on your
Microsoft Azure SQL data source using your Office365 account + MFA.
When creating SQL Active Directory users, you must be logged in with
an Azure Active Directory user. Otherwise it will fail and you will be
notified of the error.
Use the servers defined Azure Active Directory Admin to create your first RDM admin
users. Once you've created, you can use this new account to create other users.
SETTINGS
1. Select Active Directory Interactive (with MFA Support) from the Login mode
dropdown menu.
2. In the Username field, paste the Active Directory admin email you created in the
Microsoft Azure SQL databases.
DESCRIPTION
This topic is for Remote Desktop Manager versions lower than 2022.1.
If you are using 2022.1 and higher please follow this topic instead.
Active Directory Interactive (with MFA Support) allows you to authenticate on your
Microsoft Azure SQL data source using your Office365 account + MFA.
When creating SQL Active Directory users, you must be logged in with
an Azure Active Directory user. Otherwise it will fail and you will be
notified of the error.
Use the servers defined Azure Active Directory Admin to create your first RDM admin
users. Once you've created, you can use this new account to create other users.
SETTINGS
1. Select Active Directory Interactive (with MFA Support) from the Login mode
dropdown menu.
2. You can specify how you want RDM to interact with Azure AD during the
authentication.
OPTION DESCRIPTION
3. In the Username field, paste the Active Directory admin email you created in the
Microsoft Azure SQL databases.
4. Click on Configure to set the Azure App Settings and enter the application ID from
the Azure Active Directory App Registration and the corresponding Redirect URI.
App Registration
DESCRIPTION
From Remote Desktop Manager navigate to Administration – Users, and add a new
user.
DESCRIPTION
Devolutions Password Hub Business, for businesses who need to share passwords
and credentials within their organization.
To start your free Devolutions Password Hub Business trial today click
here.
SETTINGS
GENERAL
OPTION DESCRIPTION
VPN
Open a VPN to access your data prior to connecting to your Devolutions Password
Hub.
ADVANCED
DESCRIPTION
The User Vault allows you to connect a personal Vault stored in a Devolutions Online
Drive file directly to your Advanced Data Source, thus allowing you to store
information that only you can have access to. For more information about the User
Vault please follow this link.
1. In the User Vault tab of your Advanced Data Source, select Online Drive in the
Type.
2. Click on the ellipsis next to the Filename field. A list containing your pre-existing
Devolutions Online Drive files will prompt. You may choose to use an existing file (.dod)
or if you wish you can enter a name in the New data source field and click on Create
to automatically create a new Devolutions Online Drive file.
5.4.3 DropBox
DESCRIPTION
Remote Desktop Manager uses the Dropbox API to retrieve a XML file
from the configured repository. There is no need to install the Dropbox
client on the machine to open the data source. It is also possible to
configure more than one Dropbox account on the same machine.
The Dropbox integration uses the Dropbox SDK, so any features that
are exclusive to the Business or Enterprise editions are NOT
supported.
HIGHLIGHTS
· This data source can be shared over the Internet between multiple locations.
· To avoid data corruption, the session list should be modified in one location at a
time.
· No need to have the Dropbox client installed to use the Dropbox data source.
SETTINGS
GENERAL
OPTION DESCRIPTION
Mode Select the mode that is preferred to configure the data source.
Select between:
· Account
OPTION DESCRIPTION
· Local
Local path Contains the local path where the Dropbox files are accessible.
(Local Mode)
Email (Accout Contains the email address associated with the Dropbox
Mode) account.
Validate with Button to validate the email address with the Dropbox account.
Dropbox
(Account
Mode)
Master key Add an additional layer of security to your data source by using
master key.
Always ask Connecting to the data source will always prompt for the master
master key key.
Dropbox Indicate the folder in Dropbox. It should not contains any drive
directory since it's stored online. Leave it empty to use the default
Dropbox root.
Filename Indicate the filename used to store the data on the data source.
Compress Activate this option if you wish to compress your database file.
database file
VPN
ADVANCED
OPTION DESCRIPTION
Use current Dropbox This option will use the Dropbox account who has
session if available been already validated without any other validation.
Always ask for Always ask for confirmation when connecting to the
confirmation data source.
Disable reveal password Disable the reveal password feature when a user
access this data source.
Allow offline mode Allow the data source to be used in Offline mode.
DESCRIPTION
GENERAL
OPTION DESCRIPTION
OPTION DESCRIPTION
Always Always ask for the password when connecting to the data source.
ask
passwor
d
Account Indicated if the account has been validated with Google Drive.
status Credentials must be validated before using the data source.
Master Enter the master key of the data source (If enabled).
key
Always Enabling this option will prompt for a master key whenever you are
ask connecting to the data source.
master
key
Filename Enter the Google Drive path of the data source's file.
VPN
Open a VPN to access your data prior to connecting to your Google Drive.
DESCRIPTION
The Devolutions Online Drive stores and synchronizes your remote connections and
credentials data in our Cloud services. You can access your sessions from anywhere
via an Internet connection.
It is an online file storage service dedicated to a single file type, Remote Desktop
Manager’s connection list. Devolutions Online Drive is completely free and has no
limitations as to how many sessions you might have, it is for single users as it cannot
share files.
Please consult the Online Drive topic for information on this service.
Even though this is a cloud service, you MUST use our Online Backup
service to keep history of your data. Devolutions offers a free backup
service, and we do not maintain multiple versions of the Online Drive
content. This makes it critical that you enable the backup feature. This
service will keep multiple versions of your file and is the best option.
SETTINGS
GENERAL
OPTION DESCRIPTION
Always ask password Prompts for the password every time a connection to
(default only) the Devolutions Online Drive is attempted.
Always ask master key Ask for the master key every time a connection to the
Devolutions Online Drive is attempted.
BACKUP
Please consult the Online Backup topic for information on this service.
OPTION DESCRIPTION
VPN
Open a VPN to access your data prior to connecting to your Devolutions Online
Drive.
ADVANCED
OPTION DESCRIPTION
Auto refresh Set the interval to use between each automatic refresh.
Disable reveal Disable the reveal password feature when a user access the
password data source.
Clear Offline Clear the offline cache on the local computer. This can be very
Cache helpful when encountering offline issues.
DESCRIPTION
Devolutions Password Hub Personal, for individual users who want to secure personal
passwords in a secure vault for free.
SETTINGS
GENERAL
OPTION DESCRIPTION
VPN
Open a VPN to access your data prior to connecting to your Devolutions Password
Hub.
ADVANCED
5.4.7 SQLite
DESCRIPTION
Remote Desktop Manager's SQLite data source is ideal for single user and
stand-alone situations. More powerful and more flexible than the XML file
format, it also supports a few of the Advanced Data Source options like
Logs and Attachments.
HIGHLIGHTS
PASSWORD MANAGEMENT
You can specify a password to further encrypt your data. Specify it at creation time. If
the data source already exists you can modify the password by using the File –
Manage Password dialog.
SETTINGS
GENERAL
OPTION DESCRIPTION
Always ask Always ask for the password when connecting to the data
password source.
Test Test the current database path and password for conneciton.
Connection
Two factor Enable the 2-Factor Authentication to access your data source.
BACKUP
OPTION DESCRIPTION
VPN
ADVANCED
OPTION DESCRIPTION
Disable reveal Disable the reveal password feature when a user access this
password data source.
Disable Entries will be reloaded in Simple mode in the data source. See
caching Caching topic for more information.
5.4.8 XML
DESCRIPTION
HIGHLIGHTS
SETTINGS
GENERAL
OPTIO DESCRIPTION
N
Filenam Specify the full path of the XML file used to save the data. Relative
e paths and environment variables can be used as well.
Master Add an additional layer of security by encrypting your data source with
key a master key.
Always Always prompts for the master key when connecting to the data
ask source.
master
key
BACKUP
OPTION DESCRIPTION
Backup name Specify the backup name that will allow you to automatically
save your sessions in a safe online storage space and restore
them in the event of problems.
VPN
ADVANCED
OPTION DESCRIPTION
Disable reveal Disable the reveal password feature when a user accesses
password this data source.
Allow custom This will enable the loading of any custom images in the tree
images view.
Read-only Set the data source in read only. No new entry can be created
and the existing data cannot be edit.
To protect sensitive data in your data source configuration (e.g. server URL or
credentials), you may wish to lock the data source configuration before you deploy it to
your users. You can do it by using the Lock/Unlock button from the toolbar.
SETTINGS
The locked data source will require a password. The password must be specify when
the lock is applied. Use the same password to unlock it or to modify the data source
configuration.
DESCRIPTION
The offline mode connects to a local copy of the data source when you are not
connected to the data source. This is useful when working from a remote location and
the network is unreachable or if there is any kind of connectivity issue.
The read/write offline mode adds to users the possibility to manipulate entries while
disconnected from the data source. This is useful for off-site personnel or when
working in environments that have sporadic network availability.
For added security, offline files are set to expire after a delay. The default expiry is set
to 7 days but can be modified via the System Settings.
Remote Desktop Manager will prompt for offline mode when the application is unable
to reach the data source but the offline mode can be toggled manually with File – Go
Offline.
AVAILABILITY
· The data source offline cache must be enabled in File - Data Sources - Advanced -
Caching Mode - Intelligent. (This step needs to be done before you export your
data source to other computers)
· The user groups policies (only for the DVLS data source) in Administration - User
groups - Edit - Settings - Offline mode.
· For each Vault Administration - Vault Settings - Security Settings - Allow offline.
The lowest setting (in terms of security) prevails over the others, which may prevent
you from using the offline mode. If the Go Offline button is not available, please
consult your administrator.
The Data Source Information displays the size of the offline cache file along with the
effective modes (disabled, read-only or read/write).
CACHING MODE
The caching mode must be set to Intelligent to enable the offline mode.
OPTION DESCRIPTION
GRANT/DENY OFFLINE
OPTION DESCRIPTION
Read- Allow to view and use entries only. The content of the data source
only cannot be modified.
Read/Writ Allow to view, use, and edit entries. Conflicts caused by offline
e modifications are managed when back online.
Beyond the group policies, the Offline mode is controlled on multiple levels:
· User permissions.
· System Settings.
· In a Vault's setting.
Allow offline
Read/write Read/write Read/write
enabled
DESCRIPTION
The Read/Write offline mode allows the user to add, edit and delete entries while the
data source is offline. Those changes are saved locally and synchronized with the data
source once it is back online.
Once offline, the users security settings still applies. Add/Edit/Delete privileges granted
by the administrator are still in effect. See User Management.
When an entry is edited by an online user while another user is offline, the local version
of the entry stored in the offline cache becomes different from the online version. This
causes a conflict when the offline user gets back online.
Offline Edits
You can use the Compare action to have a side by side comparison of your changes
with the current live entry.
When multiple users edit the same entry offline simultaneously, a conflict occurs when
the second user is back online.
When the first user returns online, the Offline Edits window is displayed. Changes are
accepted by default.
When a second user returns online, a conflict occurs and the Offline Edits window is
displayed.
When the conflict occurs, the user must decide to accept or reject the changes. The
different versions of the entry can be compared to view which changes has been
made.
Click the Compare button to compare the versions of a conflicted entry. Analyze the
XML structure of the entry to decide to Accept or Reject the changes.
The content on the left represents the entry retrieved online, and the content on the
right represents the local version of the entry, edited in Offline mode.
DESCRIPTION
This option allows you to manage your cache which decides how the client will re-load
entries when changes are detected. On large data sources caching is a must and will
increase performance significantly.
This feature is only available when the offline engine is set to use
SQLite. We are phasing out this engine because of multiple issues
reported by customers. We recommend you use MCDFv2.
SETTINGS
Manage Cache
OPTION DESCRIPTION
OPTION DESCRIPTION
Vacuum This will run an SQLite command to reduce your cache size. The
Vacuum should only be used after trying to execute a Repair of
your cache. If the repair hasn't solved your issue running a Vacuum
will usually solve issues when dealing with a corrupted cache.
Repair The repair will run four different SQLite commands to repair a
corrupted cache:
§ PRAGMA integrigy_check
§ REINDEX DatabaseInfo
§ REINDEX Connections
§ REINDEX Properties
DESCRIPTION
The User Vault is a user centric Vault for entries of any type. It allows each user to
create entries that only them can access.
A NOTE ON CREDENTIALS
These restrictions can easily be understood when you keep in mind that the User Vault
is in fact contained in the user area of the database. It must be used from within the
User Vault, or by using our extension mechanism that is user specific.
Part
VI
Commands 239
6 Commands
6.1 Context Menu
DESCRIPTION
The Context Menu contains several entry-specific actions. The available actions
depend on which type of entry is selected. Right click on an entry to display the context
menu.
Context Menu
DESCRIPTION
The Open with Parameters menu all options available to open a session.
OPTION DESCRIPTION
OPTION DESCRIPTION
Open (Full Screen) Open the session with the full screen display mode.
Open (Select Prompts you with the list of the credentials link to your
Credentials)... Data Source to allow you to chose the one needed to
open your session.
Open in No Open your session normally and prompt your for your
Console/Admin credentials to connect.
Mode
(Prompt for
Credentials)
Open Share Folders Open the shared folders of the remote computer.
Open with a Open from a template that you have already created.
Template...
6.1.2 Documentation
DESCRIPTION
The Documentation feature allows for storing information about resources in the data
source. To access an entry's documentation, select an entry in the Navigation Pane,
then select the Documentation tab in the dashboard. Alternatively, right-click an entry
in the Navigation Pane, then select View – Documentation.
6.1.2.1 Editor
DESCRIPTION
The documentation editor is a simple plain text editor. The text is formatted using the
Markdown text formatting syntax. Markdown is a markup language designed to be as
easy-to-read and easy-to-write as possible.
Documentation editor
· Paragraphs
· Emphasis
· Headers
· Lists
· Horizontal rulers
· Links
· Images
· Blockquotes
· Code examples
PARAGRAPHS
EMPHASIS
*Italic text*
Output:
HEADERS
First and second level can be created by "underlining" the text with equal signs (=) and
hyhens (-).
First level header
==================
More levels of headers can be created by using one to five hash symbol (#) at the
beginning of the line.
# First level header
LISTS
Use asterisks, pluses, and hyphens to create an unordered bulleted list. These three
markers are interchangable.
* Item 1
* Item 2
* Item 3
or
+ Item 1
+ Item 2
+ Item 3
or
- Item 1
- Item 2
- Item 3
Output:
HORIZONTAL RULERS
or
***
or
---
Output:
LINKS
Use square brackets to delimit the text you want to turn into a link.
Use parentheses immediately after the link text for inline-style links:
Navigate to the [Devolutions website](https://devolutions.net).
Output:
For reference-style links, define the links elsewhere in the document, then refer to a link
by its name in another set of square brackets.
Navigate to the [Devolutions website][mainwebsite] or the [Devolutions forum][forumweb
The title attribute is optional again. Link names may contain letters, numbers and
spaces, but are not case sensitive.
IMAGES
Image syntax is very similar to link syntax. Images must be added in the image
manager before referencing them.
To add images in the image manager, click the Manage images button.
Click Add to select an image from the computer. Select the image in the list, and click
Insert to place the image in the text.
BLOCKQUOTES
Quote a passage of text by inputting a greater-than (>) symbol at the beginning of the
line of text.
> Quoted passage of text
Output:
CODE EXAMPLES
Code blocks are created be indenting the text with four spaces at the beginning of each
lines There must have an empty line before.
// Testing indented code
var markdownAwesomeness = 0;
if (indentedCodeWorks) {
markdownAwesomeness++;
}
Output:
DESCRIPTION
Entry History feature allows you to view details regarding different version of your
sessions and also gives you the option of performing compares between different
versions.
SETTINGS
To display the entry history, right-click on an entry and select View - Entry History.
The entry history view dialog allows you to compare two entries and manage history
revisions. To compare simply select any two entries then use the Compare button. You
can delete any history revision or the entire history using the Delete and Delete All
buttons.
Use the Administration - View Deleted to manage and resurrect deleted entries.
Deleted Entries
6.2 File
DESCRIPTION
The File menu contains many actions regarding the application and the data source.
This menu is contextual and depends on the connected data source.
File
GO OFFLINE/ONLINE
LOCK APPLICATION
The user is prompted for the data source password when the application is restored (if
required by the configuration).
For more information, please consult the My Data Source Information topic.
DEVOLUTIONS ACCOUNT
REFRESH
Refresh the data source and retrieve the most recent data.
DATA SOURCES
BACKGROUND SERVICES
MY ACCOUNT SETTINGS
View information about the current user and edit personal credentials.
For more information, please consult the Change Master Key topic.
IMPORT
EXPORT
OPTIONS
TEMPLATES
6.2.1 Go Offline/Online
DESCRIPTION
Use the offline mode to connect to a local copy of the data source when the remote
database is unavailable. This is useful when working from a remote location and the
network is unreachable or if there is any kind of connectivity issue.
The offline mode availability relies on several settings, refer to the Offline Mode topic.
The lowest setting (in terms of security) prevails over the others, which may prevent
you from using the offline mode. If the Go Offline button is not available, please
consult your administrator.
The Data Source Information displays the size of the offline cache file along with the
effective modes (disabled, read-only or read/write).
DESCRIPTION
The Data Source Information displays various information related to the current data
source, such as the current user and security access.
GENERAL
The General tab displays information about the current user and data source
configuration.
OPTION DESCRIPTION
Allow offline mode Indicates if the user can use the data source in offline
mode.
OPTION DESCRIPTION
Auto refresh interval Indicates the delay for the auto refresh to occur.
ENTRIES
OPTION DESCRIPTION
Add, Edit and Delete Indicates if the user has the right to add, edit, or delete
entries entries.
View information Indicates if the user can view the information section
section of entries.
OPTION DESCRIPTION
Import and Export Indicates if the user has the privilege to import or
entries export entries.
Allow add entry in Indicates if the user can add entries in the Vault of the
Vault folder data source.
USER GROUPS
The User Groups tab displays the user groups that the user is a member of and the
rights related to those user groups.
DESCRIPTION
In File - Devolutions Account create and connect your Remote Desktop Manager to
your Devolutions Account. The Devolutions Account is free for customers and includes
access to the Custom Installer Manager.
Devolutions Account
DEVOLUTIONS ACCOUNT
OPTION DESCRIPTION
SETTINGS
OPTION DESCRIPTION
TOOLS
OPTION DESCRIPTION
6.2.4 Backup
DESCRIPTION
6.2.4.1 Settings
DESCRIPTION
The Online Backup allows you to backup your Devolutions Online Drive, SQLite or XML
data sources in a safe online storage. The backup option is available through File –
Backup menu.
SETTINGS
Backup Name
4. You will need to specify a unique backup name in the field New backup for each of
your data source which will then be used to backup and restore the data source. Click
on Create to automatically create your Online Backup.
Create Backup
5. Once you've completed all the steps, perform a change in the data source to
properly activate the Online Backup.
6.The backup logo will display a green arrow meaning your backup is now enabled.
6.2.4.2 Restore
DESCRIPTION
At some point, you may need to restore a backup of your Devolutions Online Drive,
SQLite or XML data sources. The restore option is accessible from the menu File –
Backup – Restore.
SETTINGS
1. To restore a data source from a backup, select it as the current data source.
Backup Restore
3. Select the backup that you wish to restore from the list and click on Select.
4. The Online Backup wizard will display a brief description of the backup. Click on
Next.
Backup Wizard
5. Select the restore destination. It is not necessary to select the option Perform a
backup data source before restoring the selected backup since it is empty.
Restore Destination
6.2.5 Refresh
DESCRIPTION
Refreshing the data source allows for updating its content. Data sources are usually
refreshed automatically after a set period of time.
To refresh the data source, use File – Refresh. Do a refresh to make sure that the
data source is up to date.
SIMPLE REFRESH
A simple refresh updates the data source to retrieve only the modified content. Use the
above-mentioned File – Refresh or the refresh button in the Quick Access Toolbar.
A refresh of the local cache resets the local cache of the data source. All the content is
retrieved from the database and the local cache file is recreated. Click the refresh
button while holding the Ctrl key or use the Ctrl+F5 key combination. A local cache
refresh may also help when experiencing Cache issues.
6.2.6 Change Master Key
DESCRIPTION
The master key prevents unauthorized users to access the data source without
knowing the master key. It is highly recommended to apply a master key to the data
source if you're using Remote Desktop Manager in a portable environment (i.e. USB
Flash Drive, USB Hard Drive).
DESCRIPTION
Use File – Data Sources to manage data sources. Remote Desktop Manager
supports multiple types of data source. Most are available only with an Enterprise
Edition of Remote Desktop Manager.
Please refer to the Data Source Types topic for more information on all supported
types of data sources.
Data Source
SETTINGS
Use the – – buttons to respectively edit, duplicate or delete the selected data
source configuration.
Use the – buttons to respectively import or export the selected data source
configuration. The configuration is exported as a .RDD file.
Use the lock button to lock the data source with a password to prevent any
modification to a data source configuration. This is useful when having sensitive
credentials that you wish to protect from other users.
Use the unlock button to unlock a data source locked with a password.
ON START UP
OPTION DESCRIPTION
Use default Set the data source that you always want to open at start up.
data source
OPTION DESCRIPTION
Last used data Open with the last used data source.
source
Prompt for data A message box will open on startup for the data source
source selection.
SYNCHRONIZERS
When experiencing a performance degradation with Remote Desktop Manager you will
be able to verify if a synchronizer is running in the background causing the system to
slow down.
Synchronizers
IS ONLINE
Is Online allows you to verify and change the settings of your server's online availability.
Is Online
OPTION DESCRIPTION
Enable check for Server is ping to determine if they are available. Server will
server availability be displayed in "red" in the tree view if not available.
Check is online If the option is On the application will verify if the server is
online.
· Ping
· Port scan
DESCRIPTION
Use File – My Account Settings to configure accounts that connect to different web
platforms. Set up account settings one time and use it in entries as many time as
required. This section also allows to manage Personal Credentials, Personal Private
Key and Specific Settings lists.
SETTINGS
My Account Settings
INFORMATION
OPTION DESCRIPTION
User Specific Provide a list of all the User Specific Settings configured in
Settings List Remote Desktop Manager.
Local Specific Provide a list of all the Local Specific Settings configured in
Settings list Remote Desktop Manager.
SETTINGS
DESCRIPTION
It is typically used to hold the Windows credentials for your running sessions because
Remote Desktop Manager can't access them. If you can't use integrated security then
you must store your credentials in My Personal Credentials.
This allows you to centralize one special credential to replace or emulate the ones for
your Windows session. When a password change is needed you simply need to
change it once in My Personal Credentials.
My Personal Credentials
DESCRIPTION
The User Specific Settings List feature will provide all entries that are overridden with
user Specific Settings.
OPTION DESCRIPTION
Import Import a list of user Specific Settings from a .rds file. As this
file is encrypted using a mandatory password, you will have
to provide the password to successfully import the content of
the .rds file.
6.2.10 Import
DESCRIPTION
Use the File - Import to import entries in Remote Desktop Manager. You can import
entry types from multiple sources.
We support native import formats from many popular tools on the market. In case we
don't support the native format, or don't support the third party, we have wizards to
import from a csv file.
SETTINGS
IMPORT (.RDM)
Import is used to import sessions stored in .rdm files who is Remote Desktop Manager
native export format.
IMPORT (.JSON)
You can import session from computers from different sources. These sources include:
· Network neighborhood
· Active Directory
· Host list
The Import with Network Scan allows you to perform a network scan based on a
predefine range of IP address to find sessions to import. Consult the topic Import with
Network Scan to learn more about this option.
Import entries from a .csv file. Please refer to Import Generic CSV Wizard for more
information and strategies.
· Import Sessions
· Import Logins
· Import Contacts
DESCRIPTION
The Import Computer Wizard allows you to create sessions for computers using one
of the following sources:
· Network neighborhood.
OVERVIEW
2. Optionally apply a template from which to base new sessions on; and
3. Optionally edit each newly created session prior to them being saved.
The template selection should not be overlooked, in fact, it is probably the most
important step to ensure your newly created sessions are usable right after being
created. You should divide the sessions in batches based on which template you need
to apply and import one batch at a time.
WORKFLOW
Upon launching the wizard, you are prompted for the source to use.
The Resolve IP address option must be checked if you want to use the IP address in
the host field of your sessions instead of the host name.
NETWORK NEIGHBORHOOD
The next screen will immediately be populated with the result of the network discovery.
If you prefer your sessions to use the IP address instead of the Host name to connect
to the devices, check the Select by IP address option. This requires that the Resolve
by IP address was selected in the first screen of the wizard. Select the computers for
which you want to create session and proceed to Template Selection below. Multi-
select is allowed by using CTRL-click and SHIFT-click.
ACTIVE DIRECTORY
The following screen allows you to select the domain to interrogate after which you
must press refresh to load the list of computers that are available.
After the query is executed, the results are displayed in the grid.
If you prefer your sessions to use the IP address instead of the Host name to connect
to the devices, check the Select by IP address option. This requires that the Resolve
by IP address was selected in the first screen of the wizard. Select the computers for
which you want to create session and proceed to Template Selection below. Multi-
select is allowed by using CTRL-click and SHIFT-click.
HOST LIST
The following screen allows you to enter a list of hosts in an Edit control. If you prefer
that your sessions use the IP address to connect to the hosts, you must enter the host
name, a pipe, then the IP address.
TEMPLATE SELECTION
The template selection is an optional step, but it's the only way that you have to choose
a protocol type other than RDP. It also allows you to set your preferences and have
them used by all the created sessions. In fact, we recommend you to import in batches
for each of the session type that you need to import.
If you intend to modify each of your imported sessions as they are created, check the
Edit imported entry option. Note that each session will be displayed sequentially so you
can perform your modification and save. A Batch Edit is probably preferable if you
have more then a few sessions to import.
DESCRIPTION
The Generic CSV Wizard has been greatly enhanced to support not only all entries
general fields but also subfields. This gives you access to all properties, even for types
provided by add-ons, therefore unknown by Remote Desktop Manager.
SETTINGS
1. In your Navigation pane, select the Vault you want to import the sessions in.
DESCRIPTION
The most important decision is about if and how to apply a template as part of the
process.
Both methods of importing from CSV allows you to choose a template for newly
created entries. If you do choose a template as part of the process, it will be apply to
ALL entries created from that batch. Sometimes, it may be a good strategy to split the
entries in different CSV files by grouping them by type of entries you wish to create.
If you need finer control, you can specify the template to use in a Template column of
the CSV file. But since you're able to specify the entry type from within the CSV file it
may not be necessary.
COLUMNS
In the CSV file, the Host and the Name field are mandatory. If no template is specified,
the RDP type will be used as a fallback type.
We cannot provide the list of all supported fields for all entry types because Remote
Desktop Manager uses an open architecture and therefore is not even aware of all the
fields of entry types that are provided by our Add-On system. A good method of finding
out the field structure is to create an entry of the desired type and to use Clipboard –
Copy, then paste the content in your favorite editor. You will see the structure and the
field names.
All of our entries share a basic set of fields, the rest are tied to the specific technology
being interfaced with (RDP, SSH, etc). Some fields are grouped in structures like the
Information Tab for instance. This means that those fields are accessible only when
providing the structure name as a prefix, for example: "MetaInformation\OS" or
"MetaInformation\PurchaseDate"
Note that the content of the CSV file can contain our
variables and they will be resolved upon saving. For
instance you could use the $HOST$ variable in
fields like Description, URL,
Putty\CustomSessionName, etc. It will be
replaced by the corresponding value.
OPTION DESCRIPTION
OPTION DESCRIPTION
Group Destination folder. Note that if the import process itself had
a Destination Folder defined as well, the folder listed here
would be created below the one from the process.
Open (Embedded) Boolean value (true or false) that indicates to open the
session embedded. The default value is false, meaning that
the native client will be used depending on the technology.
MSTSC.EXE for instance.
DESCRIPTION
The Import with Network Scan allows you to perform a network scan based on a
predefine range of IP address to find sessions to import.
Once the scan is completed select the sessions, you wish to import (by default every
session will be selected) and click on OK to import those sessions in your data source.
If you wish to review each and every session as they are imported you can check the
Edit imported entry. However we do not recommend this for large number of
sessions.
DESCRIPTION
Use File - Import - Session to import sessions from other software into Remote
Desktop Manager.
You can import your sessions from an existing application or an existing file format.
Some application encrypt the data but it must be in plain text to allow the application to
parse the content.
DESCRIPTION
Use File - Import - Login to import different logins or credentials from other software
into Remote Desktop Manager.
You can import the credentials from a wide array of formats exported by various
password management solutions. The export content must not be encrypted in order to
parse the content.
DESCRIPTION
Use File - Import - Contact to import contacts from other software into Remote
Desktop Manager.
· Outlook
· Real VNC
· VCard
6.2.11 Export
DESCRIPTION
SETTINGS
File - Export
Export a vault in a .rdm file that can be imported into any Remote Desktop Manager
data source. You can also include credentials in this export format and secure your file
with a master key.
By default the credentials are NOT included. It's critical to check the
Credentials option in order for the exported data to include the
credentials.
Specifying a Master key will encrypt the whole content of the .rdm file
to protect its content. It is highly recommended as a backup measure,
but the key is absolutely necessary for decryption. Preserve this as
well in a separate storage device for safekeeping.
Export a vault in a .json file format. You can also include credentials in this export
format and secure your file with a master key.
Export a simple host list in .csv format. You will be prompted to see if you wish the
export to be slightly more detailed and include the following information: Host,
Description, Display Name, Group, Security Group.
Export the vault using the .csv format file. For security reasons the .csv file will be
contained within a password encrypted zip file. This type of security can be hacked
using brute force attacks, it should be used only when the zip file is under your
exclusive control.
Export the vault with an AES-256 to encrypt self contained html file. See Export Html
Encrypted topic for more information.
Because it brought confusion to our user base, this export format has been converted
to perform the exact same export as the Export Vault but sets the file extension to
.xml instead.
Export Documents
Export all attachments or all document entries that are linked to your data source.
Export your My Personal Credentials in a .rdm file and encrypt with a Master key.
A Master key will encrypt the .rdm file to protect its content. The key
is absolutely necessary for decryption.
DESCRIPTION
The Html Encrypted export format was designed for simple and secure exports of
entries. It allows for an html export of the entry information while using symmetric
encryption (AES-256) to encrypt sensitive information such as passwords. The file is an
ultra portable self contained html file that requires no external script files or installs. As
long as you have a web browser with JavaScript enabled, you can get to your
encrypted data.
SETTINGS
Select the entries to export or export the vault. Right-click and select Export - Export
Special - Export Selection (.html) or use File - Export - Export Vault (.html). You
will be prompted for a password for the symmetric encryption key. Select the file name
for the new document. Once the export is completed, the file will open in your default
browser.
When exporting multiple entries that are all contained within the same file, at decrypt
time, each encrypted value must be decrypted individually for security reasons. Once
you're done with the sensitive data simply hit F5 to refresh the file or simply close it.
Your data is now safe from prying eyes.
AES-256
We use AES-256 to encrypt/decrypt your sensitive data. Since the decryption is done
entirely in the browser, there’s no need for external tools, downloads or installs.
Encrypted Value
In addition, HTML Export using symmetric encryption is a great way to securely backup
your passwords and other sensitive information. It allows you to share information via
email or simply send the file to your personal email account as a backup.
6.2.12 Templates
DESCRIPTION
Templates are useful to have predefined values when creating an entry. Use templates
to:
· Local templates are saved in the Remote Desktop Manager configuration file. They
are available only to the current user of the machine.
· Database templates are saved in the database. They are available to all users of
the data source.
File – Templates
AVAILABILITY
When creating a template, its availability can be specified in the Template Settings.
USAGE
By default, when creating an entry of a type that has templates configured for, the user
is prompted for a template to use. This behavior can be modified in the System
Settings.
The template can be selected before creating the entry as well. Use the Template
section of the Add New Entry window.
Templates can be used with the Quick Connect feature. For example, the same
template can be used to connect to different hosts.
DESCRIPTION
There are many ways to create template for entries. You can create a new template,
save an entry as a template, import entries as templates, and duplicate a existing
template. It is also possible to create group templates.
In this topic:
· New Template
· Save as Template
· Import Template
· Duplicate Template
· Template Groups
File – Templates
4. Enter a name for the template, and configure the properties as necessary.
Template Properties
From the Navigation Pane, right-click an entry and select Add – Save as Template...
Save as Template...
IMPORT TEMPLATE
1.1. From the Templates window, click on the Import template button.
Import Template
2. Select the *.rdm file to import to create a template for each entry in the file.
DUPLICATE TEMPLATE
Navigate to File – Templates, and select Templates. From the Templates window,
click on the Duplicate template button.
Change the template name to distinguish the copy from the original, and edit the
properties to meet your requirements.
TEMPLATE GROUPS
It is possible to save a set of selected entries or a folder and all its child items to a
unique template.
DESCRIPTION
Default Templates create default settings for new entries. Every entry type is supported
and can have a default settings template defined.
· Session
· Information
· Credential Entry
· Folder
· Contact
· Document
· Synchronizer
· Macros/Scripts/Tools
SETTINGS
To help you locate the entry type you want to customize, all entry types are organized
by category.
Select a category of entry from the File – Templates menu, then select the specific
entry type to be edited.
Please note that a [No default] notice is displayed below each type that does not have
a default template defined.
All entry types without the [No default] notice have a default template. You can double-
click on the type to edit the template or press the edit button.
If you want to remove the default settings template, press the delete button.
DESCRIPTION
Password templates set requirements for the password format: characters usage,
patterns, readability.
Password templates are available in the password generator. Password templates can
be optional or required.
SETTINGS
OPTION DESCRIPTION
Use a pattern Set a pattern for the passwords using the key.
1. On the Tools tab, click Password Generator. Or open the password generator
from an entry .
2. To choose a password template, select the title from the list. Default is equivalent to
no template, until it is configured by an administrator. When you select a template the
options are unavailable because they were saved in the template.
The default template in the Password Generator is set to "no template" until an
administrator configures the template.
3. Choose the template. The chosen template will now be the Default in Password
Generator.
4. If you want to force one template, check Force default template. No other choices
will be available in the password generator.
6.2.13 Options
DESCRIPTION
There are multiple options available to manage and customize your Remote Desktop
Manager in the menu File – Options. Most of these options are related to changes to
the local instance.
File - Options
6.2.13.1 Advanced
DESCRIPTION
Use the File - Options - Advanced tab to control the application behavior as it pertains
to low level settings.
Options - Advanced
SETTINGS
ADVANCED
OPTION DESCRIPTION
OPTION DESCRIPTION
Offline engine You can choose your Offline engine between the SQLite
or OpenMCDF. Only change this option upon request
from a Devolutions support technician.
Force "localhost" Forces the use of "localhost" when using the VPN dynamic
when using VPN port.
dynamic port
OPTION DESCRIPTION
OPTION DESCRIPTION
Disable close all Disables the Close all confirmation message when
confirmation closing/disconnecting multiple entries at the same time.
message
Disable DPAPI on Disable the DPAPI encryption on the offline cache. This
offline cache encryption is provided by Windows and used to make
the offline cache more secure.
Disable form editor Disables the form editor cache and force RDM to
cache always fetch the information. It is not recommended to
disable this feature for performance reasons.
Disable log off When pressing the logoff button in an embedded RDP
confirmation session, Remote Desktop Manager, will disconnect the
message session without the logoff confirmation message.
OPTION DESCRIPTION
Disable system event Only used for diagnostic purposes, do not set unless
handlers recommended by the Devolutions Support team.
Disable thumbnail Disable the thumbnail view for Google Chrome in View
view for Google - Thumbnails to improve the application performance.
Chrome
Enable global event Enables global event logging for Telnet and SSH
logging for Telnet and entries. It will create the file DevolutionsTerminal.log at
SSH the same place where the configuration file is located.
(DevolutionsTerminal.
log)
Force refresh before Perform a refresh of the entry before entering in edit
edit entry mode. This is useful in a multi-user environment with a
shared data sources. This ensure that you are editing
the most recent version of the entry.
Open shortcut Disable the command line warning message when using
session silent a shortcut.
OPTION DESCRIPTION
Use connection Only enable this option upon request from our Support
loader optimization team.
OPTION DESCRIPTION
Check focus content If an RDP session requests the focus, it will pull RDM to
on RDP activation the foreground, focusing it.
Confirm on drag and When session(s) are moved by drag and drop, a
drop move confirmation message will appear to confirm the move.
Disable favicon cache Disables the favicon cache and force RDM to always
fetch the favicon from the web. It is not recommended
to disable this feature for performance reasons.
Disable stack trace Disable the stack trace details when an error occurs in
Remote Desktop Manager. This is a security feature.
OPTION DESCRIPTION
Disable user gravatar Disable the fetching of the gravatar in the Administration
- Users window to improve the application performance.
Focus content on Set focus on the last embedded session when the
application activation application is activated.
Use application Use the installation folder to save the local play list that
directory for local has been created.
play list
Use application Use the installation folder to save the offline cache file.
directory for offline
cache
Use Devolutions Only modify this option upon request from our Support
updater team.
OPTION DESCRIPTION
OPTION DESCRIPTION
Use embedded Enabling this option will allow to use the browser
Microsoft Edge for Microsoft Edge instead of Internet Explorer for the
documentation and documentation and markdown.
markdown
Use embedded Enabling this option will allow to use the browser
Microsoft Edge for Microsoft Edge instead of Internet Explorer for the
overview panel overview panel.
Use embedded Enabling this option will allow to use the browser
Microsoft Edge for Microsoft Edge instead of Internet Explorer to display
release notes release notes.
Use embedded Enabling this option will allow to use the browser
Microsoft Edge for Microsoft Edge instead of Internet Explorer to display
reports the reports.
OPTION DESCRIPTION
Always show "Go Always display the "Go Offline" button in the status bar
Offline" button when Offline Mode is active.
Disable custom Disable the loading of any custom images in the tree
images view. Too many custom images could dramatically
increase the size of the data source and increase the
load time at the same time.
Disable document When left enabled, it will allow to switch from multiple
selector (CTRL + Tab) open tab connections.
Disable layout Disable manually configured tab layout and restore the
restoration layout settings on a RDM restart.
Enable tags textbox By default, the Tags field, in the Properties of an entry,
in properties can only be filled through the tag selector. With this
option, it lifts that restriction and you can write in the
Tags text box directly.
Hide last opened play Hide the last opened play list at startup in the play list
list in play list dialog.
management
Hide loading data Will hide the loading data sources progress bar when
sources progress bar loading.
Keep View Password Force the View Password window to display on top of
window on top all the RDM windows.
Use old entry sort Use the old entry sort from previous version of Remote
Desktop Manager.
INFORMATION
OPTION DESCRIPTION
SETTINGS
Select the Configuration File to import in Remote Desktop Manager and click on Open.
OPTION DESCRIPTION
Decide which options to replace with the one from RemoteDesktopManager.cfg that
you wish to import. Select Replace to replace an existing setting with a new one or
select Ignore if you want to keep the setting that you already have.
6.2.13.3 Export Options
DESCRIPTION
Use File – Options – Export Options to control the options to export from your
application configuration. Use this to easily transfer settings to another machine.
Sharing the exported file with a colleague would effectively give that
person whatever credentials you have set in your data source
definitions.
SETTINGS
REGISTRATION INFORMATION
OPTION DESCRIPTION
MISCELLANEOUS
OPTION DESCRIPTION
DATA SOURCES
All your configured data sources will be displayed in this section. Select the one(s) that
you want to include in the export. Please note that the content of the data source is not
exported.
When your settings are customized to your liking, click on Export. You will be
prompted to save your settings in a RemoteDesktopManager.cfg file.
6.3 Home
DESCRIPTION
The Home ribbon tab allows you to apply an action on the currently selected session.
The ribbon will display the following tab when the session is embedded.
Ribbon - Home
· Connect.
· Macros.
· Miscellaneous.
6.4 Actions
DESCRIPTION
The Actions tab is only available when a session is open. Available actions differ
depending on the action.
For our example we are running an RDP session. The ribbon will display the following
tab when the session runs with the Embedded (tabbed) display mode.
Ribbon - Actions
CONNECTION
OPTION DESCRIPTION
Reconnect Quickly close the session and then re-open it automatically. Use it
to update the resolution of your embedded RDP connections
when you resize the window.
LogOff Logoff the RDP session. See Logoff topic for more information.
ACTIONS
Option Description
Option Description
Execute.
Macro/Scrip Displays a window where you can select a macro or script, as well
t as the execution options.
Type Send the content of the clipboard over to the opened session.
Clipboard
DISPLAY
OPTION DESCRIPTION
Full Screen Display your session in full screen outside Remote Desktop
Manager.
Work Area This mode allows you to open the connection in full screen but to
Screen also have access to your local taskbar.
SETTINGS
OPTION DESCRIPTION
Keep tab on Your session tab will stay after a session disconnect. For
disconnect more information, see Keep Tab Opened topic.
Smart Sizing Enable or disable the RDP smart sizing. This setting will
determine whether or not the client computer can scale the
content on the remote computer to fit the window size of the
client computer.
Windows Key When enabling Windows key, it will send the function to your
on the Remote host instead of running it on your computer.
Computer
COMMANDS
This tab contains multiple type of commands and keystrokes combinations to affect the
current session in a variety of instances. As such, these commands depend on the
currently selected (and opened) entry. For a few example scenarios, refer to the
following topics:
· RDP
· VNC
· Telnet
SCREENSHOT
OPTION DESCRIPTION
Save to File Prompts for a file name and saves the capture to that file.
Save to File and Prompts for a file name and saves the capture to that file,
Open then automatically open the file using your default editor.
VIDEO
OPTION DESCRIPTION
6.4.1 Commands
6.4.1.1 RDP
DESCRIPTION
The commands for an RDP session allows you to send remote commands to your
host.
SETTINGS
RDP Commands
OPTION DESCRIPTION
View Only Prevent the session from receiving any input from the
keyboard or the mouse. This feature was requested to allow
monitoring while preventing manipulation errors. Use it to
have a read only access to the remote server.
6.4.1.2 VNC
DESCRIPTION
The VNC Commands allows you to send remote commands to your host. You will also
notice another toolbar holding more defined commands for a VNC session.
SETTINGS
VNC Commands
OPTION DESCRIPTION
View only mode This will prevent the session from receiving any input from
the keyboard or the mouse. This feature was requested to
allow monitoring while preventing manipulation errors. Use it
to have a read only access to the remote server.
Remote input Keyboard and pointer events will be sent to the server and
the local and remote clipboard will be synchronized.
Open file transfer Open the file transfer with the host computer.
OPTION DESCRIPTION
Open chat dialog Open a chat dialog with the host computer.
6.4.1.3 Telnet
DESCRIPTION
The actions for a Telnet session allows you to send remote commands to your host.
SETTINGS
OPTION DESCRIPTION
Clear Clear the scrolling display that precedes the current line.
Scrollback
OPTION DESCRIPTION
START RECORDING
OPTION DESCRIPTION
Ansi Will record all of the activity in the SSH session using the Ansi
Recording format. This can be replayed like a video using Tools - Tools -
Terminal playback (Ansi).
Log file Will record all of the activity in the SSH session using a text
(plain text) format.
6.5 Edit
DESCRIPTION
The Edit tab contains operations to quickly Add, Edit, Overrides, Batch Edit or Export
entries.
Ribbon - Edit
ADD
OPTION DESCRIPTION
Create Shortcut Link your entry to more than one group. For more information,
consult the text below.
Entries reiterated this way also have both folder paths indicated in their Folder field in
their properties, the paths are separated by a semi-colon.
EDIT
OPTION DESCRIPTION
OPTION DESCRIPTION
The Play List feature in Remote Desktop Manager is a lot like a music play list. It
opens a list of entries, in a specific order, automatically.The Play List can be used to
create groups of sessions for a specific task or for security reasons. You can build your
own Play List and start all entries from a Play List at the same time.
SETTING OVERRIDES
OPTION DESCRIPTION
User Specific Override properties of the selected entry with settings with
Settings settings specific to the current user. For more information,
please consult the Specific Settings topic.
BATCH
OPTION DESCRIPTION
OPTION DESCRIPTION
EXPORT
OPTION DESCRIPTION
Export Entry as Remote Export the selected entries in a Remote Desktop File
Desktop File (.rdp) (.rdp) format.
Export Selection (.rdm) Export the selected entries in a .rdm file that can
then be imported into any Remote Desktop Manager
data source. You could choose to include the
credentials of your entry in your export format and
secure your file with a master key.
6.5.1 Entries
6.5.1.1 Creating an Entry
DESCRIPTION
When getting started with Remote Desktop Manager, you must configure your entries.
There are many types of entries; you should know what third party or technology you
will use in order to choose the appropriate entry type(s) that you plan on configuring.
On the main application window, simply right-click on the name of the data source
and select Add from the menu. To initialize a new session, you can specify either the
type of session, or a template. You will be prompted to customize your settings in the
entry properties window.
You can also create a session by dragging and dropping an .rdp file in the main
application window. By doing so, Remote Desktop Manager will ask you whether to
import the content and create a new session, or create a session linked to the .rdp file.
It is also possible to drag and drop the LogMeIn desktop shortcut to create a LogMeIn
session.
You can also import entries by using the Import Computer Wizard, or by importing its
configuration directly from any compatible applications supported by our import tools.
You can learn more in the Import section.
6.5.1.2 Checkout system
DESCRIPTION
The Checkout system locks an entry while it is being used or modified. It prevents
users from using or editing an entry at the same time.
The checkout system can be enabled for Sessions, Documents, Credentials and
Information entries.
You can set the check out mode at the Vault, folder or entry level.
SECURITY SETTINGS
To access the check out settings, go into the Properties of an entry, folder or of the
root folder. Navigate to the Security Settings section.
CHECKOUT MODE
Checkout mode enables or disables the checkout system. It also decides how the
checkout mode functions.
OPTION DESCRIPTION
Root Inherits the checkout mode setting from the root folder.
Manual Users need to check out the entry manually prior to opening or
editing the entry. No action can be performed without checking
out the entry.
Inherited Inherits the check out mode from the parent folder.
OPTION DESCRIPTION
Optional Offers the option to check out an entry manually or use (open
and edit) the entry without checking it out.
CHECKOUT PROMPT
Checkout prompt sets if a user must enter a comment when they check out the entry.
Administrators can monitor the comments through the logs available on the entry or the
Activity Logs.
OPTION DESCRIPTION
Root Uses the checkout prompt setting from the root folder.
Yes Prompts the user for comment when they check out an entry.
OPTION DESCRIPTION
DESCRIPTION
Dynamic credential linking creates a single credential entry for a supported credential
manager and use this credential with any entry type that supports the Credential
repository.
Here is the list of all implemented credential managers that support dynamic credential
linking:
· 1Password
· Bitwarden
· Dashlane
· Devolutions Server
· KeePass
· Keeper
· LastPass
· PassPortal
· Password List
· Password Safe
· PasswordState
· RoboForm
· Secret Server
· Sticky Password
· TeamPass
· True Key
· Zoho Vault
SETTINGS
1Password Settings
2. When creating a entry, select Credential repository from the Credentials drop
down list, then select the credential entry created in the previous step. Notice that a
new action appears just below the credential selection drop down list.
4. The link changes to the name of the credential. To remove linked credential and
bring back automatic list prompt, simply click on the "X".
DESCRIPTION
Multiple options are available to use for Credentials in your Remote Desktop Manager
entries.
OPTION DESCRIPTION
Linked (Vault) Link your entry to use an existing Credential entry in the
same vault.
Embedded (Legacy) Embed a Credential entry in the entry itself. This mode
is deprecated and not recommended. Please review
other options available.
OPTION DESCRIPTION
Find by name (User Will search your User Vault for the name specified. If
Vault) the box is left empty, when launch, a Credential list will
open with all available Credentials entry from your User
Vault.
6.5.2 Edit
6.5.2.1 Play List
6.5.2.1.1 Create and Edit a Play List
DESCRIPTION
You can create Local or Shared play List in Remote Desktop Manager. There's several
methods to create or edit a Play List:
SETTINGS
OPTION DESCRIPTION
Local The Play List is saved locally and can only be accessed as
such. These can only be launched through the Play List
Management.
OPTION DESCRIPTION
User Vault The Play List is saved in your User Vault and can only be
accessed by the user. These can be launched through the
Play List Management or by using the entry itself.
ACTIONS
1. If you wish to pre-determine a list of entries, select them for your Play List in the
Navigation Pane.
2. On the Edit ribbon menu, click Play List, then select whichever setting you prefer.
OPTION DESCRIPTION
New Creates a new Play List directly, a window prompt will ask you
where you wish to save it and which selection you would like
to highlight.
Create from Brings up the window for creating a new Play List with all
Opened currently opened session already selected for the Play List.
Sessions You can select and remove additional entries if desired.
Add Selection to Prompts a window where you can select currently accessible
Existing Play Play Lists and adds the selection in the Navigation Pane to
List (X Entry) the Play List.
3. Choose if you wish to save your Play List locally, in a shared Vault or in your User
Vault. Saving it locally will prompt a different window. This window will contain
everything needed for a local Play List.
4. The next window lets you choose how you want your current selection or opened
sessions to affect your playlist.
OPTION DESCRIPTION
Selected Entries All currently selected entries in the Navigation Pane will
in Navigation already be selected for your Play List. You can still add and
OPTION DESCRIPTION
Opened Tabbed All currently opened sessions (Embedded only) will already be
Sessions selected for your Play List. You can still add and remove
entries to the Play List if you desire.
b) You can review, add or remove entries from the play list on the Connections tab.
And there you have it, your Play List is ready for use.
2. Select the Play List you wish to modify and click Edit.
SETTINGS
First, open your Play List Management Edit – Play List – Play List Management.
Default Mode
OPTION DESCRIPTION
OPTION DESCRIPTION
Open Overrides the display selection of entries inside the Play Lists
Embedded and launches them as Embedded (some entries might not
support this).
Select in Selects all entries the Play List contains in the Navigation
Navigation Pane Pane.
Execute Script This will prompt for you to select the Typing Macro
Against... (exclusively) you wish to execute against your Play list.
Launch at Here you can select a specific Play List you would like
startup launched whenever the application starts. You can also
default back to None or Last opened Connections.
DESCRIPTION
Specific Settings are used to override the properties of an entry. Several settings can
be overridden, such as the credentials or the display mode. There are two types of
Specific Settings: user Specific Settings and local machine Specific Settings.
· User Specific Settings override an entry's properties for a single user.
· Local Specific Settings override an entry's properties for all users of a specific
device.
An indicator icon is displayed in the dashboard when an entry with Specific Settings is
selected. Click on the icon to open the Specific Settings dialog.
WORKFLOW
In the majority of cases, editing the Specific Settings displays the following dialog:
Specific settings are context sensitive, and several settings might not
be available for some entry types.
6.5.4 Batch
6.5.4.1 Batch Edit
DESCRIPTION
The Batch Edit feature changes the settings of multiple entries in one operation. For
example, it can be used to remove or update the credentials of a group of sessions.
ADVANCED SELECTION
Select multiple entries by using the usual Ctrl/Shift + Left-click, etc. For a method with
a little more power, use the Advanced Search feature, which allows to select multiple
entries at once, based on the defined criteria. The advanced search is available in View
– Advanced Search. If required, you can achieve similar result with the Multi Vault
Advanced Search.
Advanced Search
Press on Select in Navigation Pane to select the same entries as in the Advanced
Search dialog. Then use Edit – Batch Edit to edit all the selected entries.
SETTINGS
You can choose to change a specific setting, for instance, the Host name.
Clear all the existing credentials of all the selected sessions or specifically the password
if desired.
Edit Sessions (General Settings) allows you to change the common settings of all the
selected entries.
Change settings that are is available only for specific session types, such as Microsoft
RDP.
Specific Settings can be modified in a batch if supported by the type of the edited
entries.
6.6 View
DESCRIPTION
The View tab is used to control different features regarding the panels, views, logs, and
layout of Remote Desktop Manager.
View
· Panels
· View
· Logs
· Layout
PANELS
OPTION DESCRIPTION
Vault Access the view mode of the Navigation Pane for the current
vault.
OPTION DESCRIPTION
VIEW
OPTION DESCRIPTION
Credential List Open a window to view the credential entries in the database.
VPN List Open a window to search for VPN entries in the database.
Tab Groups Open a docked window to browse through the various tab
groups.
LOGS
This section only appears when using an individual type data source.
OPTION DESCRIPTION
LAYOUT
OPTION DESCRIPTION
Top Pane Toggle the Ribbon (right-click the application header to bring
(Ribbon/Menuba it back or use Alt+F11).
r)
Grouped Tab Toggle the Grouped Tab Bar (must have group tabs to
Bar work).
OPTION DESCRIPTION
6.6.1 Panels
DESCRIPTION
In Remote Desktop Manager, the Panels section of the View tab allows you to browse
and search the vaults, sessions, and entries in the Navigation Pane.
· Opened Sessions
· PAM Dashboard
· Favorites
· Recent
· Task List
· Search
6.6.1.1 Vaults
DESCRIPTION
Vault are containers for your entries, your credentials, sensitive information, sessions,
and more.
· One main default Vault created for sharing entries to team members that you grant
access to. You can add and share more vaults in Administration - Vaults.
· One User Vault, which is user-centric and is used to store information such as
personal account credentials. The User Vault prevents users from using a non-
secured tool to manage their personal passwords at work. The User Vault can be
disabled in Administration - System Settings - User Vault.
The two vault types can also be found in the Navigation Pane menu.
DESCRIPTION
The Opened Sessions tab shows currently running sessions by type and for the local
machine only. The Opened Sessions can be accessed from the Navigation Pane
menu.
It is also located in the Panels section of the View tab in the Ribbon.
You can give the focus to an opened session by double-clicking it from the list. All of
the embedded sessions are listed and the external sessions will appear if Remote
Desktop Manager is able to discover the specific type of session.
· Entry states
With the SQL Server data sources, you can monitor currently running sessions,
provided they have been opened within Remote Desktop Manager.
For many reasons beyond our control, it is possible for a session to be terminated
without Remote Desktop Manager being aware that this has occurred. This can
happen, for example, if Remote Desktop Manager is not running when another
application ends. Therefore, any terminated session will remain listed in the log. You
may manually mark it as closed via the contextual menu by selecting Flag as Closed.
Some sessions, like SSH Port Forward, can be hidden from the dashboard when the
connection is established. When these sessions are hidden, they are not displayed in
the Local Sessions. Select Hidden Sessions from the combo box above the entry list
to display hidden sessions only.
Sessions can be configured to use a VPN Group. When multiple sessions are using the
same VPN group, it will appear in this section with the number of opened connections
using that same group.
VPN Groups
ENTRY STATES
You can see the status of the entries in the selected database.
There are different viewing options. You can choose to show entries from all users and
checked out, locked, or running entries.
NOTES
· Remote Desktop Manager tries to detect opened sessions even if they were not
launched from the application. It uses the name of the process to accomplish this
task.
DESCRIPTION
The PAM Dashboard feature can be found in View - Panels - PAM Dashboard.
In the PAM Dashboard, for every privileged account, it is possible to connect to the
account, copy the password, and manage the checkout/check-in process.
To access the user accounts, a PAM folder must first be selected. If you have multiple
folders, it might be helpful to use the filter bar to find the one you are looking for. Note
that these are the same folders as in your Devolutions Server console. You can go to
our Privileged Account Management in Devolutions Server topic to learn more about it.
When the folder is selected, all the accounts in that folder will appear. It is possible to
sort them by Name, Folder Path, Username, Account Type, or Checkout Status.
If there are multiple accounts in the folder, you can use the filter bar to display only the
accounts containing what you typed. You can push your search even further by filtering
the accounts by credential type.
DESCRIPTION
Create a Task List to keep track of work that needs to be done by the team. Toggle
the Task List pane in View - Panels - Task List.
You can perform a search to filter out the list of displayed tasks. You can search by
Due Date, Status, or Username.
Task List
CREATING A TASK
Add a task
2. Enter your task information, like the name of the task, the priority, the due date, the
description, etc.
Task Management
OPTION DESCRIPTION
OPTION DESCRIPTION
Status Set a status for the task. Select between the following:
· Open
· Assigned
· In progress
· Closed
· Done
· Cancelled
· Postponed
6.6.1.5 Search
DESCRIPTION
The Search function in the Panels section of the View tab allows you to search folders
and entries in the database you are currently in.
When using the Search function, a tree view is also displayed, showing exactly where
the results of your search are located in the database. Filter options are also available
when clicking on the ellipses button. Learn more about them in our Search/Filter topic.
It is also possible to do a Quick Search, which allows you to search through the
database without displaying the tree view. The results are therefore more concise.
Pro tip: Use the following shortcuts while selecting an entry for an even quicker search.
For information about other search methods, see our related topics:
· Advanced Search
· Documentation Search
DESCRIPTION
The Multi Vault Search feature of Remote Desktop Manager allows you to search for
folders and entries in all the vaults of the selected data source at once.
CRITERIA TYPES
The following criteria are available to refine your search: Connection type, Creation
date, Description, Folder, Last update date, Name, and Software.
Drop-down lists will appear when selecting certain criteria to give you more search
options.
Below is a description of what each of these drop-down lists type is used for.
Connection type Select from the list the connection type of the entries you are
looking for.
Creation date Select from the list the period of time, up to 90 days ago,
when the entries/folders were created or last updated. There
Last update date also is a custom option in the list that allows you to specify
dates to delimit your time period. This can be useful if you
want to search between specific dates or if the entries or
folders were created / last updated more than 90 days ago.
· Ends with - any name ending with the characters you have
entered.
RESULTS DISPLAY
The results are displayed when the Search button is pressed. Once done, the name of
all entries and folders and the vault in which they are located are shown in the results
field. The paths to entries or folders are also displayed above each result or result
group.
It is possible to select multiple entries at once by shift-clicking or all of them with the
Ctrl+A shortcut. Right-clicking one or more entries shows the same menu and options
as the Navigation Pane.
OTHER FUNCTIONS
The Select in Navigation Pane button, when pressed, takes you directly to the
selected entry or folder in the corresponding vault's Navigation Pane.
The Reset button clears all your search results and options, giving you a clean slate for
a new search.
DESCRIPTION
The Advanced Search allows you to search for entries and folders based on multiple
criteria in one vault at a time. To search multiple vaults simultaneously, please refer to
the Multi Vault Search topic.
It is possible to select multiple entries at once by shift-clicking or all of them with the
Ctrl+A shortcut. Right-clicking one or more entries shows the same menu and options
as the Navigation Pane.
SEARCH TAB
OPTION DESCRIPTION
OPTION DESCRIPTION
your search:
· Connection type
· Contact reference
· Creation date
· Custom field
· Description
· Domain
· Folder
· Host
· Is favorite
· Tags
· Name
· OS
· Password strength
· Serial Number
· Server role
· Status
· Username
· URL
OPTION DESCRIPTION
· Version
· IP
· MAC
· Software
Search Once you have selected your search criteria, click on Search
to display the search results.
There will be a drop-down list next to certain criteria fields (ex: Name) to give you more
search options:
· Starts with - any name beginning with the characters you have entered.
· Ends with - any name ending with the characters you have entered.
· Exact expression - any name exactly matching every character you have entered.
· Does not contain - any name that does not include the characters you have entered.
DESCRIPTION
USER INTERFACE
ELEMENTS DESCRIPTION
It is possible to select multiple entries at once by shift-clicking or all of them with the
Ctrl+A shortcut. Right-clicking one or more entries shows the same menu and options
as the Navigation Pane.
OTHER FUNCTIONS
The Select in Navigation Pane button, when pressed, takes you directly to the
selected entry or folder in the corresponding vault's Navigation Pane.
The Reset button clears all your search results and options, giving you a clean slate for
a new search.
6.6.2 View
DESCRIPTION
The View section in the View tab allows you to access different lists and information as
well as to quickly connect to a host.
QUICK CONNECT
The Quick Connect feature allows you to open an ad-hoc session by specifying the
host and session type. For more information, visit our Quick Connect topic.
ACTIVITY LOGS
The Activity Logs feature opens a tab containing information about user activity in the
selected data source. For more information, visit our Activity Logs topic.
LISTS
Multiple list types are available in the View section: Credential List,
Macros/Scripts/Tools List, Synchronizer List, and VPN List. These options open a
window showing a tree view of all entries of the specific entry type in the database. The
lists can be filtered using the search bar. Right-clicking on an item shows the same
menu and options as in the Navigation Pane.
TAB GROUPS
The Tab Groups feature opens a docked window showing a tree view of the various
tab groups. It is possible to select multiple tabs at once by shift-clicking or all of them
with the Ctrl+A shortcut. Right-clicking on one or more tabs shows more options.
The other Tab groups will only appear if a session that is part of a tab group (other
than the All tab) is active.
Although it is docked by default, the Tab Groups pane can be windowed, dragged,
and docked anywhere within Remote Desktop Manager.
To learn how to create a tab group, refer to our Grouped Tab Bar topic.
NOTIFICATION
The Notification feature opens a window showing the various notifications (such as
expired or about to be expired entries or tasks). Right-clicking on a notification shows
more options. If you double-click on an "expired license" notification, a browser page
opens to take you to your Devolutions Server account. Notifications can be sorted or
searched by Text, Source, Folder, Level, Type, Date, Time, or Days.
Although it is windowed by default, the Notification pane can be dragged and docked
anywhere within Remote Desktop Manager.
MESSAGE
The Message feature opens a window to let you access your messages. You can
double-click on a message to open it. Messages can be sorted or searched by Seen,
From, Subject, File, Date, or Expiration Date.
Although it is windowed by default, the Message pane can be dragged and docked
anywhere within Remote Desktop Manager.
DESCRIPTION
Quick Connect allows you to open an ad hoc session by specifying the host and
session type. This feature is accessible via the Quick Connect toolbar or in the View
section of the View tab in Remote Desktop Manager.
SETTINGS
Note that the Quick Connect toolbar only lets you specify a host, a
computer, and a session type.To have access to the other options
available in the windowed version, you have to use the Quick
Connect icon in the View section of the View tab.
When opening Quick Connect via the View tab, a window appears where you can
specify your session Host, Username, Password, and Domain.
Clicking on the first button next to the Host field opens yet another window where you
will be able to select a computer to connect to in a list.
Clicking on the second button next to the Host field shows a menu where you can
select your session type. It is also possible to create a Template and establish
connection with it. Visit this page to learn more about this option and consult this topic
on how to create a template.
OTHER FUNCTIONS
You can choose to check the Close after connect box at the bottom left of the Quick
Connect window if you want the window to close itself after you press the Connect
button and you are connected to the session.
DESCRIPTION
Activity Logs provide a robust logging solution. With this feature, it is possible to
monitor an open session for all users using Advanced Data Sources. The log is
available for specific sessions in the View - Activity Logs context menu, in the session
properties (Activity Logs pane), and in the Dashboard.
SEARCH
All activities in the data source are automatically displayed when opening the Activity
Logs without having to apply any settings. However, search fields are available and
can be useful when there are many activity entries. The results can be refined by
specifying the Date or a custom period, the Username, the Message, the Machine
name, the Folder, the On open comment, the On close comment, and the Ticket #.
It is also possible to choose between Local Time and UTC Time and to search in all
vaults or in the current vault only. When all the criteria have been chosen, the Search
button will apply them to the results.
Search fields
LOGS
The log contains all the CRUD operations (add, edit, and delete), passwords being
viewed, credentials being used by other sessions, etc. It is possible to right-click an
entry to access more options.
Logs
The information available for each activity line is presented in the following table.
OPTION DESCRIPTION
Message Indicates the action that has been executed on your entry or
session.
On Open The On Open Comment is defined in the Log tab of your session.
Comment
Log Date Indicates the date and time your session was opened or your entry
was edited.
End Indicates the date and time your session or entry was closed.
Date/Time
Active Time This information is only available for embedded mode sessions.
The active time of your session, meaning the time at which your
session was open in embedded mode and the time you were
active on your session, will be recorded. If your session is open,
but you are on the Dashboard tab, for example, and not on you
session tab, no active time will be recorded.
OPTION DESCRIPTION
6.6.3 Logs
DESCRIPTION
When using Remote Desktop Manager locally with an individual type data source, the
Activity Logs, normally found in the View section of the View tab, are not available. In
this situation, the Logs section appears in the View tab.
In the Logs section, you will find the Local Connection Logs feature, which is useful if
you still want to access your local logs. Clicking on it opens a window containing all your
local logs in chronological order (oldest to newest). You can scroll through the list to find
the logs you are looking for.
The buttons at the bottom of the window give you more options.
OPTION DESCRIPTION
Open Open the local folder on your computer where the logs are stored.
Clear Log Clear the logs from the Local Connection Logs window. The logs
are not erased from the folder.
Copy Copy the logs to your clipboard as they appear in the Local
Connection Logs window.
6.6.4 Layout
DESCRIPTION
The Layout section located in the View tab includes several options for changing the
display of Remote Desktop Manager. It is possible to enable/disable certain windows
and tabs to customize your experience.
Most tabbed windows can be moved and docked as you wish. This applies to the
default styles (Ribbon or Menu). To learn more about this feature, see our Docking
topic.
The table below lists each option available in this section and provides a brief
description of each.
OPTION DESCRIPTION
Top Pane Enable/disable the Top Pane. To make it reappear, simply right
(Ribbon/Me click on the Remote Desktop Manager title bar (the top bar), then
nubar) select the Top Pane (Ribbon/Menubar) from the menu. The
keyboard shortcut Alt+F11 can also be used to perform these
actions. See the Top Pane topic for more information.
OPTION DESCRIPTION
Grouped Enable/disable the Grouped Tab Bar. See the Grouped Tab Bar
Tab Bar topic for more information.
Status Bar Enable/disable the Status Bar. The keyboard shortcut Alt+F7 can
also be used to perform these actions. See the Status Bar topic
for more information.
Asset Enable/disable the Asset pane. This option allows you to view
Asset, Software, Hardware, Contact, and Purchase information
as well as Notes related to the entry. It is not possible to edit
information from this view.
Logs Enable/disable the Logs pane. See the Logs topic for more
information.
Task Enable/disable the Task pane. See the Task topic for more
information.
DESCRIPTION
Remote Desktop Manager is great for running many sessions at once by using its
embedded/tabbed display mode. It's especially true when using multiple remote control
technologies at the same time. No longer will you have to dig in your task bar to locate
the session of interest, you have them all running in tabs within the same tool used to
launch them.
But when you reach a certain number of running sessions, it may become difficult to
identify them using only their name. To improve user experience, the Grouped Tab
Bar feature was created to filter the tab pages.
To enable the Grouped Tab Bar, navigate to View - Layout in the ribbon, then select
Grouped Tab Bar.
The Grouped Tab Bar will only appear if a session that is part of a
Tab group (other than the All tab) is active. To make it show at all
times, check the Always show grouped tab bar box in File -
Options - User Interface - Advanced.
The Tab Groups feature in View - View lets you see a tree view of
the various tab groups. For more information, visit the View topic.
The Tab group settings are found in the User Interface side menu of your session
properties. The Properties... option can be found when right-clicking on an entry.
The Tab group field lets you choose between a custom or inherited tab group. If you
want to specify a custom name, you can simply type a name or choose an already
existing one in the Tab group name field to create a tab group when launching an
instance, then click on OK.
When the All group tab is selected, it performs no filtering. All running sessions are
visible in this tab.
When a different group tab is selected, it hides all the sessions that do not match with
the filter. In the example below, only two sessions appear in the custom Windjammer
group tab.
6.6.4.2 Attachments
DESCRIPTION
Files are attached to an entry and are stored directly in the database.
To enable the attachment pane, navigate to View - Layout in the ribbon, then select
Attachments.
Attachments
The attachment type and size are limited only by your bandwidth and the data source.
You can also view a saved attachment:
The refresh button allows you to update directly the selected document. Use it to save
your local modifications.
ACTIONS
Use the toolbar above the attachments list to manage the selected attachment.
Attachments toolbar
OPTION DESCRIPTION
6.6.4.3 Logs
DESCRIPTION
The Logs feature is similar to Activity Logs, but it only provides information about the
selected entry. Logs are available from the context menu View - Layout - Logs.
FUNCTIONS
The log entries can be filtered by Date or by using a custom time period, specifying
whether it is Local Time or UTC Time.
It is also possible to enable the Show live sesison only (auto refresh) and Show
user specific settings logs options by checking the appropriate box.
LOG COMMENT
Clicking on the Insert Log Comment button opens a window that allows you to add a
comment to the log while specifying a ticket number, a start date (and an end date, if
desired), and notes.
GENERATE A REPORT
Clicking on the Generate report button opens a window that allows you to generate a
report of the logs while specifying the time period, the type of time (Local Time or UTC
Time), and, optionally, an On open comment, an On close comment, and a
Message. When finished, clicking the OK button generates a report that can be saved,
exported (in CSV, HTML, Xlsx, or XML format), or printed.
LOGS
Le journal contient toutes les opérations CRUD (ajout, modification et suppression), les
mots de passe affichés, les identifiants utilisés, etc. Il est possible de cliquer sur une
entrée avec le bouton de droite pour accéder à plus d'options.
The information about entries is the same as in Activity Logs, except that Folder,
Connection, Vault, and Connection Log ID are not available in Logs since the
information is specific to an entry only. For a description of the available information,
see the Activity Logs topic.
6.6.4.4 Task
DESCRIPTION
The Task feature is similar to Task List, but it applies only to the selected entry. Tasks
are available from the context menu View - Layout - Task.
FUNCTIONS
Create tasks to keep track of the work that needs to be done per entry. You can Add,
Edit, and Delete a task using the corresponding icons. It is also possible to Assign a
User to a task, apply a Filter and Refresh the page. The refresh can be done
automatically by checking the Auto refresh box.
CREATION OF TASKS
For more information on how to create a task, see the Creating a Task section of the
Task List topic.
TASK FILTER
Clicking on the Filter icon opens a window that allows you to filter the tasks in the entry
by Due Date, Status or Username.
TASKS
The information available is as follows: Assigned To, Name, Status, Priority, Due
Date, and Creation Date. For more details about this information, please refer to the
Task List topic.
6.7 Administration
DESCRIPTION
The Administration tab allows to manage settings and users of a data source, view
reports such as the activity logs, and much more. This tab is only available to
administrators of the data source.
Ribbon - Administration
MANAGEMENT
OPTION DESCRIPTION
Security Groups Security Groups are now a Legacy option, and although we
(Legacy) have left documentation in the online help to help users
identify it, we strongly recommend switching to User Groups
instead.
REPORTS
OPTION DESCRIPTION
Reports Open the Reports section to select which type of report best
suit your current needs.
Deleted Entries Open a log of all Deleted Entries (since last clean up).
SETTINGS
OPTION DESCRIPTION
Vault Settings Opens the Vault Settings. The Vault Folder is the one at the
top of the navigation pane (in Tree View). It is the one from
which all entries and folder stem. By default, lower level
folders inherit settings and security from parent folder until
reaching the Vault. Therefore, using permissions on the Vault
folder allows to secure all entries below the Vault level. Refer
to Default security for entries for more information.
System Settings Opens the System Settings. There are many features here, all
(Data Source meant to help you customize your data source and security
Settings) needs. Remember that these settings applies to all users that
have access to the data source.
OPTION DESCRIPTION
CLEAN UP
OPTION DESCRIPTION
Clean Up Perform a partial or full clean up of the Activity Logs. You also
Activity Logs have the option to clean up the Administration Logs if
desired.
Pack Data The Pack Data Source (Optimize) feature analyzes all entries,
Source compress and save them, thus saving space in your data
(Optimize) source.
6.7.1 Management
6.7.1.1 User Management
DESCRIPTION
The Users Management allows to create and manage users and their privileges. You
can set the default privileges on the user type in Data Source Settings (System
Settings). Remote Desktop Manager offers advanced user rights management that
allows for restricting access to entries. Please note that availability of some features
depends on the active data source.
MANAGE USERS
To create, edit, delete, rename or otherwise manage users as a whole, simply use the
buttons in the toolbar.
GENERAL
OPTION DESCRIPTION
Username Enter the username for the user. When using Integrated
Security the user must be selected from the directory.
OPTION DESCRIPTION
User license type Select the license type of the user. Select between:
· Default
· Connection Management
· Password Management
Full name Enter the First name and Last name of the user.
INFORMATION
The Information section allows to store information regarding the users, such as their
name, address, and more. The Information section is divided in three sub-sections:
Details, Address, Phone.
USER GROUPS
OPTION DESCRIPTION
User Groups Check the Is Member box to assign the user groups to
the user. Consult User Groups Management topic for
more information.
VAULTS
Select which repositories the user has access to. For more information, please consult
the Vaults topic.
APPLICATION ACCESS
The application access section allows to restrain access to Remote Desktop Manager
or Devolutions Web Login.
OPTION DESCRIPTION
Remote Desktop Select if the user can access to the data source from
Manager Remote Desktop Manager.
Devolutions Web Select if the user can access to the data source form
Login Devolutions Web Login.
SETTINGS
Allow the user to enable the Offline Mode on the data sources. This also depends on
the data source being configured to allow it. There are 4 modes available:
OPTION DESCRIPTION
Cache only Allow to save a cache of the data source but not the offline mode.
Read-only A read-only cache. The user will not be able to edit data in the data
source. This mode is allowed for Advanced Data Sources only.
DESCRIPTION
When creating users in Remote Desktop Manager, four types of user are available.
Basic rights are granted to the created users depending on their type.
TYPE DESCRIPTION
User Grant all the basic rights to the user (Add, Edit, Delete).
TYPE DESCRIPTION
Read only user Grant only the view access to the user.
RIGHTS
When setting a user to the Restricted User type, rights must be granted manually.
These rights have an immediate influence on which actions the user can perform on
unsecured entries. Therefore, rights must be granted for users to be able to perform
actions on entries, as permissions cannot override the absence of right.
Once rights are granted, they can be restricted with the User Groups Based Security or
Security Groups.
The Add right also displays the Add in Vault option. This must be enable for users to
be able to add entries into the Vault folder of the data source.
DESCRIPTION
Integrated Security is a Microsoft technology, which uses the credentials of the current
Windows session and send them automatically to the remote resources for
authentication.
SETTINGS
To use the Integrated Security, enable the Integrated Security box in the User
Management window. The Password field is disabled because the operating system
will provide a cached copy automatically.
Integrated Security
When the option is activated, an ellipsis button either appears or is enabled. Click this
button to display the Select User dialog.
Select User
When using Integrated Security, the currently running windows session must be from a
user of the domain. If you need to use other credentials, Remote Desktop Manager
must be started using the RUNAS command as described in Running Remote Desktop
Manager as Another User.
6.7.1.2 User Groups Management
DESCRIPTION
User Groups in Remote Desktop Manager manages multiple users at the same time by
grouping them. The management of permissions granted to user groups are quite
similar to the corresponding notions for users, but instead of a single user, they apply to
all users to which you've assigned the user groups.
User Groups in Devolutions Server are in fact links to Active Directory groups. By
leveraging Active Directory integration you can easily define access rights for all
domain users in your organization. Once a domain user log in the Devolutions Server
data source, their user account will be created if needed and users rights will be
controlled by the defined groups.
For more information please see Devolutions Server User Groups Management.
User Groups in Remote Desktop Manager are mainly used to group users. You can
assign multiple user groups to each user. The end result is the union of all permissions
given to the user groups.
To create a user groups, in the User and Security Management window, click the
Add User Group button in the User Groups section. From the same menu, you can
also edit, assign users, delete or refresh.
DESCRIPTION
Vaults are containers that divide the data source into multiple compartments.
We recommend using vaults for improved organization and security.Vaults also help
performance as they limit the amount of entries that load at once.
Vaults are available with Advanced Data Sources: Devolutions Server, Azure SQL and
SQL server.
· Create vault
· Vaults shortcuts
CREATE A VAULT
In the navigation pane, use the vault list to move between vaults. Change the location
of the vault list in File – Options – User Interface – Vault Location.
3. Select the vault you want to move the entries to, and click Next.
4. Choose the entries you want to transfer to the new vault, and click Transfer.
Vaults simplify user management because Active Directory groups define who has
access to a vault. These Active Directory groups are known as User groups in
Remote Desktop Manager. In general, most user groups have access to a couple of
vaults, while some groups will only have access to one vault. Limiting access to vaults
minimizes the need to set permissions on lower-level folders.
2. On the User and Security Management window, choose the vaults, then click
Assign User groups.
3. Choose which user groups have access to the vaults: select the Is Member box.
VAULTS SHORTCUTS
We recommend administrators and users who have access to multiple vaults create
vaults shortcuts to navigate between vaults.
If you use vaults shortcuts, the vault should only contain folders. Do not save entries at
the vault root.
Each vault contains a shortcut that returns the user to the main vault.
3. In the Name box, enter the name of the vault you are creating a shortcut to. Save
the shortcut in a folder.
4. To find the Vaults ID, click the ellipses button. Enter a folder name (case sensitive)
to create a shortcut to a specific folder.
We recommend removing the data source drop-down list when using vault shortcuts.
Then the vaults list can be moved above the Navigation Pane.
You can find the options in File - Options - User Interface - Data Sources and
Vaults.
6.7.1.4 Licenses
DESCRIPTION
Managing Remote Desktop Manager registration globally for all your users can be
done with a license serial stored in an advanced data source such as Devolutions
Server, Microsoft SQL Server or Azure SQL.
With license stored in an Advanced Data Source, there is no need to register Remote
Desktop Manager as the license serial is retrieved directly from it. When launching the
application for the first time, add the data source containing the serial.
Administration - Licenses
4. Optional: Check the Auto assign new users, to automatically provide the RDM
serial to all newly created users.
5. Click OK to save.
Your license is now saved in the advanced data source. Follow this next topic to
automatically Assign Licenses to selected users, removing the need to interact locally
with their Remote Desktop Manager.
DESCRIPTION
1. Go to Administration - Licenses.
If you have more than one license, our Sales team can provide a co-
terminated renewal to facilitate your license management.
3. In the Assigned column, check next to each user you need to grant a license or use
the global action buttons.
This step will automatically assign the license to the selected users,
removing the need to interact with each user.
4. Click OK to save.
6.7.2 Reports
6.7.2.1 Reports
DESCRIPTION
Generate Report
From this window, you can browse and select a wide variety of Report Types. Explore
to your heart's content.
Once Generated, a report will provide you with all the information you selected during
this step. These final results can take various shapes and have different features (such
as editing a specific entry or printing the result) depending on what the report actually
is.
DESCRIPTION
The Export Reports is a way to execute and export reports through a command line.
You can use this feature in a shortcut or in a batch file and use the Windows task
scheduler to execute it.
You will be able to export Data Report, Inventory report as well as most of the reports
found in our Generate Report list except for the Password Usage and Security Group.
SETTINGS
For Reports containing settings, you will have to start with exporting your report settings
to create the *.rdr file that the command line use to generate the reports. Here is a list
of reports containing settings:
1. Select your Report in Administrations – Report and then select the option Export
Settings in the More text button. It will create an *.rdr file containing all your report
settings. This is also where you Report ID is located (this will be useful later on).
Export Settings
PARAMETERS DESCRIPTION
/reportoutput Specify the path to save your report and the name for
the newly generated report.
To find your Data Source ID and the Command Line use to start Remote Desktop
Manager edit one of your session from your data source and select the Advanced
section.
Here is a list of types of Reports you can find in Remote Desktop Manager and the
name to enter in the command line to generate the report:
Password PasswordComplexity
Complexity
DESCRIPTION
The Administration – View deleted option allows you to view the deleted entries as
well as restoring them.
SETTINGS
The Deleted Entries will generate a list containing all the entries previously deleted
from your data source. You may resurrect an entry, meaning it will become an active
entry again and will be shown in your data source. You may also chose to permanently
delete your entries, once you have permanently deleted your entries you won't be able
to resurrect them afterward.
Deleted Entries
OPTION DESCRIPTION
You can use the Right-click button on one or several lines to export them in CSV,
HTML or XML format.
6.7.3 Settings
6.7.3.1 Vault Settings
6.7.3.1.1 Default security for entries
DESCRIPTION
· Custom allows to select specific user groups/users for each permission below.
Vault – Permissions
To confirm the change, edit an entry below the Vault and navigate to the Security –
Permissions section. All permissions set to Default inherit the value from Data Source
Permissions (System Permissions) or the user. Inherited values are displayed next to
the permissions.
GENERAL
The General section allows to manage the availability of different features related to
the database.
These settings applies to all users that have access to the data source.
GENERAL DESCRIPTION
Allow database Allows logs and deleted history to be cleaned up. For more
clean up information, please consult the Clean up topic.
Allow shortcuts Allow the reiteration of entries through the shortcut feature.
GENERAL DESCRIPTION
Allow virtual Allow to store entries in virtual folders. (Not supported with
folders Devolutions Server.)
Allow embedded Allow embedded Credential entry in the entry itself. This
credential source mode is deprecated and not recommended. Please review
mode (legacy) other Credentials options available.
Add entry mode Select if users are prompted to choose a template when
creating a new entry. Select between:
· Default
· No template selection
COMMENTS DESCRIPTION
Allow log Enable the log comment editing for all users.
comments editing
COMMENTS DESCRIPTION
Minimum length Set the minimum length (in characters) allowed for
(char) comments.
Maximum file size Limit the size of attachments and document entries to avoid
(MB) to over load the data source.
6.7.3.2.1.1 Security
SETTINGS
Create Vault with Automatically secure the Vault settings when creating a
restricted access by repository. Therefore, the permissions settings are set to
default Never.
Force data source 2- Require the users to have a 2-factor configuration applied
factor configuration on the data source. Not shown with Devolutions Server
as 2FA set elsewhere.
Use legacy security Use the old system of managing privileges: Security
groups (deprecated).
TIME-BASED DESCRIPTION
USAGE
Time of day Select the hours which the data source is limited to.
Select between:
Time of week Select which days the data source is available for. Select
between:
TIME-BASED DESCRIPTION
USAGE
· Any day: the session can be used any day of the week
or week-end.
Time Zone Select the time zone you are currently in.
DESCRIPTION
Accessing passwords stored in your data source by querying the underlying database is
not possible because of the encryption we apply on the passwords. For those of you
that need to access passwords directly in the database, for example by a CRM system,
we have created a way to achieve this.
SETTINGS
The session information, which is an XML structure, is stored in the Data field of the
Connections table in the underlying database.
However, getting the encrypted password from the database requires the Allow
password for external system to be configured.
Enter an encryption key in the Key field. Once a key is provided it will cause the system
to extract a copy of the password from our XML structure, this will then be re-encrypted
using the key you have provided and stored back into the UnsafePassword field of
the Connections table.
Security Provider
DECRYPTION CODE
try
{
TripleDESCryptoServiceProvider tripleDesCryptoServiceProvider = new TripleDESCr
MD5CryptoServiceProvider cryptoServiceProvider = new MD5CryptoServiceProvider()
tripleDesCryptoServiceProvider.Key = byteHash;
tripleDesCryptoServiceProvider.Mode = CipherMode.ECB;
string strDecrypted =
Encoding.UTF8.GetString(
tripleDesCryptoServiceProvider.CreateDecryptor().TransformFinalBlock(
byteBuff, 0, byteBuff.Length));
return strDecrypted;
}
catch (Exception)
{
return null;
}
}
6.7.3.2.2 Application
DESCRIPTION
Operating systems Enable access to the data source from the selected
operating systems.
GENERAL DESCRIPTION
Disable entry drag- Disable entries drag and drop from one folder to
and-drop another. This setting is useful for avoiding accidental
drag and drop.
Disable quick Disable the Quick Connect feature for all users of the
connect data source.
Disable stack trace Disable the stack trace details when an error occurs in
Remote Desktop Manager. This is a security feature.
PASSWORD DESCRIPTION
PASSWORD DESCRIPTION
Use web or html Enter an URL to use as the application's welcome page.
welcome page
SECURITY DESCRIPTION
Go into offline mode Will switch RDM from online to offline mode if available
if available when when disconnecting.
disconnecting
SECURITY DESCRIPTION
6.7.3.2.2.1 Offline
DESCRIPTION
OPTION DESCRIPTION
Offline mode Set the global data source Offline Mode availability. The
offline mode is useful when using a VPN connection that
makes using local network impossible.
Expiration Number of days before the offline cache expires. You must
go online prior to the end of that period to re-validate the
data.
OPTION DESCRIPTION
Prompt for Force the user to provide their credentials before going
credentials before offline.
going offline
Prompt for 2FA Force the user to provide their 2FA before going offline.
before going
offline
SETTINGS
OPTION DESCRIPTION
Type Select entry types to exclude. Excluded entries will not be in the
Availability Add New Entry window.
6.7.3.2.2.3 Version Management
DESCRIPTION
The Version Management allows the administrators to manage the data source
availability in other versions of Remote Desktop Manager.
Version Management
OPTION DESCRIPTION
Minimal version custom Enter a custom message for the minimal version
message notification.
Maximal version custom Enter a custom message for the maximal version
message notification.
Disable checks for Disable the auto update notification message. Use
updates this to manually update the application and prevent
from getting notified when new versions are
available.
DESCRIPTION
ENTRIES
OPTION DESCRIPTION
OPTION DESCRIPTION
Add in root Allow users/user groups to create entries in the root folder.
MISCELLANEOUS
OPTION DESCRIPTION
OPTION DESCRIPTION
View deleted Allow users/user groups to view and restore deleted entries.
entries
TOOLS
OPTION DESCRIPTION
MANAGEMENT
OPTION DESCRIPTION
OPTION DESCRIPTION
DESCRIPTION
The Security Provider allows for encrypting the data source content. To access the
security provider, navigate to Administration – Security Provider.
SETTINGS
Security Provider
Security Type
OPTION DESCRIPTION
Default This is the legacy security provider. The data is encrypted if the
entry configuration is set accordingly in the advanced settings of
the entries.
OPTION DESCRIPTION
SHARED PASSPHRASE
If the passphrase is lost, nothing that can be done to recover the data.
When using a passphrase, always copy it to a secure location.
Entries configuration data is encrypted using a mix of a key stored in Remote Desktop
Manager and the passphrase you've entered.
The passphrase is required only when configuring the data source. A policy can be
enabled to always prompt for the passphrase when connecting to the data source.
When configuring a security provider with a shared passphrase, you have the choice of
whether or not you wish to save it in the registry. Remote Desktop Manager will try first
to save it on the LOCAL_MACHINE, if unable it will save it in the CURRENT_USER
instead.
· HKEY_CURRENT_USER\SOFTWARE\RemoteDesktopManager<Datasource
ID>.shk
· HKEY_LOCAL_MACHINE\SOFTWARE\RemoteDesktopManager<Datasource
ID>.shk
If the option is not enabled, then the passphrase is saved locally at the following
location:
· %LOCALAPPDATA%\Devolutions\RemoteDesktopManager<Datasource ID>.shk
· %APPDATA%\Devolutions\RemoteDesktopManager<Datasource ID>.shk
In a portable installation of RDM, the passphrase will be saved at the same location as
the portable Remote Desktop Manager instance.
CERTIFICATE
OPTION DESCRIPTION
· Current user
· Local machine
· Address book
· Authorization root
· Certificate authority
· Disallowed
· My
· Root
· Trusted people
OPTION DESCRIPTION
· Trusted publisher
CREATE CERTIFICATE
OPTION DESCRIPTION
OPTION DESCRIPTION
name
Key size (bits) Indicate the key size (bits) of the certificate. Select between:
· 384
· 512
· 1024
· 2048
· 4096
· 8192
· 16384
Save to file Save the certificate as a pfx file and secure this certificate with a
(pfx) password.
Save to Indicate the location and the store to save the certificate.
certificate
store
6.7.4 Clean up
6.7.4.1 Clean Up Deleted History
DESCRIPTION
The Deleted History permanently delete entries that had been previously deleted. Full
history is always preserved because every entry "version" is kept in historical tables.
SETTINGS
1. Select prior to which date you wish to permanently delete your deleted entries.
Confirmation window
DESCRIPTION
The Entry History deletes the history attached to your entry, you can find the history
by right clicking on your entry and selecting View – Entry history.
SETTINGS
1. Select prior to which date you wish to permanently delete your Clean up entry
history.
2. Another window will appear to confirm your choice of deleting all the history prior to
the chosen date.
Confirmation window
DESCRIPTION
The Clean Up Activity Logs will delete your data source's Activity Logs, you also have
the option to clean up the Administration logs and set up a back up if desired..
SETTINGS
1. You must confirm your choice prior to permanently deleting your data source logs.
2. Once you have entered your Backup file name and proceeded with the clean up a
delete log result window will appear.
DESCRIPTION
When holding a great number of entries in your data source it is a best practice to
compress them to avoid slowness issues when using your data source. The Data
Source (Optimize) will analyze all your entries, compress them and then re-saves
them, thus saving space in your data source.
SETTINGS
1. Open the data source you wish to optimize. In Administration click on Pack Data
Source (Optimize) and then click on Analyze.
2. Once the Analyze is completed click on Optimize to proceed with the optimization of
your data source. You can select which Vault you wish to Analyze and Optimize, or
use the Optimize All feature to perform the Optimize action on all available Vaults.
6.7.5 Import/Export
6.7.5.1 Import Multiple Vaults
DESCRIPTION
The Import Multiple Vaults (.rdx) function lets you import one or more vaults at a
time. Learn how in this topic.
The vaults you want to import must have been previously exported
using the Export All Vaults (.rdx), because they need to be in the
.rdx format.
To learn more about other import functions, see our Import topic.
DESCRIPTION
The Export All Vaults (.rdx) function lets you export one or more vaults at a time.
Learn how in this topic.
To learn more about other export functions, see our Export topic.
6.8 Tools
DESCRIPTION
The Tools tab contains your Add-on and Extensions manager as well as your
Devolutions Server Console, Generators and multiple useful tools.
GENERATORS
OPTION DESCRIPTION
Password Opens the Password Generator window. You can use this to
Generator generate password according to pre-determined criteria for
better security.
SSH Key Launches the SSH Key Generator. SSH keys provide a
Generator secure way of logging into a virtual private server with SSH
than using a password alone.
Certificate Launches the Certificate Generator. With this you can create
Generator a self-signed certificate, which is an identity certificate that is
signed by the same entity whose identity is certified.
Port Generator Launches the Port Generator. With this you can generate
ports for your connections.
TOOLS
OPTION DESCRIPTION
Entry Security Opens the Entry Security Analyzer. This is used to evaluate
Analyzer the strength of passwords stored in the data source.
SSH Key Agent Opens the Key Agent Manager. This is used to hold all your
and Manager SSH Keys in memory, already decoded and ready for them to
be used.
OPTION DESCRIPTION
MANAGERS
OPTION DESCRIPTION
6.8.1 Generators
6.8.1.1 Password Generator
DESCRIPTION
You can also create password generator templates to generate passwords. After you
have selected your mode and settings, you can then create your template.
MODE
DEFAULT
ADVANCED SETTINGS
READABLE PASSWORD
Generate passwords that are readable but are not actual words.
USE A PATTERN
Press the button and select any pattern you need to create the passwords, you can
also exclude certain characters if desired. A list of the most recent used pattern will
also be created.
Bracket b ()[]{}<>
Lower-Case c bcdfghjklmnpqrstvwxyz
Consonant
Digit d 123456789
Lower-Case l abcdefghijklmnopqrstuvwxyz
Letter
Punctuation p ,.;:
Upper-Case U ABCDEFGHIJKLMNOPQRSTUVWXYZ
Alphanumeric 0123456789
Lower-Case v aeiou
Vowel
Upper-Case z BCDFGHJKLMNPQRSTVWXYZ
Consonant
Upper-Case Z AEIOU
Vowel
PRONOUNCEABLE PASSWORD
Generate passwords that are pronounceable, but are not actual words.
STRONG PASSWORD
DESCRIPTION
SSH keys provide a secure way of logging into a virtual private server with SSH than
using a password alone. While a password can eventually be cracked with a brute
force attack, SSH keys are nearly impossible to decipher by brute force alone.
SETTINGS
OPTION DESCRIPTION
Key size You can choose your SSH Key size between:
OPTION DESCRIPTION
Load Private Key This feature will allow you to import a previously saved
SSH Key.
Save Public Key Saving the public key will generate a *.pub file. Simply
enter a file name when prompted.
Save Private Key You will have the option of saving your Private Key in
different format, choose between:
If you did not specify a passphrase you will have to confirm that you do not wish to use
a passphrase.
DESCRIPTION
The Certificate Generator allows you to create a self signed certificate which is an
identity certificate that is signed by the same entity whose identity is certified.
SETTINGS
OPTION DESCRIPTION
Key size (bits) Indicates the key size (bits) of the certificate. Select between:
· 1024
· 2048
OPTION DESCRIPTION
· 4096
· 8192
· 16384
Save to file Save the certificate into a *.pfx file and secure this certificate
(pfx) with a password.
Save to Indicate the location and the store to save the certificate.
certificate
store
· Current user
· Local machine
· Address book
· Authorization root
· Certificate authority
· Disallowed
· My
· Root
· Trusted people
OPTION DESCRIPTION
· Trusted publisher
OPTION DESCRIPTION
OPTION DESCRIPTION
DESCRIPTION
The Port Generator allows you to generate ports for your connections.
SETTINGS
Port Generator
OPTION DESCRIPTION
Include well known Include ports from range 0 to 1023. They are the well-
ports known ports or system ports. They are used by system
processes that provide widely used types of network
services
Include registered Include ports from range 1024 to 49151. They are
ports assigned by IANA for specific service upon application
by a requesting entity. On most systems, registered
ports can be used by ordinary users.
Include ports used by Include the ports that are already used by other
others sessions sessions.
6.8.2 Tools
6.8.2.1 Devolutions Localizer
DESCRIPTION
Devolutions Localizer is our custom translation tool for our applications. We welcome
you to contribute to the Devolutions community by translating our tools for the benefit of
other users just like you around the world.
TRANSLATE
1. In File - Languages select the language to translate, then click on the Translate
button.
2. Choose from which file to translate, then in the lower part, you will be able to filter
and review the content already translated or in need of translation.
3. To start select a Resource line in the bottom list and click Translate. The original
text will appear in the left window, type the translated text in the right window.
4. When done, change the status to Translated for this resource and click Save
Changes. This will send your translation to our server and it will be deployed with
the next release version of our applications.
PREVIEW
You can preview your changes in Remote Desktop Manager prior to the release or
view the ones already in place but not yet released.
2. In the Devolutions Localizer Dashboard click Deploy - Generate & Start to view
your changes, or Start (use existing) to view unreleased changes.
To change the language of your Remote Desktop Manager application to reflect the
one you were translating go to File - Options - User Interface - Language. Select the
language and click OK. You will need to restart the application for this to take effect.
KEYBOARD SHORTCUTS
· CTRL+E: Mark current resource as Use original, this ignores any translation text and
will display the original value as is.
DESCRIPTION
The Entry Security Analyzer evaluates the strength of passwords stored in the data
source. To access the password analyzer, navigate the Tools tab.
A strenght password control is also displayed under most password fields of entries.
The Entry Security Analyzer follows a set of rules to determine the strength of the
password with a score from 0 to 100. There are two categories of rules.
REINFORCE
WEAKENING
SETTINGS
OPTION DESCRIPTION
Show all Shows you all the entries in your session, including those without
entries password.
Show
Show if the password has been pwned. A pwned password is a
compromised
password that has been exposed in data breaches (i.e., they are
password
owned/pwned by hackers).
(pwned)
DESCRIPTION
The Key Agent Manager is used to hold all your SSH Keys in memory, already
decoded and ready for them to be used. It has the same use as Pageant (SSH Key
Manager) has for Putty except that the Key Agent Manager is used with Remote
Desktop Manager.
SETTINGS
1. When opening the Key Agent Manager you will notice at the bottom right that the
agent is not running you will need to click on Start Agent. If you wish to always have
your Key Agent running you can activate the option in File – Option – Key Agent –
Start agent on application start.
2. Click on Add key and select the file to open your SSH key.
3. All your added SSH Key will appear in your Key Agent Manager.
4. In your SSH Shell Session in the General tab enter a Username and leave the
Password field blank.
5. In the Private Key tab of your SSH Shell session leave the option for the Private
Key to No Private Key.
6. In the Advanced tab of your SSH Shell session activate the option Use Agent. The
Use Agent automatically take the information of the SSH Key kept in your Key Agent
Manager.
When creating new Private Key credential entry in Remote Desktop Manager you have
the option of loading them automatically in your Key Agent Manager.
2. In the Advanced tab of your Private Key entry activate the option Automatically
load to key agent.
DESCRIPTION
Since its release, this highly-requested feature has become very useful in solving user
requests. A quick search through our forum reveals many usages of the cmdlets, such
as automating the creation of Windows Start Menu shortcuts for every RDM session.
To learn more, you can find full RDM cmdlet documentation available via the
PowerShell Scripting topic or directly in PowerShell using the Get-Help cmdlet.
SETTINGS
You will find on the Forum multiple PowerShell script to import edit or interact with the
Remote Desktop Manager data.
PowerShell
DESCRIPTION
SETTINGS
Chocolatey Console
OPTIO DESCRIPTION
N
USAGE
Installation window
When the installation is completed you will see a check mark in the Installed column.
Installation Complete
DESCRIPTION
The local RDP settings and the RemoteApp settings are available from Tools – More
Tools - Local RDP/RemoteApp Manager.
If you run Remote Desktop Manager on a Windows Server 2008 machine the TS
RemoteApp MMC console will be launched.
If you are running on Windows Vista, the RemoteApp console built into Remote
Desktop Manager will be launched because RemoteApp functionality is available in
Windows 7 but not the MMC console. Therefore instead of having to modify the
required registry entries you can use the Remote Desktop Manager RemoteApp
Manager.
SETTINGS
REMOTE DESKTOP
REMOTEAPP SETTINGS
RemoteApp Settings
UDP SETTINGS
Enable or disable UDP (User Datagram Protocol) locally on your computer. UDP is a
communication protocol that offers a limited amount of service when messages are
exchanged between computers in a network that uses the Internet Protocol (IP).
USAGE
3. Create a new RDP session and select the Programs tab. Enable the Use
RemoteApp option and then enter the name of the RemoteApp program and save the
session. When the session is launched you will have the RemoteApp running locally.
DESCRIPTION
SETTINGS
OPTION DESCRIPTION
Select the ansi file you wish to open in the Terminal Playback.
OPTIONS
OPTION DESCRIPTION
Auto wrap Indicate what happen when text reaches the right-hand
edge of the window. Select between:
· On
· Off
· Dos
Backspace wrap This option allows you to choose what you want to do
when you press backspace. Some terminals believe that
the backspace key should send the same thing to the
server as Control-H (ASCII code 8). Other terminals
believe that the backspace key should send ASCII code
127 (usually known as Control-?) so that it can be
distinguished from Control-H. Select between:
OPTION DESCRIPTION
· On
· Off
· Dos
Ignore Substitute Ignore the substitute character that can be use in Putty.
character
Implicit Carriage Most servers send two control characters, CR and LF, to
return in Linefeed start a new line on the screen. The CR character makes
the cursor return to the left-hand side of the screen. The
LF character makes the cursor move one line down (and
might make the screen scroll).
DESCRIPTION
The Remote Desktop Manager Agent is a very powerful tool that allows commands
to be run on multiple machines.
SETTINGS
To launch a script through the RDM Agent, you first need to open an RDP connection
to all the machines you wish to execute the script on. Once opened, select all the
opened sessions in the Navigation Pane, right-click them and select Execute Script via
Agent.
Execute script via Agent only needs the RDM Agent when the script is
executed from the Quick Script tab. RDM needs to be fully installed on
the remote computer when the script is executed from the
Scripts/Tools tab.
OPTION DESCRIPTION
OPTION DESCRIPTION
Use Default Use the default working directory when connect to the
Working session.
directory
Keep open Keep the window open after the execution of the command
line.
OPTION DESCRIPTION
OPTION DESCRIPTION
Use Default Use the default working directory when connect to the
Working session.
directory
OPTION DESCRIPTION
Scripts/Too Select a script or a tool session that you have already created in
ls Remote Desktop Manager.
SCRIPT/TOOLS
Scripts/Tools
Search for a script or a tool you wish to execute through the RDM Agent.
SETTINGS
Advanced
OPTION DESCRIPTION
Open all When multiple sessions are selected to Execute Script Via
connections Agent, it will open all the selected connections.
Delay Enter the time delay between opening each selected session.
AGENT STATUS
Open a RDP session, right-click on this single session and select Agent Status. The
Agent Status will show you that Remote Desktop Manager is installed on the remote
computer or not, that the Remote Desktop Manager Agent is active or not and how
many Remote Desktop Manager Jump sessions are opened.
Agent Status
6.9 Help
DESCRIPTION
In the Help tab section you will find links to the Devolutions forum, Blog, Online Help
and much more. Diagnostics tools for Remote Desktop Manager are all located in the
Support section. many supported related features, such as the Application Logs, the
Profiler, and the Recorder.
Ribbon - Help
HELP
OPTION DESCRIPTION
Blog Visit our Blog and learn about the Devolutions team, as well
as our goals, products and more.
SUPPORT
OPTION DESCRIPTION
Clipboard The Clipboard Diagnostic tool helps to view all requests in real
Diagnostic time and identify which application is involved with copy paste
errors.
OPTION DESCRIPTION
Visit our Forum Visit our Forum for help and exchange with the Devolutions
community.
Release Notes Send you directly to our Remote Desktop Manager web page
to view the new features and enhancements when a new
version is released.
ABOUT
OPTION DESCRIPTION
6.9.1 Support
6.9.1.1 Application Log
DESCRIPTION
When encountering errors, you can verify the local application log, which is available in
Help – Application Logs.
REPORT
A report of the logs can be saved in a text file as well. Simply navigate to the Report
tab of the application log, then click on the Save button to select a location to save the
file.
CLEAN UP
For security reason, it is a best practice is to clean up the application log once every
month. To do so, in the application log, use the Clean Up feature.
When experiencing issues with Remote Desktop Manager our support team might ask
you to increase the debug level of the application during the support process. We
strongly suggest to only increase the debug level when requested by our support team.
6.9.1.2 Diagnostic
DESCRIPTION
If you encounter a problem with Remote Desktop Manager, you can run a system
diagnostic, which is available in Help – Diagnostic. This could help diagnose or give a
pointer to what kind of issues you might be experiencing.
SYSTEM
The administrator item could be the possible source for security problem. This happen
often when a user has the SYSDBA or is DB_OWNER of the SQL Server database.
Some other issues could be related to the fact that the application is running in Remote
Desktop Services. However Remote Desktop Manager is fully compatible with Remote
Desktop Services.
FIPS related issues and solutions can be found in the specific FIPS (Encryption)
troubleshooting section.
If you have a Remote Desktop Manager Jump configured you can run a test of your
Jump host by clicking on Jump Test.
DATA SOURCE
The Data Source tab contains information regarding the current data source, such as
the number of entries it contains, the size of your data source, the number of custom
images and the offline state.
POLICY
The Policy tab display the list of Group Policy Templates to see if any of them has been
applied.
6.9.1.3 Profiler
DESCRIPTION
Remote Desktop Manager has a built-in profiler to diagnose connectivity issues with a
data source.
PROCEDURE
Performance Profiling
3. Click on Send Trace to Support in order to send the Profiler data logs to our
Devolutions support team. You can add a Marker when running multiple tests to
separate them.
DEBUG ONLY
To learn more about the Debug only tab please see the Debugging topic.
Debug only
6.9.1.4 Record
DESCRIPTION
If you are experiencing issues with Remote Desktop Manager, you can help our
Devolutions Support team troubleshoot the problem by sending them a short video of
your issue. Launch this by using the Record feature located in the menu Help –
Record.
The Record is an easy-to-use built-in screen recorder that could even be a useful for
your in-house training as it is not limited to Remote Desktop Manager.
SETTINGS
The Video Recording Options uses the MP4 format, which on Vanilla installs of
Windows is not supported. If you encounter any difficulty viewing the video we strongly
suggest the use of a VLC player.
Part
VII
562 Remote Desktop Manager
DESCRIPTION
Devolutions Server
Remote Desktop Password Hub
Manager Secure, Manage and
Monitor Vault and Manage
Centralize, Manage and
Access to Privileged Business-User
Secure Remote Accounts Passwords
Connections
7.2 Installation
DESCRIPTION
Devolutions Web Login is a free browser extension companion tools. It does require
one of our products to function at this time.
Click on the browser link below to start the installation of Devolutions Web Login plugin:
· Chrome
· Firefox
· Edge
· Opera
7.2.1 Chrome
DESCRIPTION
Follow the steps below to complete the installation of Devolutions Web Login in the
Chrome web browser.
1. Open Chrome.
2. Navigate to Devolutions Web Login extension or use the link from our Website.
5. Click the Chrome extension button and Pin Devolutions Web Login to finish the
installation.
7.2.2 Firefox
DESCRIPTION
Follow the steps below to complete the installation of Devolutions Web Login in the
Firefox web browser.
2. Download the extension from our Devolutions Web Login website page.
4. Click Add, when prompted to add Devolutions Web Login to the extension.
5. Once installed, access the extension by clicking in the top-right corner of Firefox.
7.2.3 Edge
DESCRIPTION
Here are the steps to install Devolutions Web Login on Microsoft Edge.
3. Click Get.
The extension is installed. Access it by clicking in the top-right corner of the Microsoft
Edge web browser.
7.2.4 Opera
DESCRIPTION
Follow the steps below to complete the installation of Devolutions Web Login in the
Opera web browser.
1. Open Opera.
2. Download the extension of Devolutions Web Login from our website page.
3. Click on Go to Extension from the information panel at the top or click on the
Extension button
5. Click on the Extensions button of the browser and Pin the Devolutions Web Login
extension.
DESCRIPTION
Follow these steps to connect Password Hub Business to Devolutions Web Login
extension:
1. Click on Devolutions Web Login extension at the top right corner of your
browser.
First Login
Log In
7. If you click on the icon, you can validate that Devolutions Web Login is now
connected to your Password Hub Business.
8. To select the vaults to be synchronized, click on the Vaults icon and the Select
Vaults to Sync button. Afterward, you click on the Select all button, or refine your
view by adding a check mark next to the specific vaults to synchronize.
9. When done selecting your vaults, click on the Select Vaults to Sync at the top of
the panel, to get the following view.
DESCRIPTION
Follow these steps to connect Password Hub Personal to Devolutions Web Login
extension:
1. Click on Devolutions Web Login extension at the top right corner of your
browser.
6. If you click on the icon, you can validate that Devolutions Web Login is now
connected to your Password Hub Personal.
DESCRIPTION
Follow these steps to connect Devolutions Server to Devolutions Web Login extension:
1. Click on Devolutions Web Login extension at the top right corner of your
browser.
First Login
3. Enter the address of your server. You will need to input the same information that
you would use to connect to the web interface of your Devolutions Server. Test the
connection to validate it, then Save.
Server Address
6. If you click on the icon, you can validate that Devolutions Web Login is now
connected to your Devolutions Server.
7. To select the vaults to be synchronized, click on the Vaults icon and the Select
Vaults to Sync button. Afterward, you click on the Select all button, or refine your
view by adding a check mark next to the specific vaults to synchronize.
8. When done selecting your vaults, click on the Select Vaults to Sync at the top of
the panel, to get the following view.
DESCRIPTION
Follow these steps to connect your Remote Desktop Manager to Devolutions Web
Login extension, you will be prompted to pair the two applications.
1. Click on Devolutions Web Login extension at the top right corner of your browser.
6. If you click on the icon, you can validate that Devolutions Web Login is now
paired to your Remote Desktop Manager.
DESCRIPTION
DESCRIPTION
The user interface Devolutions Web Login is slightly different in appearance when
connected to Remote Desktop Manager, Devolutions Server or Password Hub
Business and Personal.
See below a list of the menu and information available from the Devolutions Web Login
extension:
· Refine the credential list available with the Filter search bar.
· Add Website from Devolutions Web Login in a specific folder located in a vault or
your User Vault.
· Visualize the credential stored in the vaults if you are connected with Devolutions
Server or Password Hub.
· Use the Password generator to create custom and more secure credentials.
7.4.1.1 Settings
DESCRIPTION
Devolutions Web Login settings are separated in two categories, Configuration and
Data sources.
CONFIGURATION
The General settings are about the user interface and interaction.
· Color the fields that are filled with Devolutions Web Login
The Never list displays the list of websites, added locally, to which the user will never
be prompted to save credentials.
· Type can range from: Never add site, Never autofill, Never do anything to
Never show icons in fields.
· Matching options are: Base domains, Host, Starts with, RegEx and Exact.
The Import / Export Settings allows to save and transfer your currently set preferred
settings.
DATA SOURCES
The data sources settings are used to customize Devolutions Web Login interactions
with Remote Desktop Manager, Devolutions Server and Password Hub Business or
Personal.
Use default port (19443) Communicate with the default port 19443
between the application.
Add entry in User Vault by Save new entries in the User Vault.
default
Use legacy API Use the old browser extension API for
compatibility with older versions of Remote
Desktop Manager.
DEVOLUTIONS SERVER
Sync all available vaults Enable to synchronize all the available vaults from
Devolutions Server.
Server URL (Business only) Enter the URL of the Password Hub instance to
connect to.
Sync all available vaults Enable to synchronize all the available vaults from
(Business only) Devolutions Server.
DESCRIPTION
LOG IN TO A WEBSITE
Select an entry from the list in Devolutions Web Login or click on the icon in the
credential field of the browser to fill in the login information and connect to the website.
Automatic Log In
DESCRIPTION
In Remote Desktop Manager version 2021.1 and higher, we changed how our browser
extension, Devolutions Web Login, communicates with Remote Desktop Manager to fill
in credentials inside web pages. We did these changes to increase the security of this
feature. Follow this link for the steps.
If you are using a version prior to 2021.1 and as mentioned in the Devolutions Web
Login Overview topic, installing the extension in a Terminal Services environment can
introduce security risks. In such environments, each user must have a distinct port
assigned, as well as an application key to prevent any other Devolutions Web Login
from listening in.
If you insist on using it, it is critical that each user is assigned a distinct port. An
application key must be set as well. The first client application that starts will be able to
use the port exclusively. ALL Devolutions Web Login calling on that port will get the
responses unless an application key is set. Follow this link for the steps.
When you will first open Devolutions Web Login and choose to use it with Remote
Desktop Manager, you will be prompted to pair the two applications.
To enable the security layer in Remote Desktop Manager, follow these steps:
5. In your browser, click the Devolutions Web Login icon and go to Settings - Data
sources - Remote Desktop Manager.
7. Enter the custom port created earlier in Remote Desktop Manager and Save.
8. Click Advanced and enter the same Application key as Remote Desktop
Manager, Save.
DESCRIPTION
In the event you want to deny access to Remote Desktop Manager from a previously
paired browser extension, you need to delete it from Remote Desktop Manager.
2. In the Devolutions Web Login Associations section click the X button of the entry
in the list and click OK to save the modifications.
DESCRIPTION
Here is the list of keyboard shortcuts available for Devolutions Web Login:
CTRL+SHIFT+Z
Use this key shortcut to open Devolutions Web Login window in your active browser.
CTRL+SHIFT+Y
Use it to autofill your credential when only one is available for an entry.
Part
VIII
602 Remote Desktop Manager
DESCRIPTION
Remote Desktop Manager user group based access control allows to create a granular
protection system that is quite flexible. However, flexibility comes at a price and
sometimes making the wrong choices could increase the time involved in managing the
system.
The following recommendations are based on our experience with the system and the
ideas shared by our community. Follow these guidelines, as they will help you to use
the user group based access control efficiently.
Here are the main key points of the user group based access system:
· Security is inherited: child items and folders are covered by a parent folder’s security.
· Permissions can be overridden: a permission set on a sub folder will override the
parent item’s permission.
While the user group based access control is a great feature to secure access to
entries, many other features can be used to add more security layers. For more
information, please consult the following topics:
· Security Provider
· Credential repository
· Password Templates
· Two-factor authentication
· One-time password
SCENARIOS
Because of the great flexibility of our system, it becomes difficult to describe how to
achieve the exact security system that matches your needs. For this reason, we have
elected to describe the most popular systems that we have seen in use in our current
community of users. We hope that one of them will closely match your needs. You can
obviously mix and match the various strategies used in our scenarios to achieve your
requirements.
· Simplified security
· Advanced security
When using the user group based access control, user groups are mostly used to
control user access for multiple users at once.
To create user groups, navigate to Administration – User Groups, then click Add
User Groups.
All settings can be left to default unless the user group contains only administrators. In
this case, check the Administrator box when configuring the user group. Enter a
Name for the user group, then click Ok.
To assign users to the user group, click , then check the Is Member box of the
respective user.
USER CONFIGURATION
USER TEMPLATE
It is possible to change the default user template. To do so, navigate to File – Options
– Security – User Template. These settings control the default settings of a new user.
The best practice is to disable all privileges.
To create users, navigate to Administration – Users, then click Add User. Enter a
Login and Password for the user and select the User type.
Create a user
A user can be assigned to multiple user groups at once by checking the Is Member
box of the respective user groups in the User Groups section of the User
Management.
ADMINISTRATORS
Administrators can do everything, regardless of the security. These users are usually
the chief officers and senior management.
RESTRICTED USERS
Restricted users have limited access to resources. They usually have the Add and
Edit rights only. These users can be mid or first level executives, such as service desk
and help desk.
USERS
Users also have limited access to resources much like Restricted users. However,
Users have by default the Add, Edit and Delete rights and can perform these actions
on all unsecured entries.
Read only users can only view and use resources, but cannot edit them. These users
are usually external consultants.
When creating users, some key points must be taken into consideration. Ask yourself
the following questions while configuring a new user:
· Should they be able to access any resource without restriction? These are your
Administrators.
· Should they be able to add, edit, or delete entries? A User would have all of these.
Alternatively, you can select specific rights with Restricted User.
· Should they be able to see sensitive information, or import and export entries? Read-
Only users are best used for those who should very limited access.
ENTRY CONFIGURATION
To set permissions on an entry, edit any entry, then navigate to the Permissions
section.
Entry's Permissions
Permissions are usually set on folders, and apply to all child entries. A best practice is
to set all the permissions of the Vault folder to Never. As a result, all permissions of all
entries are denied by default.
Access is denied to users by expressly granting the access to other users. In other
words, all users that are not on the list of a permission have the access denied.
For a user to have access to a sub folder, the user must have at least the view
permission on all parent folders.
There are three levels of folders: the Vault, Telemark, and child items of Telemark.
Suppose that a user, such as a consultant, must have access to the Montreal folder
only. The consultant must be granted the view permission on the Telemark folder as
well. However, granting the view access to the Telemark folder gives to the consultant
the permissions to view all child items of Telemark. To deny the view permissions for
the consultant on specific child items, the view permissions of these items must be
expressly set for other users.
8.1 Permission
DESCRIPTION
The Permission window which is only available in an Advanced Data Source, can be
found in every entry properties in the Permission section.
The user group based permission system can give a very accurate control of the
security. Here is an overview of the permission window:
Permission panel
OPTION DESCRIPTION
OPTION DESCRIPTION
Select user groups or Lets you select Users / User groups to be granted the
users permission. Available only if the permission is set to
Custom.
8.2 Scenarios
8.2.1 Simplified Security
DESCRIPTION
Our fictional company, Windjammer, has four User Groups: HelpDesk, ServiceDesk,
Administrations, and Consultants. There are two client companies: Downhill Pro and
Telemark.
The following tree structure represents entries which users have access to once all
permissions are set:
USER CONFIGURATION
The following rights selection is available when setting a user to Restricted user.
Administrators: administrators have a lot more access than regular users. When
creating these users, set the User type to Administrator to give them access to
everything. The administrator can access all entries, regardless of permissions.
Regular users (User): these users have fewer rights than administrators. They
essentially have all the basic rights (except for View Password) but are susceptible to
all denied permissions. Later, we will deny these rights by specifying which users can
actually perform these actions.
Consultants: consultants can only view a subset of entries, we will set those as Read-
Only. They cannot add, edit or otherwise affect the information in any way.
Now that the users are created, we will add the user groups which we will later grant
the permissions to. We need to create the user groups to assign users to them. There
is no need to grant any privileges to these user groups.
· ServiceDesk
· HelpDesk
· Consultants
ENTRIES CONFIGURATION
· The HelpDesk will have the permission to view and open entries in the customer
groups/folders only and will not be able to edit them.
· The Consultants will have the permission to view and open entries in the Montreal
folder only but will not be able to edit it nor its child items.
We will begin with the Vault level folders: Downhill Pro, Telemark and Windjammer.
The permission to view the Windjammer folder will be set for the ServiceDesk only
since we want them to be able to use its child entries. We don’t want the ServiceDesk
to add or edit anything. We will set the Add, Edit and Delete permissions to Never.
Only the administrator will be able to add or edit entries in the Windjammer folder.
Windjammer - Permissions
For Downhill Pro, we will grant permissions to the ServiceDesk and the HelpDesk.
Next, for the Telemark folder, we will grant permissions to the ServiceDesk, the
HelpDesk and the Consultants. This is where things get complex. If we want the
Consultants to be able to view only the Montreal folder which is a child item of
Telemark, we must grant to consultants the permission to view the entire Telemark
content. Then we will grant permissions on child items only to the user group that
should have access to these items. This last step will deny the view permission for the
consultants on the child items.
Telemark - Permissions
Since we want the users to be able to use the credential entries, we will grant the
ServiceDesk and the HelpDesk the permission to view the Credentials folder. This way,
the ServiceDesk and HelpDesk will be able to use the entries in the folder without
revealing the passwords. Therefore, by specifying that only the HelpDesk and
ServiceDesk have the View permission, we deny the view access to any user group or
user that is not in the list of the permission.
The Add, Edit and Delete permissions can be left to Inherited since they inherit the
settings from the Telemark parent folder. The ServiceDesk is the only user group that
has been granted the Add and Edit permission in the parent folder and the Delete
permission inherits the Never setting.
Telemark\Credentials - Permissions
We want the ServiceDesk to be able to use the Domain Admin credential entry as well
but not the HelpDesk. For this we must grant the View permission to the ServiceDesk.
The ServiceDesk will still be able to edit the credential entry but will never see the
password. The delete permission is set to Never.
The last step for the Telemark child items is to set the View permission to the
ServiceDesk and the HelpDesk on the Boston folder and leave every other permission
of this folder to Default. This denies the Consultants to view the Boston folder. Now,
the Consultants will be able to view and open entries only in the Montreal folder.
Telemark\Boston - Permissions
Every time a new folder is added, the View permission must be set for
ServiceDesk and HelpDesk to hide the new folder and its content from
the Consultants.
No need to set any permissions on the Montreal folder, since they are inherited from
the parent folders.
Telemark\Montreal - Permissions
IN CONCLUSION
The permissions are now correctly set. Note that every entry added at Vault level will
have no security by default. This means they would be available for anyone, even the
consultants. This can be confirmed by looking at the screenshot below in which the
entry Daily routine is available for everyone. Here is what each user should see in the
tree view:
You can further customize your permissions by using the Security Settings tab when
editing entries, or the Logs tab to add more traces of coming and goings. As always,
great care must be taken when granting permissions.
If you need more details on each permission, please consult our Common Settings –
Permissions topic.
DESCRIPTION
While this example fits for large enterprises, please keep in mind that any privilege
should be granted only as necessary. Be careful when granting permissions to a user
or a user group.
Our fictional company, Windjammer, has three user groups: HelpDesk, ServiceDesk,
and Consultants. There are two client companies: Downhill Pro and Telemark.
The following tree view structure represents entries which users have access to once
all permissions are set:
USER CONFIGURATION
In this scenario, all the options in the Privileges section of the User
Management are set to None.
Here we select the user type to give them the most basic rights (Add, Edit, and
Delete).
ServiceDesk users are Restricted users. They have the Add and Edit rights.
However, they cannot add entries into the Vault folder.
HelpDesk users are Restricted Users as well. They only have the Add right.
However, they cannot add entries into the Vault folder.
Consultants are Read Only Users and can only view a subset of entries. They cannot
add or edit anything.
Now that the users are created, we will add the user groups which we will later grant
the permissions to. We need to create the user groups and assign the respective user
to each user group. There is no need to grant any privilege to these user groups since
they are mainly empty shells used to group multiple users. This allows for controlling
multiple users at once instead of granting permissions to each users, one at a time.
· ServiceDesk
· HelpDesk
· Consultants
To add a user group, click the Add User Group button, enter a name for the user
group, and click Ok.
To assign users to a user group, select a user group and click the Assign User
Groups button. Use the Is Member check boxes to add users to the user group.
ENTRY CONFIGURATION
· The ServiceDesk has the permission to view and open all entries but is able to edit
only the entries in the client's groups/folders.
· The HelpDesk has the permission to view and open entries in the client's
groups/folders only and is not able to edit them.
· The Consultants have the permission to view and open entries in the Montreal folder
only but is not able to edit it or its child items.
Vault Settings
As mentioned above, ALL Vault settings folder permissions are set to Never. This
denies the default access to other users.
The permission to view the Windjammer folder is set for the ServiceDesk only since we
want them to be able to use the child entries. We don’t want the ServiceDesk to add,
edit or delete anything. We leave the Add, Edit and Delete permissions to Inherited
so only the administrators can perform these action on the Windjammer folder and its
child items.
Windjammer - Permissions
· View: Custom; ServiceDesk.
· Add: Inherited; Never inherited from Vault. Only the administrator can add entries.
· Edit: Inherited; Never inherited from Vault. Only the administrator can edit entries.
· Delete: Inherited; Never inherited from Vault. Only the administrator can delete
entries.
For Downhill Pro, we grant permissions to the ServiceDesk and the HelpDesk.
· Delete: Inherited; Never inherited from Vault. Only the administrator can delete
entries.
Next, for the Telemark folder, we grant permissions to the ServiceDesk, the HelpDesk
and the Consultants. This is where things get complex. If we want the Consultants to be
able to view only the Montreal folder, which is a child item of Telemark, we must grant
Consultants the permission to view the parent folder, thereby the entire Telemark
content. Then we will grant permissions on child items only to the user group that
should have access to these items. This last step will deny the view permission for the
Consultants on the child items.
Telemark - Permissions
· View: Custom; Consultants, HelpDesk, ServiceDesk.
· Delete: Inherited; Never inherited from Vault. Only the administrator can delete
entries.
Since we want the users to be able to use the credential entries, we grant the
ServiceDesk and the HelpDesk the permission to view the Credentials folder.
Therefore, the ServiceDesk and HelpDesk are able to use the entries in the folder
without revealing the passwords. By specifying that only the HelpDesk and
ServiceDesk have the View permission, we deny the view access to any user group or
user that is not on the list of the permission.
The Add and Edit permissions are set to Never and the Delete permission can be left
to Inherited since it inherits the Never settings from the Vault. Only the administrators
can perform these actions in groups/folders containing credentials.
Telemark/Credentials - Permissions
· View: Custom; HelpDesk, ServiceDesk.
· Delete: Inherited; Never inherited from Vault. Only administrators can delete entries.
We want the ServiceDesk to be able to use the Domain ladmin credential entry, but
not the HelpDesk. For this, we must grant the View permission to the ServiceDesk.
The ServiceDesk is still be able to use the credential entry but will never see the
password.
Telemark\Credentials\Admin - Permissions
· View: Custom; ServiceDesk.
· Add: Inherited; Never inherited from Vault. Only administrators can add credential
entries.
· Edit: Inherited; Never inherited from Vault. Only administrators can edit credential
entries.
The last step for the Telemark child items is to set the View permission to the
ServiceDesk and the HelpDesk on the Boston folder and leave every other permissions
of this folder to Inherited. This denies the Consultants to view the Boston folder. Now,
the Consultants are able to view and open entries only in the Montreal folder.
Telemark\Boston - Permissions
· View: Custom; HelpDesk, ServiceDesk.
Every time a new folder is added as a child of the Telemark folder, the
View permission must be set for ServiceDesk and/or HelpDesk to
hide the new folder and its content from the Consultants.
There is no need to set any permissions on the Montreal folder, since they all inherit
values from parent folders.
Telemark\Montreal - Permissions
IN CONCLUSION
The permissions are now correctly set. Note that every entry added at Vault level are
inheriting from the Vault as well. This means they would be available to admins only,
unless their permissions were modified. This can be confirmed by looking at the
screenshot below, in which the entry Daily routine is available for everyone (It's
permissions have been changed to Everyone. Here is what each user should see in the
tree view:
You can further customize permissions by using the Security Settings tab when
editing entries. As always, great care must be taken when granting permissions.
DESCRIPTION
Describing such a flexible security system takes a lot of effort. This chapter contains
valuable information, but that may have been optimized by a newer topic.
DESCRIPTION
Here we will give you a security structure example that should be relevant for small to
medium business.
In this scenario, all the options in the Privileges section of the user properties will be
left disabled.
While this example might fit for many enterprises, please keep in mind that any
privilege should be granted only if needed. Be extremely careful when granting
permissions to a user or a user group.
STEPS
USER CONFIGURATIONS
The administrator:
· When creating the user, select the Administrator in the dropdown menu to give it
access to everything.
Administrator Permission
The ServiceDesk:
· Add
· Edit
ServiceDesk Rights
The HelpDesk:
· Add
HelpDesk Rights
The MontrealConsultant has read-only access. He cannot see any password or entry
detail.
MontrealConsultant Rights
Now that the users are created we will add the user groups to which we will later grant
the permissions. We just need the user groups to assign users to them. No need to
grant them any privileges.
· ServiceDesk
· HelpDesk
· MontrealConsultant
ENTRIES CONFIGURATION
· The ServiceDesk will have the permission to view and open all entries but will be able
to edit only the entries in the customer groups/folders.
· The HelpDesk will have the permission to view and open entries on the customer
groups/folders only and will not be able to edit them.
· The MontrealConsultant will have the permission to view and open entries on the
Montreal goup/folder only and will not be able to edit it nor its child items.
We will begin with the root level groups/folders: Downhill Pro, Telemark and
Windjammer.
For Downhill Pro, we will grant permissions to the ServiceDesk and the HelpDesk.
· Add: ServiceDesk
· Edit: ServiceDesk
· Delete: Since no user have the delete right we can leave this permission to Default.
Next for the Telemark folder, we will grant permissions to the ServiceDesk, the
HelpDesk and the MontrealConsultant. This is where things get complex. If we want the
MontrealConsultant to be able to view only the Montreal folder which is a child item of
Telemark, we must grant to the consultant the permission to view the entire Telemark
content. Then we will grant permissions on child items only to the user group that
should have access to these items. This last step will deny the view permission for the
consultant on the child items.
Telemark - Permissions
· Add: ServiceDesk
· Edit: ServiceDesk
· Delete: Default
Since we want the users to be able to use the credential entries, we will grant the
ServiceDesk and the HelpDesk the permission to View the Credentials folder. This way
they will be able to use the entries without being able to view the passwords.
The Add and Edit permissions can be left to Default since the ServiceDesk is the only
user group that has been granted these permissions in the parent folder.
Telemark\Credentials - Permissions
· Add: Default
· Edit: Default
· Delete: Default
We want the ServiceDesk to be able to use the Domain Admin credential entry as well
but not the HelpDesk. For this we must grant the View permission to the ServiceDesk
only and change the Add and Edit permission to Never. The ServiceDesk will still be
able to edit the credential entry but will never see the password. If you prefer you can
set the Edit permission to an Administrator user or user group to deny it to the
ServiceDesk.
Telemark\Credentials\Admin - Permissions
· View: ServiceDesk
· Delete: Default
The last step for the Telemark child items would be to set the View permission to the
ServiceDesk and the HelpDesk on the Boston folder and leave every other permission
to Default.
Now the MontrealConsultant will be able to view and open entries only in the Montreal
folder. Every time a new folder is added the View permission must be set for
ServiceDesk and HelpDesk to hide the new folder and its content from the consultant.
Telemark\Boston - Permissions
· Delete: Default
No need to set any permissions on the Montreal folder, since they are inherited from
the parent folders.
Telemark\Montreal - Permissions
Finally, the permission to view the Windjammer folder will be set for the ServiceDesk
only since we want them to be able to use its child entries. We don’t want them to add
or edit anything so we will set the Add and Edit permissions to the Administrator
user/user group.
Windjammer - Permissions
IN CONCLUSION
The permissions are now correctly set. Note that every entry added higher than the root
level groups/folders will have no security by default. This means they would be
available for anyone, even the consultant. This can be confirmed by looking at the
screenshot below in which the entry Daily routine is available for everyone. Here is what
each user should see in the tree view:
You can go further with granting permissions by using the Security and Attachments
tabs of the permissions section. As always, a great care must be taken when granting
permissions and users should have very strict privileges.
Part
IX
648 Remote Desktop Manager
9 PowerShell Scripting
DESCRIPTION
There are two ways to interact with Remote Desktop Manager using PowerShell:
DESCRIPTION
We are always asked for a full list of property names and sadly it is extremely hard to
provide for multiple reasons. The best way is still to look at the xml structure of an entry
of the proper type to identify the field names.
1. Create an entry of the needed type, add only mandatory data at this time. Save the entry.
2. Right-click on the entry, then use Clipboard – Copy.
3. In the dialog that appears, switch to the Preview tab, copy the xml structure to a text file. This is the
BEFORE.
4. Manually perform the modification to the entry that you would like to automate using PowerShell, save
the entry.
5. Using Clipboard – Copy, save the modified xml to another file. This is the AFTER.
6. Compare the two files with your favorite difference tool, you will see the fields that have changed, and
the values that have been assigned. This indicates what your script should do.
· To save space, most fields have a default value and when the field contains that
default value, it simply does NOT appear in the content. That is why you must watch
out for new fields that appear in the AFTER content.
· Credentials are handled in a special way. They contain a GUID when they refer to
other entries, but they hold Well-Known static GUIDs when they use other
mechanisms.
Default ""
Inherited "1310CF82-6FAB-4B7A-9EEA-
3E2E451CA2CF"
None "B87B29D9-9239-4D7B-86D8-
9B53DCD3BA9F"
· To find properties and paths, reverse engineer the session XML file format.
Create a sample session in RDM and export it using the right click menu
Import/Export - Export Session (.rdm).... Once exported, open the .rdm file with
your favorite editor. Browse the XML structure to find the property path and name.
· To list all properties of an entry, pipe the session object to Get-Member cmdlet.
$session = Get-RDMSession -Name "MyRDPSession"
$session | Get-Member
· Use the AddDataEntryKind method to set the data entry kind to Web (11 in this
case). This is not actually documented – it’s just a bonus tip that we use here at
Devolutions all the time!
DESCRIPTION
COMMANDS
DESCRIPTION
SETTINGS
$sessions[0].Session.GetProperty("TeamViewer", "ID")
9.2.2 Custom Export to CSV
DESCRIPTION
Many customers ask for a special export that would contain specific fields.
SETTINGS
Here is a small script that can be used to generate URLs for our new web protocol
handler. We generate a csv file that contains the name and the URL.
## get the data source ID, note that the "Create Web Url" button generates a different
$dsid = Get-RDM-DataSource | where {$_.IsCurrent -eq "X"} | select -expand "ID"
## get the RDP sessions, create a new object with the desired fields.
## Simply append "add-member" commands to include a new field
$s = Get-RDM-Session |
where {$_.Session.Kind -eq "RDPConfigured"} |
foreach {
new-Object Object |
Add-Member NoteProperty Name $_.Name –PassThru |
Add-Member NoteProperty URL "rdm://open?DataSource=$dsid&Session=$($_.ID)" –Pass
};
DESCRIPTION
Please note that the CSV file must be encoded in UTF-8 to support
special characters.
SAMPLE
# Create the group folder if it is not null, empty or fill in with space charact
if (![string]::IsNullOrWhiteSpace($groupName)) {
$session = New-RDMSession -Type "Group" -Name $groupName
$session.Group = $csvEntry.Name
Set-RDMSession $session
Write-Host "Group Folder $groupName created" -f Yellow
}
}
Update-RDMUI
NOTES
The CSV file must have only one column with the title set as Name.
CMDLETS REFERENCE
DESCRIPTION
Custom Powershell Command will act on currently selected entries in your navigation
panel. Use click & ctrl-click to build up your list, or an advanced search to select a great
number of entries. After your selection is done, the command is available using either :
Edit Toolbar
· A window appears in which you can write a snippet of code. Note that is the last line
must always be $RDM.Save();
DESCRIPTION
If you have been using the Remote Desktop Manager version with the Synchronizer
Action on Entry Mismatch feature, the following steps will allow you to easily change
your source with a Powershell Command without having to recreate all your sessions,
thus marking all selected entries as created by the synchronizer.
SETTINGS
1. Select your Synchronizer entry in your Tree view, right click and select Properties.
2. Copy the Entry ID in the Entry Information menu (you will then need that ID
number to insert in your Powershell Command).
Advanced - Session ID
3. Select your entries and reach the Custom PowerShell Command dialog as
described in Custom PowerShell Commands
DESCRIPTION
The Batch Actions allow for a quick way to modify multiple sessions at once, but within
Remote Desktop Manager itself.
To be able to create your PowerShell script, you would need the name of the field(s)
that you would like to update. To retrieve the exact name of the field, right-click on your
session and select Clipboard – Copy. You can then paste the information in a text
editor to retrieve the name of the field(s) that you would like to modify via the Custom
PowerShell Command.
Since they use the Powershell technology, we provides samples in this section because
the fields are the same when accessed through our Batch Actions or through
Powershell.
SAMPLES
$connection.Web.OnlySendPasswordInPasswordField = $false;
$RDM.Save ( ) ;
$connection.DataEntry.ViewUrlDisplayMode = "Default";
$RDM.Save();
$connection.DataEntry.DefaultAction = "OpenUrlExternal";
$RDM.Save();
$connection.Terminal.MaxScrollbackLines = 2000;
$connection.Terminal.AlwaysAcceptFingerprint = $true;
$connection.Terminal.EnableLogging = $true;
$connection.Terminal.LogPath = '$LOGPATH$\$NAME$_$DATE_TEXT_ISO$_$TIME_TEXT_ISO$.
$connection.Terminal.LogMode = 1;
$connection.Terminal.LogOverwriteMode = 0;
$RDM.Save();
Here are some values that you can change for this command;
LogPath: your path between ' ' (single quotes). You can also use variables. i.e. %USERPROFILE%,
$NAME$, etc. In this example $LOGPATH$ is a custom variable defined in the Data Source Settings
(System Settings) - Custom Variables
LogMode: 1 = Printable Output, 0 = Event
TerminalLogOverwriteMode: 0 = default, 1 = prompt, 2 = append, 3 = overwrite
Here's also other options that you can modify;
$connection.Terminal.BellMode = 'Visual'
$connection.Terminal.CloseOnDisconnect = $false
$connection.LogMeIn.ScriptErrorsSuppressed = $true;
$RDM.Save();
$connection.LogMeIn.ShowUrl = $false;
$RDM.Save();
$connection.LogMeIn.WebBrowserApplication = "GoogleChrome";
$RDM.Save();
$connection.LogMeIn.SandboxProcess = $true;
$RDM.Save();
Host;
Portal;
$connection.MetaInformation.CustomField3Title = "MyField"
$RDM.Save();
Please note that you would need to change "MyField" for the value that you want to replace Custom field #3 with.
$connection.Putty.RecordingMode = 1;
$connection.Putty.RecordingFileName = "C:\path\to\your\file.log"
$RDM.Save();
ENCODING
$connection.Putty.TelnetEncoding = "UTF-8";
$RDM.Save();
$connection.MetaInformation.Keywords = "";
$RDM.Save();
$connection.Putty.HistoryMaxLength = 2000;
$RDM.Save();
$connection.ConnectionType = 3;
$RDM.Save();
$connection.KeyboardHook = "OnTheRemoteComputer";
$RDM.Save();
Part
X
666 Remote Desktop Manager
10 Support/Resources
10.1 Technical Support
DESCRIPTION
Email: [email protected]
Forum: https://forum.devolutions.net/
Language English-Français-Deutsch
:
Subscribers of a paid support plan have received a plan ID. You should send your plan
ID in your tickets.
DESCRIPTION
Here are the default keyboard shortcuts for various commands. These can be modified
in File – Options – User Interface – Keyboard.
ACTIONS
ACTION SHORTCUT
Open Ctrl+Enter
(Embedded/Tabbed)
ACTION SHORTCUT
EDIT
ACTION SHORTCUT
Delete... Ctrl+Del
Duplicate Ctrl+D
Rename F2
ACTION SHORTCUT
GENERAL
ACTION SHORTCUT
Filter... Ctrl+F
Online Help F1
Refresh F5
IMPORT/EXPORT
ACTION SHORTCUT
NAVIGATION
ACTION SHORTCUT
File Ctrl+Shift+F
ACTION SHORTCUT
VIEW
ACTION SHORTCUT
Dashboard Alt+F6
Favorites F9
ACTION SHORTCUT
My User Vault F7
Opened Sessions F8
Recent F10
Vault F6
10.3 Lexicon
DESCRIPTION
CONNECTION
Any type of entry that allows you to connect to a remote host, service or device is a
connection. An IP address or host name is normally used as well as credentials.
CREDENTIAL ENTRY
DATA SOURCE
It is a container for entries. It can be a local file or a database (either local or shared).
You can use multiple distinct data sources in the application, although only one is
considered active at one point in time. See Data Sources for more information.
ENTRY
All items in your data source are entries. There are multiple types. The entry is an
abstract concept that serves as a container for all specific types.
INFORMATION ENTRY
An information entry can contain various items like account information, emails and
serial numbers. Unlike credential entries, information entries are meant to be shared.
Therefore, the data in the information entries is not encrypted. Its principal use in
Remote Desktop Manager is to hold web site information, from the URL to the
credentials. This allows auto log in on the specified web site.
SESSION
In the early days of Remote Desktop Manager, it was mainly aimed at managing
Microsoft Remote Desktop. A session was a term that was in use back then to
describe a connection to Microsoft Remote Desktop Services. It appears widely in our
documentation. Any technology that connects and that needs to use authentication is a
session.
10.4 Tutorials
DESCRIPTION
Our focus is to deliver quality information as soon as possible after the release of a new
or modified feature.
Please use our forums if documentation is missing or plain wrong, we will do our best
to correct the situation.