Remote Desktop

 SummitAI Asset Management
 Administrators

Administrators

Configuring Asset Management Module

Configuring Asset Category Using Form Builder

Configuring My Asset List Page

Custom Scheduler Jobs

Asset Masters

Configuring Location And Store

Configuring Asset Purpose

Configuring Action Attribute

Configuring Fault Type

Configuring Solution Type

Configuring Notifications and Templates

Configuring Allocation Form Template

Configuring Key Field Mapping

Configuring Data Templates

Configuring Field Display Order on Fixed Asset List Page

Software

Software Request Mapping Form

Adding/ Updating Software

License Mapping

Blacklisting Software

Configuring Software Baseline Profiles

Software Baseline Profile Mapping

Configuring Software License

License Key Mapping

Depreciation

Configuring Depreciation Formula

Configuring GAAP Depreciation

Configuring Depreciation Field Mapping

Configuring Custom Depreciation Formula

Mapping

Discovery Mapping

Configuring CMDB Mapping

Procurement Mapping

Account Mapping

Configuring Custom Hardware Variance

Mapping ServiceNow Category

Application Control

Creating and Updating Profile

Mapping Profiles

Configuring Application Control Messages

Configure Software and Executable Execution Type

Viewing Software Process List

Endpoint Compliance

Endpoint Dashboard

Viewing Endpoint Profile List

Configuring Endpoint Profile

Viewing Dynamic Endpoint

Configuring Dynamic Endpoint

Mapping Endpoint Profile

Patch Management

Viewing Patch List

Creating Asset Groups

Configuring Patches

Others

Configuring Asset Application Settings

Configuring Asset Movement

Configuring Asset Alerts

Configuring Store Threshold

Configuring Asset Scan Domain List

Configuring Local Password Management

Configuring E-mail Notifications

Configuring Asset Integration Details

Configuring Additional Discovery

Scheduling Asset Physical Verification

Configuring Product Price

Adding Software Deployment Profile

Approval Matrix

Configuring Approval Matrix

Configuring Approver Role

Mapping Approver

Deactivation Approval Matrix

Configuring Deactivation Approval Matrix

Configuring Approver

Configuring Location-Wise Approvers

SUMMIT Software Center

Description

Using Remote Desktop, Analysts can take remote access of the End User's computer to resolve the issue.

  • An e-mail is sent to the End User requesting for permission to access the computer. Once the End User gives permission, the Analyst can take access of the End User's desktop.
  • In the Stealth Mode, no permission is required from the End User to access the computer. For Stealth Mode, the Agent should be installed and running on the End User's desktop.

There are two versions of Remote Desktop available in the SUMMIT Application.

  • Free Version: This is the default version of Remote Desktop application available for users. Both the End User and the Analysts should be within the same office network to use this application. It works on open VNC technology. It is supported only on Windows Operating System. For more information on Standard Remote Desktop feature, see Remote Desktop Sharing.
  • Paid Version: The End User and the Analyst need not be on the same network. Additional features, such as Recording session is available in this version. The session can be recorded in low, medium, or high resolution. The maximum duration of remote session that can be recorded is 1 minute and the maximum data that can be transferred is 10 mb. In this version of application, Analysts can access the End User's computer on mobile as well. The supported operating systems are Windows, Linux/ Unix, and Mac. The Agent should be installed and running in both Stealth Mode and regular mode.  For more information on Advanced Remote Desktop feature, see Advanced Remote Desktop Sharing Guide

Both the versions of application are available on cloud and the information is encrypted in both the versions.

Advantages

  • Useful for Analysts when the End User is not able to follow the instructions.
  • Quicker resolution of End User's issue with better user experience

Accessing the Feature

On the INCIDENT DETAIL page, click the REMOTE DESKTOP icon below the logged in user details section. Select the Stealth Mode check box to take access of the End User's computer without the End User's permission, see Remote Desktop Sharing.

ASSET DETAILS pop-up page - REMOTE DESKTOP button
Figure:  ASSET DETAILS pop-up page - REMOTE DESKTOP button