Responding to notify requests, Controlling and monitoring incoming access, Monitoring remote connections – ARRIS Timbuktu for Windows v9.0.4- Getting Started Guide User Manual

Page 49: Logging, Monitoring remote connections logging

Advertising
background image

Controlling and Monitoring Incoming Access

| 49

Responding to Notify Requests

When another user uses the Notify service to request notification of your presence at your computer, the
Request for Notification dialog box opens on your computer. The dialog box indicates that the specified
user is asking for notification and provides several options for you to respond. If you click the Acknowl-
edge
button, the other user is notified that your are working at your computer. If you click Ignore, the
other user will not be notified that you are present or that you have returned to work.

Use the Notify tab in the Timbuktu Host Configuration Utility to specify a message that Timbuktu will
display to other users when they request notification. See

“The Notify Tab” on page 28

.

Controlling and Monitoring Incoming Access

There are several ways of maintaining security and restricting access to your computer by other Tim-
buktu computers. First and foremost, one can connect to your computer without your prior authoriza-
tion. There are several levels of remote access: you may assign privileges to all Guest Users, allow
remote users to ask for permission to use unassigned services, and create NT Users and Registered Users
with specific privileges. These options are discussed in

“Managing User Accounts” on page 31

.

To completely prevent any incoming connections, you can shut down the Timbuktu Host.

As an administrator, you may also use Active Directory Group Policies and Site Keys to control security
settings on your entire network. Full documentation for Timbuktu with Active Directory is available.

Monitoring Remote Connections

There are a number of ways to keep track of and control Timbuktu connections to your computer.

When another computer connects to your computer, the Timbuktu icon in the system tray on the taskbar
alternates between the application icon and a service icon that indicates the presence of an incoming
user and the service being used. (For a list of icons, see

“Icon Legend” on page 53

.) Click the Timbuktu

icon to display a a shortcut menu that includes a list of current users and the services they are using, as
well as a list of previous users. To remove names from the Previous User list, click Clear Previous User
List
.

You can disconnect any or all users at any time. Open the shortcut menu and choose the specific user
you wish to disconnect. Or choose Disconnect All Users.

Logging

Timbuktu supports a number of different logging features to allow you to track and record the Timbuktu
activity on your computer.

The Activity Log maintains a list of the all incoming and outgoing Timbuktu connections on your
computer.

The Event Log file is a text document which records the same information that Timbuktu records in
the Windows Application Event Log.

The Windows Application Event Log also logs guest and host service events.

Advertising