With Remote Utilities you can directly access a remote Host. Unlike Internet ID connections, no relay servers are used to broker a direct connection. By definition, this is the fastest connection type available in Remote Utilities.
Generally, to establish a direct connection you must use the remote computer's IP address or DNS/hostname:
You can establish a direct connection over a private network (LAN or VPN) and over the Internet. Usually, when connecting over a private network, no network configurations are required on the Host side. If you connect over the Internet, you may need to set up your router properly, namely create a port forwarding rule. See more information in our documentation.
The Internet ID® is a NAT-traversal (firewall bypass) technology used in Remote Utilities. This technology allows you to connect to a remote PC over the Internet without additional configuration of the firewall and/or router on the Host side.
An Internet ID connection is a connection type that uses the Internet ID technology.
The Host is a remote module installed on a target (i.e. remote) PC. This module works for both unattended and attended access.
You can access the Host settings through the Windows Start menu or by right-clicking its icon in the system tray.
Agent is a remote module for spontaneous-only support. The Agent displays its own window that can be branded with your custom logo and text.
Agent doesn't require installation and administrative privileges to run.
Remote access over LAN or VPN
Establish direct connection to a remote PC using its IP address or DNS name. You can also seamlessly deploy the program in an Active Directory network.
Remote access over the Internet
Use Internet-ID connection to bypass firewalls and NAT devices when connecting over the Internet. No complicated network configuration is necessary.
Deploy the Host module for 24/7 access to remote workstations and servers. The Host starts automatically as a system service.
Provide spontaneous remote support over the Internet using the Agent module. No installation and administrative rights are required.
User Access Control (UAC) prompts can be controlled remotely and are no longer an obstacle (using Host instead of Agent is required to override UAC).