Data Transfer Encryption
All traffic that Remote Utilities sends over the network is encrypted. The program uses TLS 1.2 for secure communication between Viewer and Host. Encryption is always on and cannot be disabled by the user. Transferred data is encrypted regardless of connection type and user license.
Address Book Encryption
You can encrypt your address book to protect it in case your Viewer workstation has been compromised. This is especially important if you save your access passwords in your address book.
Enable two-factor authentication for your remote Hosts to prevent unauthorized access in case someone guessed or otherwise obtained your Host access password. You can use Google Authenticator or a similar 2FA app which will provide the code to log in.
Host Identity Check
The certificate-based Host identity check mechanism ensures that you are connecting to the same Host you intended to connect. In case the Host certificate is changed the Viewer immediately raises a red flag and shows a warning for you to decide on further action.
You can deploy and use Remote Utilities in a totally isolated environment — no communication with our company's web servers is necessary:
- Establish direct connection with remote computers on the same LAN or VPN.
- Enable connecting through Host to use one of your Hosts to broker connection with other Hosts on the same LAN.
- Run a self-hosted server to route your Internet-ID connections, synchronize your address book between multiple techs and authorize on remote Hosts in one click.
No Blank Passwords
Regardless of the authorization method you choose, blank passwords are not allowed. There are no default or technical passwords either. Only you and the people you authorize will know how to access the Host that you have installed.
Brute-Force Attack Protection
Remote Utilities is protected against brute-force password cracking. Whenever there is an excessive number of incorrect password attempts, the system automatically begins to increase the amount of time required before each new attempt can be made.
Additionally, the system can algorithmically determine whether the Host is under brute-force attack and temporarily ban the originating IP address.
No Stealth Mode
A persistent Host icon in the system tray informs the remote user that Remote Utilities is running on their computer. The program also appears in the process list. This ensures that the remote user can always stop or uninstall the Host, provided they have administrative privileges.
Ask User Permission
When enabled the Ask user permission option shows a message on the remote computer asking the remote user to accept or reject an incoming remote session request. Additionally, you can set a timeout and a default action to apply in case there is no one attending the remote PC. The request can be accepted or rejected automatically according to your settings.
With IP filtering enabled, you can restrict a remote Host and RU Server to accept incoming connections from certain IP addresses only.
A white list allows you to set trusted IP addresses whereas connections from all other IP addresses that do not fall in the trusted range will be declined. A black list allows connections to the given Host from all IP addresses or IP address ranges except the ones which you have explicitly blacklisted.
Host Settings Protection
Protect the Host settings from modification by the remote user by locking the settings with a password. You can also hide the Host right-click menu so the menu won’t show when the Host icon is clicked.