All data between the remote and local PC is encrypted using secure encryption algorithms (a 2048-bit public key and AES with a 256-bit session key). For more information please download our Security Overview.

Although the firewall bypass (Internet-ID) connection is supposed to go through firewalls in the majority of cases, in some cases it might not work because of an overly-strict network security policy. Please refer to the Ports and port forwarding section of the product documentation.

Yes. You can install and use a self-hosted server at no charge.

Yes. Install the Host module on the remote computer for 24/7 access.

Yes, you can. When prompted for password select the Save password checkbox:

Save password dialog

Alternatively, you can enter and save the access password on the Security tab in connection properties.

Yes. Use the built-in MSI Configurator to prepare an MSI installer and then deploy that file on your network using remote installation. You can also push-install Remote Utilities in a Windows domain using GPO.

No. Remote Utilities is stand-alone software. Its main modules - Viewer and Host — must be installed on the local and remote PC respectively.

You can also use a run-only version of the Host called Agent as well as portable and mobile versions of the Viewer. All modules are downloadable from the site.

You can share your address book (connection list) in different ways. Please, refer to the Sharing address books section.

No, Remote Utilities does not require JRE, ActiveX or other frameworks for operation.

No. We use our own remote connection protocol.

For licensing FAQ please visit this page.