Does not work to stop User2 from seeing User1's screen if User1 is signed in locally.
- Set Windows Security as only authorization method. - Added only User2 permissions on host.
The remote computer can connect using User2 Windows credentials even if User1 is locally signed in. Thus, User2 can see what User1 is doing and has access to all User1's files.
(Also, If no local user is signed in locally, remote computer can connect using User2 Windows credentials, but that doesn't stop User2 from signing in to Windows with User1's credentials if User2 knows User1's password).
Remote PC has two Windows user accounts. User1 uses the computer during the day. User2 needs access when User1 is not on. User2 doesn't want to physically come in after hours to use the computer.
This would almost work by just having User1 log off and leave the computer on. However User1 does not want User2 to have any access to her account. By default, User2 could remote in and see everything when User1 was logged on.
Is there a way in remote Utilities to block remote access by User2 when User1 is signed in to Windows?
Possibly this just mean shutting down the host service when User1 is signed in and restarting it when User1 logs out. Not sure how to do that.
Once I reach the maximum number of endpoints allowed by my license, can I delete some and add others to stay within the limit or am I stuck with the first x I use? For example, I connect to someone for a one-time remote support session. Can I delete that endpoint and connect to the next, and so on?