GoToAssist Express Best Practices Guide to Unattended Support



Similar documents
Citrix GoToMyPC Corporate Provisioning Tool. Seamlessly integrate the GoToMyPC Corporate solution with your existing support infrastructure.

GoToAssist Remote Support HIPAA compliance guide

Three reasons. why IT pros choose GoToAssist over the competition. Real customers share their insights on IT support tools.

Citrix GoToAssist Service Desk Security

Corporate and Payment Card Industry (PCI) compliance

How to Increase Your Sales Close Rates with Video Conferencing

HIPAA compliance. Guide. and HIPAA compliance. gotomeeting.com

GoToMyPC Technology Making Life Simpler for Remote and Mobile Workers

The Virtual Learning Advantage: Designing a Best-in-Class VILT Program

WHITE PAPER. GoToMyPC. Citrix GoToMyPC Corporate Security FAQs. Common security questions about Citrix GoToMyPC Corporate.

Citrix GoToAssist Corporate 9.0. Reviewer s Guide. Featuring the New Addition of. Mac Support

5 Reasons Why GoToAssist Remote Support and Service Desk Go Better Together

Workplace mobility and the small business

How to Use Remote Access Using Internet Explorer

Remote Access: Internet Explorer

GoToMyPC Corporate Advanced Firewall Support Features

Secure Global Desktop (SGD)

How To Connect To A Wireless Network On Windows 7 (Windows 7) On A Pc Or Mac Or Ipad (Windows) On Pc Or Ipa (Windows 8) On Your Computer Or Mac (Windows). (Windows.7) On An

Remote Access End User Reference Guide for F5 Edge VPN Client Access

How to Remotely Access the C&CDHB Network from a Personal Device

Remote Access: Citrix Client Setup

Guide: Using Citrix for Home/ Office

USERS GUIDE. How to acquire an Associate Digital Identity Certificates from the ica Identity Authority and Configure MAS

GoToMeeting. Citrix Online. User Guide. Organizing, Conducting, Presenting and Attending Web Meetings. GoToMeeting User Guide. Version 4.

Registered Trademarks and Proprietary Names

GoToAssist Corporate Integration White Paper

Citrix Client Install Instructions

NASDAQ Web Security Entitlement Installation Guide November 13, 2007

Registered Trademarks and Proprietary Names

Driving IT help desk efficiency with customer-centric remote support

HP MediaSmart Server Software Upgrade from v.2 to v.3

Marketo GoToWebinar Adapter. User Guide Version 3.5

eduroam Overview and Device Configuration

Installing NICE Windows under Parallels for Mac

Access to applications and the network depends on whether or not you are using personal equipment or a Firm-issued laptop or desktop.

Disabling Microsoft SharePoint in order to install the OneDrive for Business Client

GoToMyPC Corporate Administrator Guide

Automatic Setup... 1 Manual Setup... 2 Installing the Wireless Certificates... 18

For Attendees. Joining a Training. GoToTraining User Guide

Windows 7 Hula POS Server Installation Guide

Single Sign-On Administrator s Guide

Control Panel User Guide

Remote Access End User Reference Guide for SHC Portal Access

Secure Virtual Assist/ Access/Meeting

Installation Guide. Research Computing Team V1.9 RESTRICTED

Logging into LTC Instant Access the First Time

Contents. VPN Instructions. VPN Instructions... 1

Yale Software Library

Technical Publications. Author: Zultys Technical Support Department

SSL VPN Service. Once you have installed the AnyConnect Secure Mobility Client, this document is available by clicking on the Help icon on the client.

INSTALLATION AND CONFIGURATION GUIDE (THIS DOCUMENT RELATES TO MDAEMON v ONWARDS)

Connect to the Sheridan College / Gillette College - STUDENT Secure Wireless Network with the PEAP Client (Windows XP Pro)

CONNECTING TO THE DTS WIRELESS NETWORK USING WINDOWS VISTA

HPUG_1014. Shaw Home Phone. User Guide

Internet Access Gateway Logon Instructions IAG Platform, XP

Openbooks - Setting up bank feeds

Install and End User Reference Guide for Direct Access to Citrix Applications

Welcome to Mobile Banking. Sunflower Bank Mobile Banking Personal User Guide

Connecting to the Rovernet WPA2 Secured Wireless Network with Windows 7

SHC Client Remote Access User Guide for Citrix & F5 VPN Edge Client

Junos Pulse VPN Client Installation

Provider OnLine. Log-In Guide

How do I use Citrix Staff Remote Desktop

Online Services User Guide

Technical Note. Configuring Outlook Web Access with Secure WebMail Proxy for eprism

UMMS SSL VPN Instructions

Extension Wireless Access (EWA) v2.0

Contents Notice to Users

Installation and Troubleshooting Guide for SSL-VPN CONNECTIONS Access

Setting up Remote Desktop

Getting Started. Getting Started with Time Warner Cable Business Class. Voice Manager. A Guide for Administrators and Users

Getting Started with VMware Horizon View (Remote Access)

Express222 Quick Reference

PRACTICE LINK. Getting Started. version 1.0.x. Digita Support: Digita Sales: digita.com

HGC SUPERHUB HOSTED EXCHANGE

Instant Net Conference Powered by Cisco WebEx Technology Meeting Center

Expertcity, Inc. GoToMyPC User s Guide. GoToMyPC User s Guide. Version 3.0

Troubleshooting Account Lockouts/Password Resets

Department of Public Health S A N F R A N C I S C O

Carroll Hospital Center

VPN Configuration Guide WatchGuard Fireware XTM

Global Banking and Bill Pay

Hallpass Instructions for Connecting to Mac with a Mac

SupportNet Technical Services

Overview Using the Secure Desktop Agent Troubleshooting... 10

Two-Factor Authentication (2FA) Registration Instructions Symantec VIP Access

Using the Remote Desktop Portal

Remote Working from a Mac computer

WebsiteAlive Operator Panel. A WebsiteAlive How-To Guide

To add Citrix XenApp Client Setup for home PC/Office using the 32bit Windows client.

LRDC Computing Services

Transcription:

Express Best Practices Guide to Unattended Support One of the most useful features of Express, Unattended Support enables support providers to deliver assistance to a customer s PC even when the customer is not present. Unattended Support multiplies the convenience and productivity of attended remote support. Technical problem resolution or routine maintenance can be flexibly scheduled at times most convenient for both the support provider and the customer, even after normal work hours. Drawing on the ideas and experiences of IT professionals, help desk managers and consultants, we have compiled this best practices fact sheet to help you get the most out of Unattended Support and our remote support solution. How Unattended Support works During a live support session, you, the support technician, send the customer a request asking permission to install Unattended Support on their PC. Once permission is granted, you create a nickname and an access code for the computer, enabling you to access that machine when the client is away. Or, during an onsite visit, you can log in to Express and perform the installation directly on your customer s computer. When you want to access that computer, click the Express system tray icon, select the computer from your list of unattended computers and type in your access code. Now you are ready to use all s remote-support tools and features, including reboot and reconnect. (Note: Your customers need to leave their computers ON for you to work on them remotely. Unattended Support is currently unavailable for use with Mac computers.) Summary best practices When setting up Unattended Support, explain to your customer how Unattended Support will let you access their computer and deliver technical support when they are not present. Give the customer a tour of the system tray once Unattended Support is installed. Show them how to revoke access or block it temporarily at any time. www.gotoassist.com

Establish ground rules. Decide with your customer on the times of day you are likely to access their computer. Call or email your customer ahead of time when you ll be accessing their computer. Provide your customer with a report of your Unattended Support work. Always choose the longest, most complex access code you can tolerate. Organize your list of Unattended Support computers for easy access. Choose names for your unattended machines that will best utilize the Express search function. Obtaining your customer s permission and building trust When setting up Unattended Support, always explain to your customer how Unattended Support will let you access their computer and deliver technical support when they are not present. Unattended Support may be installed during a remote support session or when the support provider is on-site, physically at the customers machine. When the support provider requests unattended support privileges during a remote support session, shows the customer an informative dialog and asks their permission to install Unattended Support. The customer must give consent; the support provider is not allowed to interact with the approval dialog on behalf of the customer. The support provider may also set up Unattended Support when engaged in on-site support. In this case, the request and customer approval are made in either verbal or written form. At the end of the day, your customer places their trust in you the person with whom they have a business relationship and not in any piece of software. It s important that you build their trust in you by talking them through the process and explaining the concept of Unattended Support to them. Explain when and how you will be using this functionality. Once you ve installed Unattended Support, give the customer a tour of the system tray. Show them how to revoke access or block it temporarily at any time. 2

Maintaining security with access codes Once the customer has approved the implementation of Unattended Support, the support provider needs to choose a strong access code. Always choose the longest, most complex access code you can tolerate. It s better to choose a real doozy, write it down and put it in your wallet, than to choose something easy to guess. Bear in mind that the access code is the cornerstone of the security guarantees that provides. Choose a different access code for every unattended host you set up. If someone manages to learn one of your access codes, they won t be able to leap-frog into every computer that you manage. Along with providing the correct access code, the support provider must provide any Windows or application authentication credentials required when accessing an unattended support computer. Local security controls on the customer s PC are never overridden. Note: Your customer s Windows password can be encrypted and stored on their PC. During the initial Unattended Support setup, the customer will be prompted to enter their password, which remains private and is never transmitted over the Internet. At your customer s Windows login, you can then click a link at the top of the screen to populate the password field with the customer s private Windows password. 3

In addition, if the customer agrees to this password storage, they will need to reenter the password with every Windows password alteration, usually every 90 days. Scheduling and initiating unattended sessions It s a good idea to call or email your customer ahead of time when you ll be accessing their computer. Even though your customer has given you permission, they may find it disorienting to have someone jump into their computer while they are using it. Remember to check the computer status in the Unattended Support dialog before you connect. Computers that show up as in use are being actively used by someone who is physically at the machine, and you should think twice (or maybe call them) before connecting. Establish ground rules with customer. When you set up Unattended Support, decide with your customer on the times of day you are likely to access their computer. Find a schedule that works for them and honor it. 4

Keeping a record of all work and informing customers Use s session notes feature to keep a log of what you do during every Unattended Support session. As a best practice, we recommend you provide your customer with a report of your Unattended Support work. Email or call your customer after every session and notify them of what you did. You can even generate a weekly or monthly report of session notes and send it to your customer to demonstrate the value you ve provided. Organizing your list of Unattended Support machines As you add more and more computers to your Unattended Support list, it can become tricky to quickly locate the one you re after. It s necessary to organize your list of Unattended machines so that it s easy to find the one you desire. Organize your list of Unattended Support computers for easy access. Choose names for your unattended machines that will best utilize the Express search function. First, note that the Unattended Support list has a search tool located in the lower right corner to help you locate the desired PC. The search function is subtractive so as you enter characters the names that do not match are removed. The trick is to decide on a naming convention for Unattended machines that makes good use of this search, for example Company Initials: Department: User Name = CTX:GCS:GlennD This simple naming convention will make supporting multiple clients and users a lot easier. You can use this naming convention to organize and group machines by company, department or other subsets. As an added bonus, your reports will be easier to read when it comes to billing for your services. 5

For more discussion of the Unattended Support feature, please consult the Express User Guide. Other suggestions for best practices? Log in and post them on the Express Forum. Citrix Online Division 7414 Hollister Avenue Goleta, CA 93117 U.S.A. T +1 805 690 6400 info@citrixonline.com Media inquiries: pr@citrixonline.com T +1 805 690 2969 Citrix Online Europe Middle East & Africa Citrix Online UK Ltd Chalfont Park House Chalfont Park, Gerrards Cross Bucks SL9 0DZ United Kingdom T +44 (0) 800 011 2120 europe@citrixonline.com Citrix Online Asia Pacific Level 3, 1 Julius Avenue Riverside Corporate Park North Ryde NSW 2113 Australia T +61 2 8870 0870 asiapac@citrixonline.com About Citrix Online Citrix Online solutions enable people to work from anywhere. Our products include for remote support, GoToManage for IT management, GoToMeeting for online meetings, GoToMyPC for remote access, GoToTraining for interactive online training and GoToWebinar for larger Web events. 2010 Citrix Online, LLC. All rights reserved. Citrix is a registered trademark of Citrix Systems, Inc., in the United States and other countries., GoToManage, GoToMeeting, GoToMyPC, GoToTraining and GoToWebinar are trademarks or registered trademarks of Citrix Online, LLC, in the United States and other countries. All other trademarks and registered trademarks are the property of their respective owners. 6 1.10.11/B-37045/PDF