Proxy Host Settings -Deployment Checklist
Use this pre-deployment guide to review and determine your ideal Host settings. You have a range of options!
The Proxy Host client can be configured with wide range of settings combinations to suit your company’s needs, including defining multiple host configurations for every different endpoint group. Below are the main settings categories that you need to consider.
1. Connection Style
|The default connection behavior of the Proxy Host is to “click & connect” and “get right in”. For environments that require end-user approval for all connections, we have two options: Grant and Request access. Also note that there is a “Bypass Connection Permission” override option available which will allow for immediate access regardless of the access setting selected.|
When set to Grant, Proxy Networks can either connect to the machine as it was left, or can lock the Host workstation upon connection, which would require the connected user to log into Windows before using the machine.
|Connection Style Setting||Behavior||Preference|
|No Permission Required||Click & Connect|
|Grant||Connect only with end-user approval|
|Request||Connect with end-user approval then connect after “X” number of seconds if no response|
2. Connection Behavior
|Thinking about the end-point user consider the following options and which are best suited for your specific environment.|
Tray Icon – The tray icon can be hidden at all times, visible at all times, or visible only during connections.
Connection Notification – Turn on or off the pop-up message in lower-right hand corner of the screen indicating the identity of users connecting/disconnecting. And, optionally, end users can be notified when a File Transfers occurs.
Beep on Connect/Disconnect – Enable or disable audible connection beeps (disable for Stealth Mode).
|Connection Behavior Setting||Available Values||Preference|
|Tray Icon (Idle)||Hidden or Visible|
|Tray Icon (Active)||Hidden or Visible|
|Visual “Toast” Icon||Hidden or Visible|
|Audible Beeps on Connect/Disconnect||Enabled or Disabled|
|Show active users list on connect||Enabled or Disabled|
3. Proxy Host Naming Conventions
|Customer administrators don’t always like their current end-point naming conventions, so the Proxy Host machines can be configured to present themselves to you in a variety of ways. Consider how you would prefer your host machines should be listed in your console.|
Whether it is by computer name, user name, domain or user full user name, think about how you would want to search for your specified host machines.
|Connection Behavior Setting||How Proxy Host is listed||Preference|
|Show Proxy Hosts by PC name||DELL-XPS-123 (default)|
|Show logged-in user and PC name||Jsmith is logged into DELL-XPS-123|
|Show logged-in user with domain and PC name||DOMAIN/jsmith is logged into DELL-XPS-123|
|Show first name followed by last name||John Smith|
|Show first name followed by last name and the computer name||John Smith is logged into DELL-XPS-123|
4. Effects and Connection Optimization
By default, a Proxy Host machine allows the connected user to enable or disable chosen effects. Some customers require stealth mode where effects are never disabled and some customers always have the background disabled to speed up connection time.
Upon Request - Allows the connected user to decide which effects are enabled/disabled for connections
Always Disable - Certain effects can be disabled for all connections, such as the wallpaper, which can speed up the initial connection timeThe default setting is "Upon Request", allowing the technician to determine what effects he or she wants enabled/disabled during the remote session.
|Effects and Connection Optimization||Description||Preference|
|Never disable effects||If enabled, no changes are made (Stealth mode)|
|Upon request, Master user my choose effects||Master user can toggle selected effects on/off (default)|
|Always disable selected effects||Selected items will always be ignored|
|Screen Capture Modes|
|Kernel Mode Screen Capture||The default and optimal choice for most scenarios|
|User Mode Screen Capture||For advanced use cases and/or special scenarios|
5. Locking down the Proxy Host
On any given machine, members of the local administrators group will have Full Control / Administration over the Proxy Host Control Panel by default. If your end users are not local administrators, no special instructions here apply.
Windows Authentication - Ideal for any modern Windows Active Directory Domain environment. If end users are not local Administrators, but your IT Administrators are, no special instructions apply.
Simple Password - Ideal for Proxy Host machines that will not be joined to your domain. The Proxy Host Control Panel can be "password protected", meaning that a password would be required to view / edit Proxy Host settings.
|Locking down the Proxy Host||Recommendation||Preference|
|Windows Authentication||Recommended for domain environments|
|Simple Password||Recommended for non-domain joined machines|
For a complete listing of all available Proxy Host-side settings, including additional "Station Name" values and more, please visit the Proxy Host Manual PDF included in any Proxy Networks software zip file.
The Proxy Networks Support Team would like to ensure a smooth deployment and operation of Proxy Networks software for all our customers and you are welcome to check with us at any point for help, guidance, best practices and training. For technical assistance, write to firstname.lastname@example.org, submit a ticket at proxynetworks.com or give our Support Line a call at 617-453-2710 for any immediate issues or questions.