Proxy Host Settings -Deployment Checklist

Use this pre-deployment guide to review and determine your ideal Host settings. You have a range of options!

The Proxy Host client can be configured with wide range of settings combinations to suit your company’s needs, including defining multiple host configurations for every different endpoint group. Below are the main settings categories that you need to consider.

1. Connection Style

The default connection behavior of the Proxy Host is to “click & connect” and “get right in”. For environments that require end-user approval for all connections, we have two options: Grant and Request access. Also note that there is a “Bypass Connection Permission” override option available which will allow for immediate access regardless of the access setting selected.

When set to Grant, Proxy Networks can either connect to the machine as it was left, or can lock the Host workstation upon connection, which would require the connected user to log into Windows before using the machine.


Connection Style SettingBehaviorPreference
No Permission RequiredClick & Connect 
GrantConnect only with end-user approval 
RequestConnect with end-user approval then connect after “X” number of seconds if no response 


2. Connection Behavior

Thinking about the end-point user consider the following options and which are best suited for your specific environment.

Tray Icon – The tray icon can be hidden at all times, visible at all times, or visible only during connections.

Connection Notification – Turn on or off the pop-up message in lower-right hand corner of the screen indicating the identity of users connecting/disconnecting. And, optionally, end users can be notified when a File Transfers occurs.

Beep on Connect/Disconnect – Enable or disable audible connection beeps (disable for Stealth Mode).


Connection Behavior SettingAvailable ValuesPreference
Tray Icon (Idle)Hidden or Visible 
Tray Icon (Active)Hidden or Visible 
Visual “Toast” IconHidden or Visible 
Audible Beeps on Connect/DisconnectEnabled or Disabled 
Show active users list on connectEnabled or Disabled 


3. Proxy Host Naming Conventions

Customer administrators don’t always like their current end-point naming conventions, so the Proxy Host machines can be configured to present themselves to you in a variety of ways. Consider how you would prefer your host machines should be listed in your console.

Whether it is by computer name, user name, domain or user full user name, think about how you would want to search for your specified host machines.


Connection Behavior SettingHow Proxy Host is listedPreference
Show Proxy Hosts by PC nameDELL-XPS-123 (default) 
Show logged-in user and PC nameJsmith is logged into DELL-XPS-123 
Show logged-in user with domain and PC nameDOMAIN/jsmith is logged into DELL-XPS-123 
Show first name followed by last nameJohn Smith 
Show first name followed by last name and the computer nameJohn Smith is logged into DELL-XPS-123 


4. Effects and Connection Optimization

By default, a Proxy Host machine allows the connected user to enable or disable chosen effects. Some customers require stealth mode where effects are never disabled and some customers always have the background disabled to speed up connection time.

Never Disable Effects - Ideal for "Stealth Mode" where no changes to the desktop will be made during connections

Upon Request - Allows the connected user to decide which effects are enabled/disabled for connections

Always Disable - Certain effects can be disabled for all connections, such as the wallpaper, which can speed up the initial connection timeThe default setting is "Upon Request", allowing the technician to determine what effects he or she wants enabled/disabled during the remote session.


Effects and Connection OptimizationDescriptionPreference
Never disable effectsIf enabled, no changes are made (Stealth mode) 
Upon request, Master user my choose effectsMaster user can toggle selected effects on/off (default) 
Always disable selected effectsSelected items will always be ignored 
Screen Capture Modes  
Kernel Mode Screen CaptureThe default and optimal choice for most scenarios 
User Mode Screen CaptureFor advanced use cases and/or special scenarios 


5. Locking down the Proxy Host

On any given machine, members of the local administrators group will have Full Control / Administration over the Proxy Host Control Panel by default. If your end users are not local administrators, no special instructions here apply.

There are two ways to lock down the Host machine depending on your environment.

Windows Authentication - Ideal for any modern Windows Active Directory Domain environment.  If end users are not local Administrators, but your IT Administrators are, no special instructions apply.  

Simple Password - Ideal for Proxy Host machines that will not be joined to your domain.  The Proxy Host Control Panel can be "password protected", meaning that a password would be required to view / edit Proxy Host settings.


Locking down the Proxy HostRecommendationPreference
Windows AuthenticationRecommended for domain environments 
Simple PasswordRecommended for non-domain joined machines 


For a complete listing of all available Proxy Host-side settings, including additional "Station Name" values and more, please visit the Proxy Host Manual PDF included in any Proxy Networks software zip file.

The Proxy Networks Support Team would like to ensure a smooth deployment and operation of Proxy Networks software for all our customers and you are welcome to check with us at any point for help, guidance, best practices and training.  For technical assistance, write to, submit a ticket at or give our Support Line a call at 617-453-2710 for any immediate issues or questions.