Management and Security powered by Landesk

Customizing the viewer and remote control agents

The remote control viewer has command-line options you can use to customize how it works. You can also adjust the remote control agent registry keys on devices if necessary. Normally these registry keys are set by the remote control agent configuration that you deploy to devices.

Viewer command-line options

You can launch the remote control viewer using a command-line option that immediately opens a viewer window, connects to a specific device, and activates the viewer features you want, such as remote control, chat, file transfer, or device reboot. The remote control program, isscntr.exe, is in the main ManagementSuite program folder.

Remote control command-line options use the following syntax:

isscntr /a<address> /c<command> /l /s<core server>

If your core server uses certificate-based security or integrated security for remote control, you must use the /s parameter to specify the core server.

Option Description

/a<address>

Contact a device at a particular TCP/IP address. The TCP/IP address may include both numeric- and name-style addresses, separated by semicolons. You can also specify the hostname.

/c<command>

Start the remote control viewer and run a particular feature. (See command names below.) You can specify multiple /c arguments on one command line. For example:

isscntr /agamma /c"remote control" /c"file transfer"

You can choose from these features:

Remote control: Open a remote control window

Reboot: Reboot the given device

Chat: Open a chat window

File transfer: Open a file transfer session

System info: Open a window displaying information about the device, including OS, memory, and hard drive space.

/l

Limit the viewer interface so it only displays the features you specify with /c.

/s<core server>

If you're using certificate-based security, use this option to specify the core server to authenticate with. This option is helpful if you're remote-controlling clients in a multi-core environment. If your core server uses certificate-based security or integrated security for remote control, you must use the /s parameter to specify the core server.

Example 1

Opens the viewer window. Any changes made, such as sizing the connection messages window or setting performance options are retained from the last time the viewer window was used.

isscntr

Example 2

Launches a remote control session connecting to the device named "gamma." (Note that there is no space and no punctuation between "/a" and "gamma.")

isscntr /agamma /c"remote control"

Example 3

Launches a remote control and chat session connecting to the device named "gamma". Remote control first attempts to try to resolve the name "gamma". If this fails, it attempts to connect to the numeric address 10.10.10.10:

isscntr /agamma;10.10.10.10 /c"remote control" /c"chat"

Example 4

Port 9535 is used to communicate between the viewer and agent computers. If devices running issuser.exe are configured to use a port other than 9535, the port must be passed as part of the address given to isscntr.exe. For example, to remote control a device with address 10.4.11.44, where issuser.exe is configured to use port 1792 as the verify port, the command line would be:

isscntr /a10.4.11.44:1792 /c"remote control"


Was this article useful?    

The topic was:

Inaccurate

Incomplete

Not what I expected

Other