Not looking for webex help?
You may have arrived here inadvertently. Did you type qbp.webex.com in the SEARCH
instead of the ADDRESS box. If so, try again, but while you are here,
browse, see all the QuickBooks help we have to offer.
Remote Access provides several security
features to protect your remote computer and data from unauthorized
Strong data encryption—Remote Access secures all connections that you
establish with a remote computer with a proprietary encryption format. All
data that traverses an Remote Access connection—including screen images,
file transfers, and keyboard and mouse input—is fully encrypted. For even
greater security, your Remote Access Web site can be configured to use
128-bit SSL (Secure Sockets Layer) data encryption—the leading Internet
standard for securing data transmission.
Multi-level authentication—To access a computer remotely, you must
authenticate yourself at two levels:
At the first level, you must log in to your Remote Access Web site, using
your email address and the password for your account.
At the second level, you must provide a unique access code that you
specify. You can choose one of two methods of second-level
authentication—access code authentication or phone authentication.
If you choose access code authentication, you must provide a unique
password to access a remote computer (for best security, regularly change
all passwords). This password resides only on the remote computer—not on a
Remote Access Server. For even greater security, you can choose phone
authentication, in which a Remote Access Server calls you at a phone
number that you specify. You must then provide a unique pass code, using
your phone's keypad, to access the remote computer.
Hardware locking—Once you establish a connection with a remote computer,
you can disable the computer keyboard and mouse, thereby preventing anyone
at the remote location from using the computer.
Private screen—Once you establish a connection with a remote computer, you
can make the computer's screen blank, thereby preventing anyone at the
remote location from viewing the contents on the screen.
Remote system locking—Before you end a Remote Access session, you can
access options to log off from or lock a remote computer that is running
Windows NT or 2000, by sending a Ctrl+Alt+Del command to the computer.
Connection time-out—You can specify a number of minutes after which a
Remote Access session automatically ends if there is no activity. A
time-out period prevents a remote computer from inadvertently being left
online for long periods of time and exposing it to hacker attacks. Access
sessions that are inactive for 30 minutes will terminate automatically.
Application-level access control—You can set up Remote Access so you can
access only specific applications on a remote computer, rather than its
entire desktop. This options prevents remote access to other applications
and data on the desktop, and network resources.
Status logging—The Access Anywhere Agent keeps a log of all changes to the
status of a remote computer. The log includes the IP address of any
computer that establishes a remote connection to the computer. You can
check the log to verify that no unauthorized access has occurred