Remote Access provides several security features to protect your remote computer and data from unauthorized access


Advanced QuickBooks Help QuickBooks Help from Advanced Certified QuickBooks Pro Advisors

QuickBooks help with Enteprise Solutions by QuickBooks Enterprise Gurus

  QuickBooks Help from Authorized Quickbooks Affiliates  

QuickBooks Help


We have been selected as one of the top QuickBooks Advisors for the last 3 years

QuickBooks Checks

Deposit Slips,

QuickBooks Software
QuickBooks 2018


 NEW: Invoice Forms
Perforated Payment Voucher

QuickBooks Invoice Forms

 Is your QuickBooks   running slower than an 3 legged tortoise?
  QuickBooks running slow? We can help

QuickBooks Help


Buy W2 & 1099

Buy QuickBooks W2 QuickBooks 1099 Tax Forms

QuickBooks Enterprise Software



QuickBooks remote access security features


Not looking for webex help?  You may have arrived here inadvertently.  Did you type in the SEARCH box instead of the ADDRESS box.  If so, try again, but while you are here, browse, see all the QuickBooks help we have to offer.   

QuickBooks Supplies

QuickBooks laser checks

Save 25% on
QuickBooks checks

$45.95 for 250
$59.95 for 500
$86.95 for  1M

W2s, 1099s
at a discount


Remote access for QuickBooks Pro

QuickBooks Pro Users

Get the benefit of remote access without upgrading to QuickBooks Premier!

Your data's security with

 QuickBooks remote access 

Remote Access provides several security features to protect your remote computer and data from unauthorized access.

Strong data encryption—Remote Access secures all connections that you establish with a remote computer with a proprietary encryption format. All data that traverses an Remote Access connection—including screen images, file transfers, and keyboard and mouse input—is fully encrypted. For even greater security, your Remote Access Web site can be configured to use 128-bit SSL (Secure Sockets Layer) data encryption—the leading Internet standard for securing data transmission.

Multi-level authentication—To access a computer remotely, you must authenticate yourself at two levels:

At the first level, you must log in to your Remote Access Web site, using your email address and the password for your account.

At the second level, you must provide a unique access code that you specify. You can choose one of two methods of second-level authentication—access code authentication or phone authentication.

If you choose access code authentication, you must provide a unique password to access a remote computer (for best security, regularly change all passwords). This password resides only on the remote computer—not on a Remote Access Server. For even greater security, you can choose phone authentication, in which a Remote Access Server calls you at a phone number that you specify. You must then provide a unique pass code, using your phone's keypad, to access the remote computer.

Hardware locking—Once you establish a connection with a remote computer, you can disable the computer keyboard and mouse, thereby preventing anyone at the remote location from using the computer.

Private screen—Once you establish a connection with a remote computer, you can make the computer's screen blank, thereby preventing anyone at the remote location from viewing the contents on the screen.

Remote system locking—Before you end a Remote Access session, you can access options to log off from or lock a remote computer that is running Windows NT or 2000, by sending a Ctrl+Alt+Del command to the computer.

Connection time-out—You can specify a number of minutes after which a Remote Access session automatically ends if there is no activity. A time-out period prevents a remote computer from inadvertently being left online for long periods of time and exposing it to hacker attacks. Access sessions that are inactive for 30 minutes will terminate automatically.

Application-level access control—You can set up Remote Access so you can access only specific applications on a remote computer, rather than its entire desktop. This options prevents remote access to other applications and data on the desktop, and network resources.

Status logging—The Access Anywhere Agent keeps a log of all changes to the status of a remote computer. The log includes the IP address of any computer that establishes a remote connection to the computer. You can check the log to verify that no unauthorized access has occurred

Click on this link for an article that provide detailed descriptions of how remote access works:

How does remote access work in QuickBooks Premier?

Does the computer need to be turned on? Who will see me working remotely?  How many computers can I remotely access? Does QuickBooks need to be installed on both the remote and the host computer?  Answers to these questions and more. See QuickBooks Remote Access

Link to:

QuickBooks Premier:  Exciting new features

QuickBooks Help Home