Disconnected from Host during Windows log offViewed 2763 times since Wed, Dec 7, 2011 4:12 PM
With a Netop Host running on legacy Microsoft operating systems like Windows XP it was possible for the Guest to remain connected to the the Host during the log off and logon process. Due security changes in implemented by Microsoft in the architecture of their next generation of operating systems like Vista, Windows 7, Server 2008 & 2012, etc., Windows handles user sessions differently. It is necessary for the Netop Host application to unload and reload itself into the correct session when Log Off or Switch User is used either locally or during a remote control session.
During this process the Guest user will not have screen transfer and control over the keyboard and mouse until the Host is reloaded and the remote session is initiated again. To help improve the usability in such scenarios, the Guest (version 10.0 or newer) will automatically attempt to reconnect to the Host machine and re-establish the remote control session without prompting the same Guest user for their login credentials.
We are aware of the limitations this causes in such environments where auto-logon is utilized and where the Guest user may need to interrupt this auto-logon process during a remote control session. Because the remote control session is disconnected and keyboard control is lost during this process it is not possible to interrupt the auto logon process in the usual way. Typically the Windows account used in the auto-logon would be a standard user rather than an administrator. If an administrator needs to logon on to Windows through a remote control session the following strategy could be considered.
The configuration setting for auto logon resides in the Windows registry.
Due to the risks associated with editing the Windows registry, this style of work-around should only be performed by your Windows system administrator and should be thoroughly tested in a lab environment before applying the technique to a production computer.
Example 1: disable force auto logon
REG ADD "HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /v ForceAutoLogon /t REG_SZ /d 0 /f
Example 2: enable force auto logon
REG ADD "HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /v ForceAutoLogon /t REG_SZ /d 1 /f
There are no attachments for this article.