Download page Shadow.
Menu path: System > Remote Access > Shadow
For helpdesk purposes, you can observe the endpoint device via shadowing. This is possible via IGEL VNC Viewer in the Universal Management Suite (UMS) or another VNC client (e.g. TightVNC). For detailed information on shadowing, see Shadowing (VNC).
For Remote Working, Use Secure Shadowing
If the endpoint device is in a mobile or work-from-home environment, it is highly recommended to use secure shadowing only. Regular shadowing without encryption poses a security risk.
Allow remote shadowing
☑ Desktop content can be viewed from remote computers with VNC software.
☐ VNC shadowing is not allowed. (Default)
If Allow remote shadowing is activated, you can change the following settings:
☑ Communication will be secured via SSL/TLS and shadowing will only be possible for UMS administrators.
☐ Communication will not be secured via SSL/TLS. (Default)
Further information regarding secure shadowing can be found under Secure Shadowing (VNC with TLS/SSL).
☑ The remote user must enter a password before shadowing can begin.
☐ The remote user does not require a password for shadowing. (Default)
Password: Password for the VNC connection
Prompt user to allow remote session
☑ The local user will be asked for permission before shadowing. (Default)
Allow user to disconnect remote shadowing
☑ A button with which the user can terminate the connection is shown. (Default)
Allow input from remote
☑ The remote user can make entries using the keyboard and mouse as if they were the local user. (Default)
Scale frame buffer
☑ The screen content of the shadowed device is reduced or enlarged by the scaling factor before being transferred.
☐ The screen content is transferred in the original size. (Default)
Scale factor: Factor by which the screen content of the shadowed device is enlarged or reduced. (Default: 1.0)