Connections via secure shadowing are always logged in the UMS. Via UMS Administration > Global Configuration > Remote Access > Secure VNC, you can configure whether the user name of the person shadowing is to be recorded in the log:

  • Log user for secure VNC

    The shadowing user is included in the log.

    The shadowing user is not included in the log. (default)

The VNC log can be called up via the context menu of a client or folder (for several clients, Logging > Secure Access Logs). The name, MAC address and IP address of the shadowed client, the time and duration of the procedure and, if configured accordingly, the user name of the shadowing UMS administrator are logged.


Log entries for secure VNC connections


To sort the list (e.g. according to user names), click on the relevant column header or filter the content shown by making entries in the Filter field.