Remote control without the remote or the control

You’ve configured one of your workstations to act as a host for Remote Desktop Connection, but other workstations on the network cannot connect to the host. All of the settings in Remote Desktop appear to be correct. Which of these is the most likely cause of this issue?

Microsoft 70-680: 6.5 – Remote Connections – Part 2

Now that your remote VPN connection is running, you can take advantage of some Windows 7 technologies to make the most of your limited bandwidth. In this video, you’ll learn about Windows’ NAP technology, the process for auditing your remote connections, and how to publish individual applications using Remote Desktop’s RemoteApp feature.

Microsoft 70-680: 6.4 – Remote Connections – Part 1

Virtual Private Networks allow us to take our computers anywhere and still maintain a secure network connection back to our central office. In this video, you’ll learn how VPNs authenticate and tunnel our network traffic into a secure encrypted link.

Microsoft 70-680: 4.6 – Remote Management

If you’re managing a large number of Windows 7 desktops, then you’ll also need a way to manage those devices from a remote computer. In this video, you’ll learn about Remote Assistance, Remote Desktop, and how to run shell scripts and PowerShell scripts on remote computers.

CompTIA Network+ N10-004: 6.5 – Device Security

The security of the devices on our network must be managed through both physical and technological means. In this video, you’ll learn the importance of good physical security, methods to restrict local and remote access to our devices, and the applications and protocols that you can use to build a more secure networking environment.

CompTIA Network+ N10-004: 6.3 – Network Access Security

The network is a wide-open space, but there are a number of technologies that network and security professionals can use to help control access to critical parts of the network. In this modules, you’ll learn about filtering technologies, tunneling and encryption methods, and remote access applications and protocols.