LAN management for network management, how to manage the local area network

Updated on technology 2024-04-11
6 answers
  1. Anonymous users2024-02-07

    How is the local area network administered? To control the students' online behavior, it is necessary to deploy the network manager LAN computer monitoring software in the students' computers, and after deployment, only one machine is needed to monitor the computer screen of all students in the LAN, and all computer operations after the employees are turned on.

    1. Remote file management

    3.Batch Upload: You can upload multiple folders or files from the administrator's computer to a specified controlled computer in batches.

    Click File Management, enter any directory, right-click on the blank space, and select Batch Upload, as shown below.

    4.Remote distribution: The files that need to be uploaded and the tasks that the manager needs to perform can be distributed in batches to any number of selected controlled computers and executed. Click File Management, enter any directory, right-click in the blank space, and select Batch Distribution, as shown below.

    2. Asset management

    1.Hardware asset management: Collects and lists the hardware information of the controlled computer, such as CPU, memory, hard disk, motherboard, graphics card, network card, etc. Click Software & Hardware Management - Hardware List to view the information of common hardware.

    2.Hardware changes: Control and count the changes in the hardware devices of the controlled computer.

    Click Software and Hardware Management - Hardware Change to view the hardware change.

    3.Software Asset Management: Collects and lists all installed software on the computer of the controlled end.

    Click Software & Hardware Management - Software List to view the information of the installed software.

    4.Software changes: Control and count the changes in the software of the controlled computer.

    Click Software and Hardware Management - Software Changes to view the software changes.

    3. Behavior control.

    1.Program Running Limitations.

    Click Restriction Settings - Program Running Restrictions.

    3. Program running records.

    In the "History" of the software, you can check the detailed program operation records, including: program operation records, program startup time, end time and usage time.

    3.Software whitelist: Only programs in the specified whitelist are allowed to run, and nothing else is allowed to run.

  2. Anonymous users2024-02-06

    One of the ways to control the LAN computer: use remote desktop management, very simple, assume: you want to use a computer A to control a computer B, then:

    1. There is a remote in the system property settings on computer B, which allows users to remotely link to the computer.

    2. Set the password of computer B superuser;

    3. Set the IP address of computer B.

    4. Run MSTSC on computer A and enter the IP address of computer B, fill in the superuser account and password, and press enter to enter the desktop of computer B, and then you can operate how you want.

    Methods of controlling LAN computers 2:

    Anqishen computer desktop monitoring software;

    Network manager LAN management and control software.

    Zhongke security enterprise LAN management system.

  3. Anonymous users2024-02-05

    Opmanger allows you to classify devices in your LAN based on their subnets. Once the devices are categorized, they are available in the corresponding location under the Subnets tab in the directory.

    Categorizing devices based on their subnets gives you more flexibility for your devices in the monitoring and management area network. Once LAN devices are grouped into a specific subnet, you can click on the subnet and do the following:

    View the details of all devices under the subnet, including their status and the number of connected interfaces.

    Manage devices under a subnet, generate reports for a specific set of devices under a subnet, change monitoring intervals, associate device templates and credentials to a single device or a group of devices under a specific subnet – all from a single screen.

    There is no need to manually classify devices into subnets, just specify a netmask during device discovery and OpManager will automatically classify them.

  4. Anonymous users2024-02-04

    P2P terminators can be used.

    However, if the other party has installed anti-ARP attack software.

    There's no way to control that.

    Of course, you can get the account number of the router and you can do it.

  5. Anonymous users2024-02-03

    You can try the Workwin management expert software, this software can prohibit the running of the software you specify, you can prohibit the use of chat software; Prohibition of the use of browsers, etc.; The software also sends all monitoring information (screenshots, activity window records, violation records, etc.) to the management computer, so that you can easily control the employee's computer.

  6. Anonymous users2024-02-02

    The management of the local area network, control the Internet behavior of students or employees, has nothing to do with what the Internet line is, try the workwin software to understand.

Related questions
15 answers2024-04-11

If the load hits, you need to replace the router otherwise the data exchange will be very slow, which will affect the Internet speed. After the replacement, the router can be turned off to automatically assign IP to the user, and each client must be set in the network connection. Look specifically at the router manual, which is there. >>>More

12 answers2024-04-11

Hello, let's first take a look at "how to set user permissions in the company's local area network", prompting "inaccessible" You may not have permission to use network resources. >>>More

9 answers2024-04-11

1. First, right-click and select Exchange mode.

2. Then enter the user's email address, username and password in the current interface, and click to log in. >>>More

31 answers2024-04-11

Nowadays, pure management software is rare, and most of it is combined with other specific functional software. >>>More

9 answers2024-04-11

According to the department, it would not be bad if the documents of the finance department were taken out and made public. There are also some sensitive documents in various departments. If there is a need to communicate between departments, it is recommended to set the permissions in other departments as low as possible, such as readable, copyable, but not deleted, these are set in the advanced permissions of the permissions. >>>More