12.1

Table Of Contents
Managing security in
Symantec pcAnywhere
This chapter includes the following topics:
Controlling access to pcAnywhere hosts
Protecting session security
Maintaining audit trails
Implementing policy-based administration
Controlling access to pcAnywhere hosts
The first step in securing a computer environment is controlling remote access
to the network. Administrators should limit the number of external entry points
into their networking infrastructure. This objective can be achieved by limiting
the number of network hosts that are available for remote access, and by
implementing secure, remote access server (RAS) and Virtual Private Network
(VPN) solutions in place of individual dial-up devices.
The following are some of the methods that pcAnywhere provides to control access
to pcAnywhere hosts:
Limit connections to specific computer names or IP addresses.
See “Limiting connections to specific computer names or IP addresses”
on page 90.
Serialize pcAnywhere installations.
Symantec pcAnywhere lets you create custom installation packages with an
embedded security code, or serial number. This serial number must be present
on both the host and remote computers to make a connection.
See “Serializing a pcAnywhere installation on page 25.
6
Chapter