Installer Link

Installer Link

Just copy the installer link right from our website or send the link through email to your customers. No longer do you need to download the unattended access installer and send it to your customers every time to add a computer to your unattended access list. Your customers just have to execute the downloaded file to complete the unattended access configuration.

Steps

  • Go to Settings and choose Deployment under Unattended Access.
  • Choose Deployment link.


  • Click COPY to copy the link to the clipboard. You can send the copied link through Chat/IM or Email.(OR)
  • Click SEND to send the installer link through email. You can customize the email if needed. 


  • Ask your customer to click on the shared link. 
  • Once the page opens up, ask him/her to click on Download.
  • Double click on the downloaded file and run the application.
  • Once executed the configured computer will be added to your unattended computers' list.
  • Preview the email created and click Save for future use of the customized email template.
  • Go to Unattended Access and click on CONNECT given beside the newly added computer to start a remote access session.

    • Related Articles

    • Link issues

      Link issues and create dependencies to track and close them. You can associate issues based on a criterion, restrict issue closure, set dependencies, duplicate and clone issues. And you can link issues using the default link types such as Blocks, ...
    • Unsubscribe Link

      This feature helps you generate an unsubscribe link for the email recipients. Using this link, the email recipients can opt out of receiving emails from your organization. To generate an unsubscribe link: Click Setup > Templates > Unsubscribe Link. ...
    • Embed a meeting link

      Embed your meeting link in your organization website so that anyone can join your meeting by entering their email address. This feature comes in handy when multiple meetings happen in your organization at the same time. Participants can visit the ...
    • Field and Link Permission

      Set Access Permissions for Fields With the field-level security, you can control the access rights of Recruit fields for various profiles. This will ensure smooth security at the field-level, allowing users to access the fields that are relevant to ...
    • Deployment

      Configure computers for unattended access by installing the unattended access installer. You can configure unattended access on individual computers by asking your customer to execute the file downloaded from the unattended access installer link. You ...