Unattended Access

Unattended Access

Unattended Access helps you access remote computers even without the presence of the customer at the remote end. You can access both Windows and Mac computers. You can view, manage, control and even troubleshoot the remote computer anytime once a computer is configured for access.

Using mass deployment, you can deploy the unattended agent to large numbers of remote computers at a go. You can enable session confirmation prompt before initiating every unattended session at the remote end if needed. It will notify your remote customer whenever you try accessing the computer. You can troubleshoot effectively using features such as file transfer, screen sharing, chat, reboot, choose between monitors, and more.

    • Related Articles

    • Unattended Access Installation for Linux

      Configure a Linux computer for unattended access by installing the unattended access installer. Once you complete the configuration process you can view, access and troubleshoot the computer remotely. For Linux OS versions Ubuntu and Debian, the ...
    • Unattended Access for Windows and Mac

      Install the unattended access installer to configure a device running Windows or MacOS for unattended access. Once the device is configured for unattended access, you can access and troubleshoot the device remotely. To download the unattended access ...
    • Unattended Access Installation for Raspberry Pi

      Install the unattended access installer to configure a Raspberry Pi for unattended access. Once the configuration is complete, you can remotely view, access, and troubleshoot the Raspberry Pi device. To download the unattended access installer in ...
    • Access Devices

      Access devices from Zoho Assist website Go to www.assist.zoho.com. Log in to your account using Zoho Assist credentials. Navigate to Unattended Access. Click CONNECT beside the computer you want to connect to.
    • Manage Devices

      The list of devices configured for unattended access will be displayed here. You can add, remove, access, and manage the devices. Steps Navigate to Unattended access > Deployment > Manage Devices. All devices will be displayed by default. Select the ...