Table of Contents

Launch of the Initial Release under th e name "Reporting and Monitoring for RDP".

  • Creation of Monitoring Tools :
  • A Performance Chart that allows RDS Administrators to check real-time RD Session Host performance at a glance, measure bandwidth, CPU and Memory usage.
  • Disks Chart: Monitor the Disks usage per hour and per day.
  • Users Chart: Track monthly or daily activities, identify the most active hours, and monitor user activity by day.
  • Applications Chart: Get a report of the most used applications, with duration of use and number of users on each application. .
  • Creation of a Reporting Tool: Customizable alerts: Determine time-ranges and thresholds with a Web interface fully compatible with tablets and Smartphone.
  • Administration Settings that allow the Administrator to set Authentication Settings and Email Settings to easily get reports.

Related Posts

RD Tools Software

"Enhancing RDS Security: Integrating Windows Server Update Services with Advanced Security Measures"

As cyber threats grow in sophistication, combining WSUS (Windows Server Update Services) with RDS Tools Advanced Security tools has become essential for comprehensive protection. Explore how Windows Server Update Services supports RDS environments, its limitations in addressing modern security challenges, and re-visit how integration with robust cybersecurity solutions, such as RDS Advanced Security, enhances protection. Then finish with best practices for IT teams to effectively implement this comprehensive server and network security approach.

Read article →
RD Tools Software

"How to Remote Control a Computer: Choosing the Best Tools"

For quick support sessions, long-term remote work or administration tasks, remote access and control is a versatile tool. Remote controlling a computer allows you to access and manage another computer from a different location. Whether you are daily providing technical support, accessing files or managing servers or will need to in the future, read up on how to remote control a computer, checking through the principal methods and their main features to find out which may be better suited to your infrastructure, usage and security requirements.

Read article →
back to top of the page icon