Logmein Control Panel Download Mac

User Access Controls apply to a Windows or Mac account, not a LogMeIn account. A LogMeIn user may be able to see a computer listed in his LogMeIn account, but still may not have permission at the operating system level to actually access the host.

Logmein Control Panel Download Mac
  1. Access the host preferences:
    • From the host computer, open the LogMeIn Control Panel and follow this path: Options > Preferences > Security
    • From a client device, connect to the host Main Menu and follow this path: Preferences > Security
  2. Under User Access Control, select from the following general options: Option
    Description
    Allow full control to administratorsSelect this option to grant full permissions to anyone with administrative rights on the host computer.
    Hide list of domains on the Remote Access login screen

    Available on Windows hosts only.

    Select this option to clear the list of active domains in the host authentication dialog box. This provides an extra layer of security by forcing the remote user to type the exact name of the chosen domain.
  3. Under User Access Control, click Show details. The User Access Controls dialog is displayed.
  4. In the Name field, type (or browse for) the name of the user for whom you want to set permissions.
  5. Set the user's permissions using the following options.

    Some options are only available on computers running LogMeIn Pro.

    Option
    Description
    Full ControlGive the user full control over all features.
    Compact view onlyLimit the host user to Main Menu view of the HTML interface (as opposed to the Dashboard).
    Use IP filter profile Use this drop-down list to apply an existing IT filter profile to this user. This allows you set the IP address (or range) from which the user can access the host.
    Login Allow the user to log into the host. By revoking this permission, you can temporarily disable a user's access to the host without having to clear any other permissions.
    Configuration Allow the user to read (view-only) or write (change) settings under the Preferences menu.
    Event Viewer Allow the user to read (R) or delete (D) Windows event logs.
    File System
    • R: Allow the user to list drives, folders and files; read and download files; view file attributes, shared folder information and access control lists; and use File Manager
    • W: Allow the user to copy, paste, rename and edit files; create and share folders; edit attributes and access control lists
    • D: Allow the user to delete files; remove shares; and disconnect users from shared files
    Registry
    • R: Allow the user to view registry keys and values; list installed applications
    • W: Allow the user to create and rename registry keys; add and change registry values
    • D: Allow the user to delete registry keys and values
    Performance Data Allow the user to view running processes/services/drivers, change process priorities and service startup parameters, and create/delete scheduled tasks.
    Reboot Allow the user to restart, initiate and schedule system reboots, and hard-reset the computer.
    Remote Control
    • R: Allow the user to view and monitor the host desktop and chat with a host user
    • W: Allow the user to view and control the remote desktop
    • D: Allow the user to take control over the remote desktop without the interactive user's permission
    WhiteboardAllow access to the Whiteboard feature during Remote Control.
    Chat Allow access to the Chat feature.
    User/Group Accounts
    • R: Allow the user to see which Windows or Mac users and groups have access rights to the host
    • W: Allow the user to grant access rights to Windows or Mac users and groups and to modify their access rights
    • D: Allow the user to delete Windows or Mac users and groups from the list of users for the host
    System Configuration
    • R: Allow the user to list and view system configuration data, such as environment variables, virtual memory settings, drive and partition information and network adapters
    • W: Allow the user to modify system configuration data, such as environment variables, virtual memory settings, drive and partition information and network adapters
    • D: Allow the user to delete environmental variables
    Command Prompt Allow access to the host Command Prompt feature.
    Processes
    • R: Allow the user to view running processes, services and drivers; list DLLs and objects that these processes use; and view scheduled tasks
    • W: Allow the user to change process priorities and service startup parameters; control services; create and modify scheduled tasks
    • D: Allow the user to terminate running processes and services; delete scheduled tasks
    Desktop SharingAllow the user to use the Desktop Sharing feature.
  6. Click Add. The user is added to the User list.
  7. Click OK to exit the User Access Control dialog box.
  8. Click OK or Apply. Your settings are applied immediately to the host.
Logmein
  • With LogMeIn, you can remotely control a desktop as if you were behind the keyboard. Connect online to your PC or Mac computer and stay productive from anywhere.
  • Find LogMeIn product guides, downloads, FAQs, release notes, and other supporting documentation in the LogMeIn product knowledge base.

Download Logmein Host Windows

Panel
Related information

Logmein Control Panel Download Mac Installer

HELP FILE

LogMeIn enables you to connect to your Mac computers from anywhere in the world, from any other Internet-enabled Mac, Windows PC, or hand-held device. The remote control feature in LogMeIn Free means you can view and control your Mac desktop and applications just. LogMeIn has been a lifesaver for us. Our scheduling software is on-premises only and with LogMeIn Pro, we can access the system remotely. This provides flexibility for us as a business and allows us to provide superior service to our residential and commercial clients. Victoria Amador, Co-Founder & CEO, Tremendous Maids.

Logmein Host Download

How to Specify User Access Rights

User Access Controls apply to a Windows or Mac account, not a LogMeIn account. A LogMeIn user may be able to see a computer listed in his LogMeIn account, but still may not have permission at the operating system level to actually access the host.

Install Logmein Control Panel

  1. Access the host preferences:
    • From the host computer, open the LogMeIn Control Panel and follow this path: Options > Preferences > Security
    • From a client device, connect to the host Main Menu and follow this path: Preferences > Security
  2. Under User Access Control, select from the following general options: Option
    Description
    Allow full control to administratorsSelect this option to grant full permissions to anyone with administrative rights on the host computer.
    Hide list of domains on the Remote Access login screen

    Available on Windows hosts only.

    Select this option to clear the list of active domains in the host authentication dialog box. This provides an extra layer of security by forcing the remote user to type the exact name of the chosen domain.
  3. Under User Access Control, click Show details.
  4. In the Name field, type (or browse for) the name of the user for whom you want to set permissions.
  5. Set the user's permissions using the following options.

    Some options are only available on computers running LogMeIn Pro.

    Option
    Description
    Full ControlGive the user full control over all features.
    Compact view onlyLimit the host user to Main Menu view of the HTML interface (as opposed to the Dashboard).
    Use IP filter profile Use this drop-down list to apply an existing IT filter profile to this user. This allows you set the IP address (or range) from which the user can access the host.
    Login Allow the user to log into the host. By revoking this permission, you can temporarily disable a user's access to the host without having to clear any other permissions.
    Configuration Allow the user to read (view-only) or write (change) settings under the Preferences menu.
    Event Viewer Allow the user to read (R) or delete (D) Windows event logs.
    File System
    • R: Allow the user to list drives, folders and files; read and download files; view file attributes, shared folder information and access control lists; and use File Manager
    • W: Allow the user to copy, paste, rename and edit files; create and share folders; edit attributes and access control lists
    • D: Allow the user to delete files; remove shares; and disconnect users from shared files
    Registry
    • R: Allow the user to view registry keys and values; list installed applications
    • W: Allow the user to create and rename registry keys; add and change registry values
    • D: Allow the user to delete registry keys and values
    Performance Data Allow the user to view running processes/services/drivers, change process priorities and service startup parameters, and create/delete scheduled tasks.
    Reboot Allow the user to restart, initiate and schedule system reboots, and hard-reset the computer.
    Remote Control
    • R: Allow the user to view and monitor the host desktop and chat with a host user
    • W: Allow the user to view and control the remote desktop
    • D: Allow the user to take control over the remote desktop without the interactive user's permission
    WhiteboardAllow access to the Whiteboard feature during Remote Control.
    Chat Allow access to the Chat feature.
    User/Group Accounts
    • R: Allow the user to see which Windows or Mac users and groups have access rights to the host
    • W: Allow the user to grant access rights to Windows or Mac users and groups and to modify their access rights
    • D: Allow the user to delete Windows or Mac users and groups from the list of users for the host
    System Configuration
    • R: Allow the user to list and view system configuration data, such as environment variables, virtual memory settings, drive and partition information and network adapters
    • W: Allow the user to modify system configuration data, such as environment variables, virtual memory settings, drive and partition information and network adapters
    • D: Allow the user to delete environmental variables
    Command Prompt Allow access to the host Command Prompt feature.
    Processes
    • R: Allow the user to view running processes, services and drivers; list DLLs and objects that these processes use; and view scheduled tasks
    • W: Allow the user to change process priorities and service startup parameters; control services; create and modify scheduled tasks
    • D: Allow the user to terminate running processes and services; delete scheduled tasks
    Desktop SharingAllow the user to use the Desktop Sharing feature.
  6. Click Add.
    The user is added to the User list.
  7. Click OK to exit the User Access Control dialog box.
  8. Click OK or Apply.
    Your settings are applied immediately to the host.