OBS Remote is a websocket based plugin/webclient for Open Broadcaster Software. Basically it enables you to control and monitor your stream in the browser from a remote computer. So if you use a second computer to stream or have a laptop but not a second monitor to stream from, OBS Remote will enable you to control your stream without having to. If you believe someone is accessing your computer remotely, disconnect the computer from the internet. This includes removing any Ethernet cables and turning off your Wi-Fi connections. Some of the more obvious signs of active intrusion would be your mouse moving without your control, apps opening in front of your eyes, or files actively being.
Running MSTSC from command line will allow you to remotely view (shadow) and control a computer. This will work from Command Prompt or Powershell. Shadowing was dropped in Windows 7 and brought back in Windows 8.1.
The GPO to allow or deny (silent) shadow/control can be found under:
|Administrative TemplatesWindows ComponentsRemote Desktop ServicesRemote Desktop Session HostConnectionsSet rules for remote control of Remote Desktop Services user sessions
By default, you may shadow/control with the user's consent.
Before we can view or control a session, we'll need to get the session ID of the user we want to shadow. To do this, run the command:
Image converter software. query session /server:
To shadow without control, run the following command in an elevated command prompt:
mstsc.exe /v: /shadow:
To control, run the following command in an elevated command prompt:
mstsc.exe /v: /shadow: /control
Both of the above can be ran with the /noConsentPrompt argument, which will allow you to connect silently, provided you have configured GPO to do so.
The user must agree to the connection. Once this is done, the connection will be established, and an RDP window will pop up.
There are two places that things can go wrong.
Query session (step 2):
The common issue that occurs during this step is an access denied error. Make sure that you are running the commands from an account that is either a domain admin or has local admin rights on the target computer. Also make sure HKLMSYSTEMCurrentControlSetControlTerminal ServerAllowRemoteRPC is set to 1. The target computer must be rebooted after changing this key. I recommend setting via GPO if this is an issue.
If running this command against an RDP server, the account running the command needs to have Query Information permission rights on the RDP server.
MSTSC (step 3):
The most common error during this step is also an access denied error. Make sure that you're running as a domain admin or has local admin or remote desktop user rights on the target computer.
Resizing:
In shadow mode, MSTSC will ignore span, width, and height arguments. The RDP window can be resized by dragging the edge of it. Any screens displayed within the RDP window will be resized automatically.
Can I set it to display only 1 screen?
I don't believe so. If someone can prove otherwise, I'm all for it.
MSTSC can be a great, free (although limited) alternative to TeamViewer, Splashtop, and VNC products while on a LAN.
How have I gone 5 years without knowing this? :/
Great write up!
Hurray for tools! Never knew about this one either. I have been using MSRA
Never knew this as well, thanks for sharing!
Hope this how-to can be integrated/imported into our knowledgebase as I wanted to share it to my colleagues.
Interesting .. I use daily the command: mstsc -v
Nice to know more in the How-To post
Neato, never knew this as well.. Sadly I get access denied from my local admin account and even by using the domain admin account on our DC when trying to query a user's PC oO
Too bad shadowing is gone in Win7 :X Is this also available in Win10?
Why hasn't anybody told me about this years ago? Thanks for the write up.
Or Remote Assistance can do the same thing
MSRA /Offerra
Unfortunately, so easy to mistype as a drug-resistant bacterium
The 'Viewing' option would be great in an environment where agents (eg call centres) are quality control monitored and a supervisor could watch the agents' screen.
Shame it needs user/agent intervention in this case. While I understand the malicious connotations of this, eg hacker gets into your system and can watch everything you do etc. Mac solid state drive review.
I'm setting up a GPO for this now, thanks for sharing
Thanks for the comments, everyone!
Peace-D, This is available in all versions except 7/2008R2 and 8.0/2012. Neither the admin nor the target PC can be running either OS. Which step are you getting the access denied error on?
I've added a troubleshooting section, which will hopefully help with any errors you might come across.
One thing I appear to get during testing is that it prompts for the consent on the client and then just silently drops the connection. Where to download free mac games full version. Have you any idea how I can troubleshoot this, there is nothing in the event log on either computer that I can see is relevant. Source Windows 10 client Windows 8.1 (actually I've just reversed them and it's true in the other direction too)
Thanks for this write up. This should be one of those 'how did you not know this'
Just have to figure out how to get around the access denied problem.
Update: It works great! The only reason I got access denied is because I was trying to RDP to a windows 7 client. Thanks again!
Matt, I've never seen that before. Can you double check that MSRA and RDP both work fine?
Great work!!! Thanks so much for the detailed write up on how to do this!