Submit a ticketCall us

WebinarUpcoming Webinar: How Help Desk and Remote Support Pays for Itself

Learn how help desk software can simplify ticketing management, allow you to track hardware and software assets, and accelerate the speed of IT support and service delivery. Gain insights on how remote support tools allow your IT team to maximize their efficiency and ticket resolution by expediting desktop troubleshooting, ultimately helping keep end-users happy and productive.

Register here.

Home > Success Center > DameWare Remote Support & Mini Remote Control > DameWare Documentation > Previous Versions > DameWare Mini Remote Control User Guide > About DameWare Mini Remote Control > Basic components of MRC

Basic components of MRC

Table of contents
No headers
Created by Anthony.Rinaldi_ret, last modified by Chris.Moyer_ret on Nov 06, 2017

Views: 250 Votes: 0 Revisions: 4

There are two parts to the Mini Remote Control program:

  • The Mini Remote Control application

  • The Mini Remote Control client agent service

The Mini Remote Control application is the actual program installed on your local system. Use the Mini Remote Control application to control the remote systems in your environment. The Mini Remote Control client agent service is a software component you deploy to remote systems to allow the Mini Remote Control application to control them. This service runs in the background of the remote system under the Local System account. When there is not an active Mini Remote Control connection, the service uses little to none of the remote system's CPU.

The Windows operating system requires location Administrator rights to install, remove, start, stop, or upgrade the Mini Remote Control client agent service on remote systems. For more information about how to install the client agent service, see Client agent service installation methods.

Note: All Mini Remote Control users must authenticate to the remote systems they connect to, so simply having the client agent service installed does not pose any security risk. For additional information about security, see Security and encryption overview.

Last modified