Security in a Terminal Services environment
- Last UpdatedJun 13, 2024
- 1 minute read
Use application security to secure your InTouch application, IndustrialSQL Server, and other sensitive information systems.
-
Use the $Operator system tag to secure your application. You can then control operator access to specific functions by linking those functions to internal tags.
For more information about using the $Operator system tag, see About Securing InTouch.
-
Replace the GetNodeName() function with the newer TseGetClientId() function to identify the client computer. When using Terminal Services, the GetNodeName() function returns the name of the terminal server, not the name of the client computer.
Use security auditing to monitor intrusion attempts. If you suspect that your system is under any sort of attack, then you can enable logging for an array of auditable events. By default, security logging/auditing is disabled because it usually requires excessive processing resources.
Caution: Security auditing requires significant resources. Enable auditing when you evaluate your pilot server to accurately estimate your InTouch application hardware requirements.