Password Management Best Practices

There is no guarantee that one person will stay in the same job forever. Opportunities arise and employees shift from job to job all the time. When this happens in a managed service business, technicians who move to a new company will also be taking the passwords for the customer accounts they were mangaging with them. As data of your customers is extremely valuable, it is imperative that you give serious thought to the security of the customer’s passwords in order to protect personal information that has been entrusted with you. We recommend implementing the following practices for your business to manage your customers’ passwords and ensure total privacy.


This password management practice functions to regularly inspect the system and check that everything is in place and no changes have been made. This technique allows you to see who has accessed the stored passwords whilst also enabling you to check whether the passwords remain compliant with the set rules (for instance, do they meet the password complexity requirements).

Another auditing practice to apply is regularly checking whether the passwords match with the ones used in the system. Furthermore, it is a good idea to install a system that informs employers if anything goes wrong or something interferes with the process of password management.

Full control  

A good password management system must have full control of the valuable data in the system. Full control gives you the tools to prevent unwanted users from accessing sensitive or confidential data such as customer passwords and personal information. It is highly essential that you ensure you have full control of those who have access to the company’s passwords, while also assuming control of what they can do with the passwords in terms of creating, writing, reading or deleting information. Additionally, it is important to install a system that gives full access to the passwords as well as the ability to store them centrally from anywhere.

Automation services

Each business should employ a system that automatically changes passwords whenever necessary. You should also have a process that enables you to inform the person in control of the password to change it manually.

A spreadsheet alone is simply not enough to protect the valuable information of your customers. We advise all companies to make use of the above password management practices to ensure complete password protection and consequently, a professional and trustworthy business.

What You Should Look Into When Choosing A Password Manager

There are many security experts who feel that simply choosing a password with alphanumeric letters and special characters is not enough to keep internet infrastructure protected. On top of that, many users choose the same password for all their accounts to avoid the difficulty of remembering numerous variations.

Basic measures to improve password security include using long and complex character combinations and phrases; changing the password on a regular basis; and using more than one password for different purposes. This can be a difficult and time-consuming process for enterprises where website logins, servers, databases, desktops and other forms of internet infrastructure need to be considered. This is where management software such as Passwordstate can help.

When you are looking for a password manager you can rely on, here are a few quick points to take into account.

Supported infrastructure

As mentioned above, enterprise system admins have more to worry about than just online accounts. While web site logins are important, passwords for everything from routers to individual desktops need to be managed effectively. This is a key difference between enterprise-based software and those limited to security for personal use of the web.

Two-factor authentication 

Password security does not just involve cyber attacks: malicious activity can also occur internally through use of keylogging malware and other techniques. In other words, you need software that provides protection from internal threats to security.

Two-factor authentication is a process where logins from new computers or devices must be authorised through another channel. Passwordstate is a perfect example of this, as it supports a range of two-factor authentication methods which add an extra layer of internal security — these include use of security tokens, temporary PINs through email and more. On top of that, automatic logouts help prevent unauthorised users accessing data on an unattended terminal.

Strong encryption

To put it simply, password management software is virtually useless if sensitive data can’t be stored securely within the database. Even if the database is not cloud-based (i.e. located internally), advanced encryption is vital to achieve a higher level of security. Passwordstate uses 256 Bit AES Encryption and keeps all sensitive code secure with precompiled ASP.NET pages and obfuscated .NET Assemblies.

Ease of use

As with any software, blending functionality with a user-friendly interface can be something that seals the deal. It’s important that you, your staff and any one-time users can easily navigate all relevant tools and features to ensure that your productivity as a business is not harmed; an intuitive interface makes all the difference when using complex password management software.

These are just some of many things to consider when choosing password management software for your enterprise. Read more about the features of Passwordstate to see how it can help you manage all your internet infrastructure.

Why Role Based Access Control is Crucial to Your Organisational Security

In today’s modern workplace, most if not all important documents, information and sensitive data is kept on a computer system, readily accessed at any point in time. While this offers a convenient way to store and retrieve files, a lack of role based access control (RBAC) can leave them susceptible to the snooping eyes of internal employees. When your organisation has the right RBAC system implemented however, access to network resources and computer networks is purely based on the roles you assign to individual staff within the organization or business. This means that your data is not open for all to see, and any breaches are more easily narrowed down to the person at fault. For this reason, implementing an effective RBAC system is crucial to your company’s data secutrity.

 The advantages of RBAC

  • RBAC implementation regulates access to your systems and networks by only allowing certain people to view, edit and create particular files.
  • The ability to access data, documents or information will be defined based on the authority you assign to the person, their responsibilities in the organisation and resource needs based on their role.
  • It is simple to create, change or discontinue a role according to the changing needs of your organisation and its employees.

RBAC through Passwordstate

RBAC software, such as Click Studio’s Passwordstate, increases your organisational network security by providing a number of roles that you can assign to your employees based on their position within the company. This can be regulated by a list of passwords that unlock certain roles when signed in. Passwordstate also gives you the ability to use 15 security administrator roles, covering all bases when it comes to the privacy needs of your organisation and its computer systems. These features provide the framework for a system where only authorised personnel are permitted from viewing or editing sensitive information.

Some of the security administrator roles provided by the software include

  • Emergency access
  • Auditing
  • Password generator
  • Security groups
  • Licensing
  • User accounts
  • System settings

Implementing RBAC?

Many find implementing RBAC highly challenging. However, Passwordstate makes it easy to adopt this method for your professional security. While operating systems such as Apple iOS and Windows do provide basic RBAC systems for security purposes, a commercial software option is always your best bet when it comes to the security of your company’s sensitive information. Investing in a specialised, custom RBAC program that works for your company will give you peace of mind knowing that any sensitive data on your network is safe and secure.

What Problems Does Password Management Solve?

A password is an imperfect solution to the problem of information security. Stronger passwords can be hard for individual employees to remember, leading to them potentially reusing the same string of characters across multiple private and commercial services – meaning if a hacker uncovers one password being used, they could potentially have access to multiple web sites and systems.

This said, the right password management infrastructure can mitigate many of the negative aspects of relying on alphanumeric passwords for access to your computer system. Discover how Passwordstate can help you.

Prevent the use of weak passwords before they compromise your system

Ensuring that every password used to access your system is complex and difficult to either guess or brute force is a crucial aspect of a security administrator’s job. There are going to be some employees who’ve never suffered a data breach who will merrily use ‘password’ or ‘1234’ to get into their work terminal unless you make this impossible.

Passwordstate allows security administrators to define what is and is not allowed in a password. Simple rules like raising the minimum character count to 12, or forbidding a password ending in a number (automatically putting a stop to anyone ending a password with their birth year) can dramatically increase your organisation’s data security. Having passwords reset after a certain period of time also ensures that even if a password is leaked and a third-party has access to your system, they don’t have long before they’re locked out.

Secure, flexible access control

If you’re required to share your data with someone outside the company for a short period of time, Passwordstate can ensure that you’re not giving them too much power. Security administrators can set different read, modify and access permissions to different password lists and even individual passwords.

If you’re having a company scrutinise your financial documents or performing maintenance on your secure server, giving them read only access or administrative priviliges on select systems can be a smart idea. Don’t give away the keys to the kingdom; Passwordstate helps you limit what people outside your organisation can access.

Ensure your business is fully compliant with relevant industry standards

Many organisations live and die by their ability to maintain compliance with stringent industry-wide data security regulations. For example, if you’re a merchant handling Visa, Mastercard, American Express or any major branded credit card, you’ll be required to abide by the Payment Card Industry Data Security Standard to protect your customers from credit card fraud. Failing to comply with these and other similar regulations can result in payment of large compensation amounts, lost revenue and legal action.

Passwordstate offers comprehensive reporting and auditing options that can help you achieve compliance. If a security breach were to happen while you were not PCI DSS compliant, you could be up for additional, expensive penalties including fines.

Investing in an enterprise-ready, scalable password management solution like Passwordstate is a smart, cost-effective decision for any business. Protect your customers and your business with Passwordstate.

Is Changing Passwords Mandatory For Systems And Accounts?

Password breaches are becoming common across all types of internet infrastructure and we need better password practices to protect our online servers, databases, routers and switches.

A common source of the problem revolves around improper password management techniques. A database or network not protected by a well-encrypted password system leaves itself vulnerable to hackers, phishing schemes, malware and viruses.

Why should I be changing my network’s passwords?

When a password is too old – or too easy to guess – it can lead to hackers easily accessing the system access codes. As well as this, once they malignant software guesses one password, it could only be a matter of time before all other aspects of the company are penetrated.

Apart from this, sharing passwords between employees is often unavoidable, especially when certain tasks cannot be completed by one person alone. This can lead to breaches in security. Rather than having your employees share private information with each other, invest in a targeted password management system, which will work to instantly to tighten your security and make for a more impenetrable network.

What if I forget all my new passwords?

Any business worth its while will have a large network of applications and servers. Between all the different parts that make up your company, it can be mind-boggling to attempt to remember every single password, especially when you change them frequently. After all, a revolving string of numbers and symbols doesn’t exactly lead to an easy memory trigger.

Instead, password management software such as Passwordstate will store all of your company’s passwords, allowing you to access them when you next need them – either web-based access, or mobile access.

How can I better protect my company’s data?

To better protect your company’s information, it is pertinent that you download software such as Passwordstate that performs a scheduled reset of passwords for you. An automated solution such as ours will audit, store and encrypt your various system passwords, leading to higher protection of your sensitive data and information.

The software also includes API scripts, meaning you have the freedom to integrate it into your SAAS, without fear that your customers’ privacy is at risk.

Another option is to opt for a single-sign-on, or federated network, which allows one password complete access to all of the company’s software (providing the user has administrator permissions for the specific function).

Passwordstate Permission Model Changes

In build 7476 of Passwordstate, we introduced a new Permission Model which customers have been requesting for a while. You can now set a top level folder to propagate it’s permissions down to all nested Password Lists and Folders.

The traditional model of setting permissions at the individual Password List level is still available, and if you do not wish your users to use this new model of propagating permissions down, you can disable it on the screen Administration -> System Settings -> Miscellaneous tab -> Enable the ‘Propagate Permissions Downwards’ feature for top level Folders.

Things to note about this new Permissions Model:

  1. You can only apply permissions to a top level Folder in the Root of ‘Passwords Home’
  2. You can only make changes to permissions on the Folder at top of the tree – nested Password Lists and Folders will have controls on the Permission pages disabled
  3. If you drag and drop a Password List, or a Folder containing Password Lists into another Folder structure with propagating permissions, it will ask you to confirm you wish to make this change as permissions will change
  4. Private Password Lists cannot be nested beneath a Folder which is propagating permissions down
  5. The ‘Bulk Permissions’ feature cannot be used for any Password Lists which are inheriting permissions from a top level Folder
  6. A couple of System Settings options for applying permissions to newly created Password Lists will be ignored
  7. When adding or editing a Password List, the options to clone permissions from other Password Lists or Templates will be disabled

How to use the new permissions model on a new Folder Structure:

  1. Ensure you have these two settings set to ‘Yes’ in Administration -> System Settings -> Miscellaneous:

  1. Create a Folder under Passwords Home. In this example we’ve called it “Windows Desktop Machines”
  2. When creating the Folder, ensure you tick ‘Manage permissions manually for this folder’ and ‘Enable the Propagate Permissions Downwards
  3. Once saved, you’ll notice a slight change to the Folder Icon. The brown triangle on the right hand side indicates it is now propagating permissions, and anything nested below it will inherit those permissions.

  • Next highlight the Folder and select Folder Properties.


  • Click the View Permissions Button and use the Grant New Permissions button to set permissions. This can be an individual users or Security Groups

Now any new Password Lists or Folders you create or drag into this Folder will automatically inherit those permissions.

How to convert an existing Folder structure to use the new permission model:

  1. Select your top level Folder and select ‘Folder Properties’
  2. Ensure you have ‘Manage permissions manually for this folder‘ selected
  3. Click the ‘Convert Permission Model‘ button
  4. Run through the three step Wizard:

    Step 1: Review what changes are about to happen
    Step 2: Review existing Permissions, and modify them to suit
    Step 3: execute the conversion

That’s it! Now when you make a change to the permissions at the top level folder, they will cascade all the way down the folder. Any existing Password Lists will inherit these permissions and new ones created under here will be forced to use the same permissions.

NOTE: As mentioned earlier, the new Propagating Permissions Model can only apply to a Folder in the Root of Passwords Home. If you have an existing Password List structure under your ‘Passwords Home’, you will need to create a new Folder first, move the Password Lists into the folder, and then apply the conversion.

Passwordstate Build 7393 New Features

Build 7393 introduce quite a few changes to the Password Reset, Discovery and Validation processes, which we’ll cover in this blog post in some detail. Once again, thanks to our fantastic customers who continue to provide feedback on how we can improve our software.

Password Reset Changes
Depending on the password reset script used, previously you may have needed to associate a Privileged Account Credential with a password reset script so a remote connection to the host could be made to perform the password reset. This is no longer the case, instead now you associate the Privileged Account Credential with the password record itself. This provides greater flexibility, because you can now use the same password reset script, but using different Privileged Account Credentials if required.

We’ve also made some changes to any reset tasks that may fail. It is now possible that a failed reset can be “rolled back” in Passwordstate, so the value of the password stored still matches what is in use on the Host. When this occurs, appropriate auditing data is added, Password History updated, and in the email you receive informing you of the failure, it has a status column indicating whether a rollback was performed. As it is possible to link a single password record to many host records, a rollback may not always be possible – for example, 45 Windows Workstations had their local administrator account password successfully changed, but 5 failed due to them being turned off. In this instance, there is a retry schedule you can set, as per the screenshot below.

We now have some options for also changing password reset options in bulk for password records – e.g. if you wanted to change the schedule when resets occurred on Windows Workstations, then you can do this with the new ‘Bulk Update Password Reset Options’ feature.

The process for this is relatively simple, with screenshots below:

  • Search for the password records you want to change
  • Modify various fields if required
  • Change Reset and Heartbeat options as required

The following table also describes which Reset Scripts require a Privileged Account to be associated with it, and certain notes for specific configurations which are required:

Script Name

Privileged Account Required

Reset Cisco Enable Secret


Reset Cisco Host Password Priv 1


For Privilege Level 1 type accounts
Reset Cisco Host Password Priv 15


For Privilege Level 15 type accounts
Reset COM+ Component Password


Reset Dell iDRAC Account Password


Reset F5 BIG-IP Account Password – AS


Accounts in BIG-IP appliances can be configured with Terminal Access of type ‘Advanced Shell’ or ‘TMSH’. You need to select the appropriate BIG-IP reset script to use, depending on the Terminal Access type for the Privileged Account Credentials you have associated with the Password Reset Script
Reset F5 BIG-IP Account Password – TMSH


Accounts in BIG-IP appliances can be configured with Terminal Access of type ‘Advanced Shell’ or ‘TMSH’. You need to select the appropriate BIG-IP reset script to use, depending on the Terminal Access type for the Privileged Account Credentials you have associated with the Password Reset Script
Reset HP iLO Password


Reset IBM IMM Account Password


When resetting passwords on IBM IMM cards, you must know the LoginID of the account you wish to reset passwords for. In order to use this script, you must configure a Generic Field for the PasswordList with the name of ‘LoginID’ and this is where you can store the value for each account you wish to reset passwords for
Reset IIS Application Pool Password


Reset Linux Password

Yes or No

  • If you do not associate a Privileged Account Credential with this script, you will SSH to the host using the account you wish to reset the password for
  • If you specify a Privileged Account Credential, you can SSH with this account, and then reset a password for a different account
  • If you want to reset the ‘root’ account password, then you need to specify a Privileged Account Credential to SSH with, and then the root account can be reset – generally most environments do not allow you to SSH in using the root account
Reset MySQL Password


Reset Oracle Password


Reset Scheduled Task Password


Reset SQL Password


Reset VMware ESX Password


Reset Windows Password


Reset Windows Service Password


Testing Scripts Manually
We’ve now added the ability to test each of the Reset, Validation and Discovery Scripts right within the Passwordstate user interface. Simply add one or more Hosts on the screen, specify various other field parameters as well, the hit the ‘Run Script’ button.

Account Heartbeat
In addition to the reports which can validate passwords are in sync between Passwordstate and the Hosts, there is also now a regular Account Heartbeat feature which can be enabled for password records which are configure for resets. Simply select the appropriate Password Validation Script, and the time of the day you wish to perform the validation.

The “rolled up” status of all linked Hosts records is then visible in the Passwords grid.

And when you view the linked Hosts to the password record, you can see the status of individual machines.

Host Heartbeat and Treatment
There is also a Host Heartbeat process in this build, and this can check on regular basis if your Hosts are available on online on the network.

The schedule for the Heartbeat poll which occur once a day, and is randomized between the hours set for each of the different Operating System types – which can be changed on the screen Administration -> Host Types & Operating Systems. Being able to set the hours in which the poll will occur is useful for desktop operating systems where machines may be turned off during the night.

And we have several options for how we treat Host records if the Host has not been seen on the network for some time. This is again useful for workstations and laptops which may have been decommissioned.

Simplifying Discovery Process
We’ve also simplified and made various changes to the 3 different types of Discovery Jobs we have – discovering Hosts in Active Directory, Local Administrator Accounts, and various Windows Resources which may be configured to run under the identity of a domain account. Some of the changes are:

  • Host Discovery – You can now also discover Linux hosts which have been added to Active Directory. The field we query in AD is the OperatingSystem attribute, and the values we query for this can be changed for each Operating System on the screen Administration -> Host Types & Operating Systems
  • Host Discovery – You no longer copy permissions to new Hosts from an existing Password List, instead there is a ‘Permissions’ tab on the Discovery Job screen which you can configure
  • Host Discovery – If a Host is no longer found in any of the OUs specific for the Job, there are options now for setting the Host to ‘Unmanaged’, or you can delete it if preferred
  • Local Admin Accounts – You no longer need to select the Password Reset script to associate with these discovered accounts, and you can also Include/Exclude certain named accounts from the discovery if required
  • Windows Resource Accounts – When discovering Windows Services, IIS Application Pools and Scheduled Tasks, you no longer need to select the Password Reset Scripts you wish to associate with these discovered accounts

Further Password Reset Support
We’ve also added a few more Password Reset Scripts, for the following systems:

  • F5 BIG-IP Load Balancers – thanks for your help on this Oscar J
  • Dell’s iDRAC out of band management cards
  • IBM’s IMM out of band management cards

Passwordstate Remote Session Launcher

In version 7 of Passwordstate, we have introduced a new feature called the Remote Session Launcher. This feature allows you to perform RDP, SSH, Telnet or VNC remote session connections directly from the Passwordstate web site, without having to manually enter any authentication credentials. This post will detail the system requirements, installation instructions and usage information for this feature.

Overview & System Requirements

The Passwordstate Remote Session Launcher allows you to perform RDP, SSH, Telnet or VNC remote session connections directly from the Passwordstate web site, without having to manually enter any authentication credentials.

To use the Remote Session Launcher feature, you must be using a Windows Desktop/PC, and have PowerShell 3.0 or above installed.

During the installation, the PowerShell script ‘PSLauncher.ps1’ will be installed to the destination directory, allowing you to customise this script if required. Putty and VNCViewer are also installed to this path as well.

Also during the install, 4 custom new protocols will be added to your registry, which are:

  • HKEY_CLASSES_ROOT\psrdp (for RDP sessions)
  • HKEY_CLASSES_ROOT\psssh (for SSH sessions)
  • HKEY_CLASSES_ROOT\pstln (for Telnet sessions)
  • HKEY_CLASSES_ROOT\psvnc (for VNC sessions)

These custom protocols allows to execution of the PSLauncher.exe utility directly from within your Browser.

Once the Remote Session Launcher utility is installed, it will log connection attempt both in the Auditing section of Passwordstate, and also to a log file called ‘PSLauncher.log’ located in the Remote Session Launcher utility folder. Additional debug logging can be added to this file if needed, by modifying the file ‘PSLauncher.ps1’

Installation Instructions

To Install the Passwordstate Remote Session Launcher Utility, please follow these steps:

  • Within the Passwordstate web site, navigation to your Preferences screen, and then on the ‘API Keys’ tab, create a Remote Session Launcher API Key, and then click one of the Save buttons
  • Now click on the HTML link you see on this screen for installing the Remote Session Launcher Utility – the path to the files is https://<mypasswordstateurl/remotesessionlauncher/passwordstatelauncher.exe
  • At the ‘Welcome’ screen, click ‘Next’
  • At the ‘Destination Folder’ screen, change the path if needed and click ‘Next’

  • At the ‘Remote Executables Path’ screen, change any paths if required, enter the URL of your Passwordstate web site, and click Next

  • The click the ‘Next’ button, and finally the ‘Finish’ button
  • Restart your Browser if it is currently open

Browsers and Launching External Applications

The Passwordstate Remote Session Launcher feature uses ‘Custom Protocol’ browser support in order to launch external applications.

Before you can start to use this feature, your browser needs to be configured to accept these custom protocols, and this can be done in Passwordstate by going to the page Preferences -> Remote Session Credentials, and then clicking on the ‘Configure Browser Support’ button. By clicking on this button, you will be shown a window like the screenshot below.

From here, your browser will present you with an additional popup window when you click on the appropriate protocol type – as per the following screenshots. Click the option to remember this setting, and then close all windows.

 Internet Explorer



Hosts & Remote Session Credentials

Now the Remote Session Launcher utility is installed, you need to add the required number of Hosts to Passwordstate, and apply permissions to them for the users who wish to launch remote sessions to – please refer to the Passwordstate User Manual for instructions on this.

There are several different ways in which you can authenticate your Remote Session to Hosts, and they are:

By Creating One or More Remote Session Credential Queries
Remote Session Credentials can be located in Passwordstate under the Preferences menu. Within this screen, you can create on or more ‘queries’ which allows the use of different credentials for different types of hosts.

As per the screenshot below, you build up the query based on different criteria, and then link the query to a saved Password record in Passwordstate. It is the UserName and Password of this Password record which is passed as the credentials to the Remote Session client.

Once you have created one or more Remote Session Credential queries, all you need to do is click on one of the Hosts on the Passwords Home page, or the dedicated Remote Session Launcher page (found under the main Tools menu), and the appropriate remote session will launch – as per the screenshot below.

  • Note: When launching a Remote Session connection, if there are no matching saved Credentials you will be prompted to manually type the UserName and Password. If there are more than one matching saved Credentials, you will be prompted to select which Credential to use.

Remote Session Launcher with These Credentials
Under each ‘Actions’ menu item for individual password records, there is a menu item called ‘Remote Session Launcher with These Credentials’, as per the screenshot below. When you select this menu item, it will allow you to search which Host you wish to connect to, and then authenticate with the selected password credentials.

Manual Credentials for Remote Session Launch
Another option is to select the ‘Manual Credentials for Remote Session Launch’ Actions menu item for one of the Hosts, as per the screenshot below. This will present you with a dialog which allows you to manually type the Username and Password to connect to the Host.

Passwordstate Now Fully Integrated with Remote Desktop Manager

Not so long ago we have the privilege of working with the team at, to fully integrate Passwordstate with their awesome software Remote Desktop Manager ( If you are not familiar with Remote Desktop Manager, we strongly recommend you check it out as it is a very capable tool for ‘remoting’ into a large range of IT systems.

The beauty of the integration between Passwordstate and Remote Desktop Manager (RDM) is you no longer need to input your authentication credentials to remote into other systems – simply create a Passwordstate credential in RDM which links to a password within Passwordstate, then create a Session in RDM and select the credential. Let’s walk through how you would do this.

Creating a Passwordstate Credential in RDM

First you need to create a ‘New Entry’ in Remote Desktop Manager, and this can be done in a multiple of ways – right click in ‘Navigation’, or press the Insert key, or use the button at the top of the screen.

  1. Select the Passwordstate Credential type

  1. Give it a name, provide the API URL of your Passwordstate web site, as well as the API Key – the API Key can be one which is associated with a single Password List, or you can use the System Wide API Key to return all Password Lists

  1. Click on the eclipse button next to ‘Password List’, and select the appropriate Password List

  1. Now click in the eclipse button next to ‘Password’ and select the account you wish to use as the credentials. After this credential has been created, you can now associated it with as many Remote Connection Entries in Remote Desktop Manager as you want


Creating a Remote Connection Entry in RDM

In this example, we will create a simply RDP connection to a Windows Server 2012 server, and associate the Passwordstate credential above to it.

  1. Create a new Entry, and select ‘Microsoft Remote Desktop (RDP)’ entry type – look how many different remote connection types there are J

  1. Now specify the host name you want to RDP to, select ‘Credential Repository’ for the Credentials, then select the credential you created above

  1. Now the Remote Desktop Connection is created, click on ‘Open Session’ and you will be automatically logged into your server


That’s pretty much it for logging in remotely to your server, without ever having to type in those long annoying admin passwords J

If you haven’t yet come across Remote Desktop Manager, we strongly encourage you to download the trial and give it a run – it certainly makes your daily Sys Admin life a lot easier.

Click Studios