Solved

DirectAccess Managed Out

Posted on 2013-12-28
3
458 Views
Last Modified: 2013-12-30
I am having a hard time understanding what "DirectAccess Managed Out" actually is.

I am trying to studying for the 70-413 exam.

Thanks in advance for you help..
0
Comment
Question by:compdigit44
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 57

Accepted Solution

by:
Mike Kline earned 500 total points
ID: 39744110
It means that the machines can be managed remotely and that management can be initiated.

My friend MVP Richard Hicks is one of the top direct access experts and he explains it well

http://directaccess.richardhicks.com/2013/06/24/isatap-recommendations-for-directaccess-deployments/

For example, a helpdesk engineer can proactively initiate a remote desktop session to a remote client connected via DirectAccess to troubleshoot an application. Systems management engineers can push software out to DirectAccess clients without requiring an agent on the remote client to “phone home” to receive software updates. This model is often referred to as “manage out”.

Thanks

Mike
0
 
LVL 20

Author Comment

by:compdigit44
ID: 39744883
Very interesting!!!

So DirectAccess Managed Out is not a new feature of DirectAccess but a method for connecting to DirectAccess client workstation over the internet!!!
0
 
LVL 57

Expert Comment

by:Mike Kline
ID: 39744916
Yes makes it easier to manager.  We are currently not using direct access but have a traditional Cisco VPN client on users machines.  We can only manage when they connect.  This would be a nice feature for us too.

Thanks

Mike
0

Featured Post

Office 365 Training for IT Pros

Learn how to provision tenants, synchronize on-premise Active Directory, implement Single Sign-On, customize Office deployment, and protect your organization with eDiscovery and DLP policies.  Only from Platform Scholar.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

A company’s centralized system that manages user data, security, and distributed resources is often a focus of criminal attention. Active Directory (AD) is no exception. In truth, it’s even more likely to be targeted due to the number of companies …
Recently, Microsoft released a best-practice guide for securing Active Directory. It's a whopping 300+ pages long. Those of us tasked with securing our company’s databases and systems would, ideally, have time to devote to learning the ins and outs…
In this Micro Tutorial viewers will learn how to use Windows Server Backup to create full image of their system. Tutorial shows how to install Windows Server Backup Feature on Windows 2012R2 and how to configure scheduled Bare Metal Recovery backup.…
This video shows how to use Hyena, from SystemTools Software, to update 100 user accounts from an external text file. View in 1080p for best video quality.

688 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question