Support
We here to help and answer any questions about our software.
Support
Initial Configurations
MPA Tools are quite simple to use and do not require to perform any special installation steps. MPA Tools also do not require to have an agent on remote computers. However some simple configurations should be in place for the tools to work. There is a minimal configuration on the firewall that needs to be in place and the majority of the companies already have that in their infrastructure. Below we have listed Firewall configurations that are required.
Administrator access, to view properties of device Local Administrator access, is needed. The performance of the application is highly dependable on the infrastructure configurations that are in place; network speeds, anti-virus settings, etc., MPA Tools also have very flexible application settings, which would allow a user to perform some additional tune-ups to increase performance.
Fire Wall
Your Access
Applications Settings
Running as different user
Running with elevation
FAQ
Trial and License Activation
Proxies and Firewall
MPA Tools use LexActivator By Cryptlex for secure licensing. MPA Tools automatically detects the proxy settings of the machine. So, in most cases, you don’t need to care whether your user is behind a proxy server or not.
To detect proxy settings, it uses standard methods available for each operating system. On Windows, it checks the system proxy settings.
Whitelist Cryptlex IP addresses to enable LexActivator license and trial activations through the firewall.
If your policy denies access from external IP addresses and websites, you will need to whitelist the IP addresses below. A whitelist provides access to designated IP addresses and sites that would otherwise be prevented by your security policy.
54.147.158.222
54.147.163.93
54.144.124.187
54.144.46.201
Alternatively, you can also whitelist Cryptlex Web API URL:
https:/api.cryptlex.com:443
Custom proxy settings
You can allow the user to set the proxy settings to be used by LexActivator. Simply use the following LexActivator API function:
The proxy format should be:
[protocol://][username:password@]machine[:port]
Following are some examples of the valid proxy strings:
http://127.0.0.1:8000/
http://user:pass@127.0.0.1:8000/
socks5://127.0.0.1:8000/
Firewall configurations
1. to Ping computers Enable ICMP inbound traffic through Firewall (This is optional if you are not planning to Ping computers)
2. Enable RPC inbound rule for collecting computer properties (TCP port 135)
3. Enable SBM inbound rule for file share (TCP port 445)
4.RDP Ports for shadowing (optional)
Another option is to configure GPO settings:
There are two settings that will allow MPA to fully function in your environment:
These settings are pretty easy to configure and can provide great control by a Subnet
Windows Firewall: Allow ICMP exceptions and Allow inbound remote administration exception
Open folders when running as different user
To allow the explorer to be launched as different user perform the following steps:
1. Start the Registry Editor as an Administrative User.
2.Navigate to, take ownership of, and grant yourself Full Control permission to the key HKEY_CLASSES_ROOT\AppID\{CDCBCFCA-3CDC-436f-A4E2-0E02075250C2}
3.Rename the value RunAs to _RunAs.
Configure SCCM Remote Control as button
Configure your button with the following settings. screenshot attached as a simple instruction.
1. Name your button, for example, “SCCM Remote Control”
2. In “Select an application or command file” navigate and select CMRcViewer.exe
3. Command-line parameter “MPACompName” (case sensitive)