We here to help and answer any questions about our software.


Initial Configurations

MPA Tools are quite simple to use and do not require to perform any special installation steps. MPA Tools also do not require to have an agent on remote computers. However some simple configurations should be in place for the tools to work. There is a minimal configuration on the firewall that needs to be in place and the majority of the companies already have that in their infrastructure. Below we have listed Firewall configurations that are required.

Administrator access, to view properties of device Local Administrator access, is needed. The performance of the application is highly dependable on the infrastructure configurations that are in place; network speeds, anti-virus settings, etc., MPA Tools also have very flexible application settings, which would allow a user to perform some additional tune-ups to increase performance.

Fire Wall

Your Access

Applications Settings

Running as different user

Running with elevation


Trial and License Activation

Proxies and Firewall


MPA Tools use LexActivator By Cryptlex for secure licensing. MPA Tools automatically detects the proxy settings of the machine. So, in most cases, you don’t need to care whether your user is behind a proxy server or not.

To detect proxy settings, it uses standard methods available for each operating system. On Windows, it checks the system proxy settings.

Firewall whitelisting

Whitelist Cryptlex IP addresses to enable LexActivator license and trial activations through the firewall.

Access through firewall

If your policy denies access from external IP addresses and websites, you will need to whitelist the IP addresses below. A whitelist provides access to designated IP addresses and sites that would otherwise be prevented by your security policy.





Alternatively, you can also whitelist Cryptlex Web API URL:


Custom proxy settings

You can allow the user to set the proxy settings to be used by LexActivator. Simply use the following LexActivator API function:


The proxy format should be:


Following are some examples of the valid proxy strings:


  • http://user:pass@

  • socks5://

Firewall configurations

1. to Ping computers Enable ICMP  inbound traffic through Firewall  (This is optional if you are not planning to Ping computers)

2. Enable RPC inbound rule for collecting computer properties (TCP port 135)

3. Enable SBM inbound rule for file share (TCP port 445)

4.RDP Ports for shadowing (optional)

Another option is to configure GPO settings:

There are two settings that will allow MPA to fully function in your environment:

These settings are pretty easy to configure and can provide great control by a Subnet

Windows Firewall: Allow ICMP exceptions and Allow inbound remote administration exception

Group Policy Remote Administration FW Settings

Open folders when running as different user

To allow the explorer to be launched as different user perform the following steps:
1. Start the Registry Editor as an Administrative User.
2.Navigate to, take ownership of, and grant yourself Full Control permission to the key HKEY_CLASSES_ROOT\AppID\{CDCBCFCA-3CDC-436f-A4E2-0E02075250C2}
3.Rename the value RunAs to _RunAs.

Configure SCCM Remote Control as button

Configure your button with the following settings. screenshot attached as a simple instruction.
1. Name your button, for example, “SCCM Remote Control”
2. In “Select an application or command file” navigate and select CMRcViewer.exe
3. Command-line parameter “MPACompName” (case sensitive)

SCCM Remote Viewer