| Feature |
Standard Edition |
Enterprise Edition |
| |
|
|
| 256 Bit AES Encryption |
 |
 |
| Use Windows accounts authentication |
 |
 |
| Group Policy Support |
 |
 |
| Watch computers without the remote user knowing |
 |
 |
| Set polices to ask permission first |
 |
 |
| Control computers without intervention |
 |
 |
| Support for Windows 8 through XP |
 |
 |
| Smooth operation during UAC prompts |
 |
 |
| Centralized Connection Logging |
|
 |
| Centralized user management |
|
 |
| Centralized computer management |
|
 |
| Web based interface |
|
 |
| Integrated MSI/EXE Agent Builder |
|
 |
| Access computers behind most firewalls |
|
 |
| View list of connections by username |
|
 |
| Search for computers by name or user |
|
 |
| Control active Remote Desktop Sessions (Shadowing) |
|
 |
| Limit access to computers by user or group |
|
 |