Personal account

Personal account is a unified control center providing access to all service functions:


To access your personal account, register on the site. You will need an email or a Google/Facebook account.

After sending the request, a password will be sent to the specified email address. Enter your personal account to activate your account.

Change your password after logging in to your personal account for the first time.

If you used a social media platform for signing up, personal account activation and logging in are performed automatically. The password is sent to the email address assigned to your social media platform account.

Personal account login

Use the form on the login page to log into your personal account.

If you do not remeber your personal account password, use the password recovery function.

When you first log in, you are offered an introductory tour describing the basic elements of your personal account.

To exit your personal account, use the button in the lower left corner of the page:

If you need to change your login/email, see the Login/email change section.

Permanent access

Use the left menu to go to the list of linked computers:

The list contains computers:

Add computer

To add a new computer to the list, log into the agent program (see Permanent Access).

Download the agent program from your personal account or the public download page.

To download from your personal account, use the add button:

In the new window, download the file for the operating system installed on the remote computer:

Run the file on the computer you plan to manage. In the Permanent Access tab, log in using your account:

After that, a preview of this computer will appear in the list:

Adding multiple computers

To add multiple computers, use the Auto login option when downloading the agent program:

Distributions downloaded with this option enabled are automatically linked to the account and will appear in the list after the launch.

Computer info

The preview of each computer added to the personal account contains brief info about the device state and launched agent program.

Computer state

Displayed in the upper left corner:

It can have the following values:

  • Online - computer is "in the network" and is available for connection;
  • Offline - computer is not "in the network" and is unavailable for connection;
  • Not installed - agent program is not installed on the computer. The computer is available for connection. The access will be lost after the device is restarted;
  • Disabled - computer is blocked, connection is unavailable (appears when the service plan limits are exceeded);
  • Limited - connection is available, the access will be limited within 10 days after adding (appears when the service plan limits are exceeded for the first time).

Operating system

Displayed as icons:

Clicking the icon opens the window with system data about the remote computer.


Displayed in a tiled list view:

The image is captured once a minute.

The desktop preview can be disabled in the computer card Settings.

Computer name

Displayed as a bold header:

Specified in the computer card or the agent program settings (see Computer name).

Team access

If you work in a Team and your computer is available for other members, the corresponding icon is displayed next to the computer name:

If necessary, the owner can restrict access to any computer (see Access limitation).

Computer geolocation

Displayed as IP address, city and country name:


To connect to a computer, click Connect:

For more information on managing a computer during connection, see Connection.

Computer card

The card contains all settings and additional functions for working with a remote computer. Click on any area of the tile to access them.

Providing access

You can share access to your computer in three different ways:

With another system user

Enter the login/email of another user of the system and click the add button. After that, the computer will appear in the user's list.

Your computer having public access is marked with a corresponding icon:

Other computers you have been granted access to are marked with the icon:

To remove access, click on the user's email address.

Permanent link

In addition to connecting from a personal account, you can connect to a computer using a permanent link if you are authorized in your personal account.

The permanent link is designed to integrate connection to external customer service systems, such as a CRM system.

Customize the path of the link to make it unique and readable.

Use the Branding settings to change the subdomain.

To allow connections for unauthorized users, enable a numeric password (see Access by invitation).

One-time link

Use a one-time link for a short-term access to a computer. The link is updated after each connection or once a minute.

To disable connection via an already sent link, generate a new one using the appropriate command:

File manager

You can download necessary files from a remote device without connecting to it.

The size of the transferred files is limited by your service plan. There are no other restrictions.


Wake-on-LAN (WOL) is a standard protocol for remotely waking up computers that are in low-power mode (turned off but still have access to a power source).

The enabled Wake-On-LAN allows the network adapter to constantly scan the network for the Magic Packet command initiating the enabling of a personal computer.

Prerequisites for waking up a computer:

  • Internet connection via LAN cable;
  • enabled Wake-on-LAN setting in BIOS;
  • enabled turning on via a local network in the network card settings.
  • one of the network conditions for receiving the command:
    • dedicated IP address;
    • presence of other agent programs on the computer subnet;
    • public access to the router and proxying commands to the computer.
Activation in BIOS

To configure Wake-on-LAN in BIOS while booting the device, press a certain key (F1, F2, F11, Escape or Delete depending on the device). After that, enable Wake-on-LAN in the BIOS menu.

Motherboard manufacturers may have different names for WOL (Agressive Link, ErP, PME).
Setup in the Device Manager

To configure the network card, go to the Windows settings and launch the Device Manager. In the «Network adapters» branch, select the one the Ethernet cable is connected to.

Click on the selected adapter. In the new window, go to the Advanced tab and select the Wake on Magic Packet property. The value should be enabled.

Next, go to Power Management and allow the device to wake up the computer using Magic Packet.

Now your computer is ready for a remote wake-up using the Wake-on-LAN function.


After activation in BIOS and the network card configuration, go to your personal account. In the Permanent Access section, select the computer you want to wake up.

Next, click Wake-up.

Our server sends the Magic Packet command to your computer using all possible methods:

  • to the computer's public IP address;
  • over the local network from neighboring agent programs (if any);
  • to the specified IP address and port (see Router settings).

The first command to reach your computer wakes it up and the computer appears on the network.

Router settings

You can send the Magic Packet command to the specified IP (or domain name) and port. This may be necessary if you are using a dedicated IP address or another router to connect your computers to the Internet.

To do this, enter the following data in the computer card:

If you are using a router, you can configure routing within your local network using different ports.

Connection history

In the history, you can view the list of recent connections to the device as well as download video recordings if any.

The list is sorted by the time of the last connection. Older entries are loaded automatically when scrolling down to the last item in the list.

Hovering over a line yields additional data about the browser and the operating system of the device the connection was performed from.

System information

You can also use the button with the operating system icon in the list of computers to quickly switch to the system info.


The first tab displays general information about the system:


The second tab contains detailed configuration of a remote computer:

Automatic account authorization during connection

Specify the Windows account login and password on a remote computer in the Auto login section for auto login during the connection start:

You can also lock/unlock a device by clicking a single button in the computer card with no actual connection:

If the computer was automatically unlocked using this option at the start of the connection, it will be automatically locked after the connection is completed.

Computer settings

For more convenience, you can change some settings for an added device:


Displayed computer name (see Computer name).


Arbitrary group a computer belongs to - an office, department, floor, or something else. The value can be used to arrange a list (see Sorting and grouping).

Allow configuring the agent program without the Administrator right

Enable/disable changing the settings (including exiting) of the agent program launched on a remote computer for operators having no Administrator right.

The setting is available only for computers with the specified agent program.

The setting is available only for the Windows version of the agent program.
Take screenshots for preview

Enable/disable taking screenshots for a device preview in the personal account.

If the screenshots are disabled, standard OS wallpaper is displayed instead of the preview.

Sorting and grouping

For grouping and sorting, use the Favorite agent buttons and the block for configuring the search line list:

"Favorite agents" will always be in the first group.

Possible sorting criteria:

  • by computer name (case insensitive);
  • by connection date (date of the last connection to the computer);
  • by login date (date the computer was added to the personal account).

Possible grouping criteria:

  • alphabetically (case insensitive);
  • by status (see Computer status);
  • by time (last use);
  • by group (arbitrary group, see Group).

List presentation

To change the list presentation, use the switch in the upper right corner of the page:

There are two types of presentation: line and tiled:

Simultaneous connection

To connect to several computers at the same time, click the button in the upper right corner of the page:

Select one or more devices you want to connect to:

After adding, the window with connection to the selected devices is opened:

The list of selected computers is saved during the next switch to concurrent connections.

Click on the desktop preview to go to one of the computers:

To return to the list of simultaneous connections, use the Back button in the connection panel or use the Back button in the browser.

Available functions

Connection reset

Quickly re-connect to a computer:

Share access

Open computer access settings in the pop-up window (see Share access with another user):

Permanent link

Open computer access settings in the pop-up window (see Permanent link):

End connection

Quickly end connection to a computer:

Remove from the list

Remove a computer from the list of simultaneous connections:

Move preview

Change the order of computers in the list of simultaneous connections:

Add a new device to the list

Connect and add a computer to the list of simultaneous connections:

Connection auto recording

To enable/disable connections auto recording, click the corresponding button in the upper right corner of the page:

Connection recording can be downloaded in the general History or in the computer card.

Quick support

Use the left menu to go to quick support:

The section is meant to provide technical assistance upon customer requests.

Connecting to computers works as follows:

Invitation via link

A new pending connection should be created for each client. Use the button in the upper right corner of the page:

Specify a client name to identify the connection:

Next, copy the link and send it to the client:

You can close the invitation window. All created connections will be displayed in the list:

Invitation states:

  • Green - a client has launched the invitation file;
  • Orange - a client has not launched the invitation file yet.

The link opens a message inviting a client to establish a remote access session to their computer:

The invitation features the name or email address of a remote support team member.

Specify your first and last name in the Profile, so that customers can see it in the invitation. This will improve user's trust and loyalty to the remote session.

You can also set your company name and logo in the invitation. To do this, use Branding. This will improve user's trust and loyalty to the remote session.

After a client downloads and runs the attached file, the connection is activated. The client sees the message about waiting for the operator:

Set up a launch notification in Telegram to avoid waiting for a client to launch the attached file. Find out more about integration with Telegram.

After clicking the Join button, the standard connection window is opened (see Connection).

The client computer window becomes active:

You can open the connection window in advance. After a client joins, the connection is performed automatically. Use the Join in advance button in the creation window.

Invitation by code

If you communicate with clients by phone and it is inconvenient to provide a connection link, use a connection by code. Each connection has an invitation code:

To enter the code, send clients to the special page on our website or arrange the form on your official website. To do this, open the window to configure the widget:

Paste the widget HTML code into the website:

Direct customers to the page with the form and provide them with a unique connection code:

After entering the code, clients will see the invitation info and a link to the attached file:

One-stop Chrome browser extension

Install Quick Support extension for Chrome and create invitations without switching to your personal account. See the details in the Google Chrome extension article.


Use the left menu to go to the agent program branding settings:

The left side of the page contains fields for customization, while the right one features the preview:

Branding settings are to be used on all program elements visible to users. This will improve users' trust and loyalty when they download and run the agent program.


Up to 30 characters. To be displayed:

  • as the downloaded file name;
  • in the open program window header;
  • in the tray context menu;
  • in the desktop shortcut;
  • in the browser connection page header.


.ico file is required. To create an .ico file, you can use the online tool.

To be displayed:

  • as a downloaded file icon;
  • in the program open window;
  • in the taskbar tray;
  • in the desktop shortcut;
  • as favicon.ico for the browser connection page.


3-25 Latin characters. Used to customize connection links. To be displayed:

  • in the fast connection link in the agent program open window;
  • in the personal account permanent link settings.
In order to customize the paths of connection permanent links, use the setting in the computer card.

File generation

After changing the branding settings, the next file download may be performed with a delay due to a new agent file generation. This also applies to Fast Support and Permanent Access agents.

We recommend launching a forced generation of the updated agent program version by downloading it from the personal account after changing the branding settings:

Updating agents

Branding settings are not applied to previously downloaded and installed agent programs. After changing the settings, they should be updated manually. For the operating system, the program modified with the help of branding is perceived as different and independent from the original one.

Find more details in the article Why branding is so important.

Personal domain (CNAME)

To use your own domain, you need to configure the DNS server of your domain and your personal account.

Configuring on the DNS provider side

In this guide, we will consider the setup using the popular Cloudflare service as an example.

Log in to your account and go to the DNS section.

Click Add record.

Set the record parameters and click Save.

  • Type: CNAME
  • Name: support (you can specify any other name, it is used as a subdomain the page of connecting via the code is opened at)
  • Target:
  • Proxy status: DNS Only
  • TTL: Auto

A new record appears in the DNS list.

Configuring in the personal account

In the Branding section, switch to Domain, specify the address you configured in Cloudflare and save the changes.

If the setup is successful, you will see the corresponding message stating that the SSL certificate for your subdomain is allocated and ready for use:

The SSL certificate is allocated in the free Let's Encrypt certification center and renewed automatically.

After configuring the settings, connection and invitation links are replaced:

The page of connection via a code is opened at the URL you have specified.

Disabling a personal domain

To disable or replace a personal domain, go back to the «Branding» section and click Reset.


Build a team and invite employees to work together.

Use the left menu to switch to the team:

Creating a team

Click Create a team:

Specify the team name:

By default, your computers from Permanent Access become available to all team members. Be sure to restrict access to private computers in the computer card. See the details in Access limitation.

Only one team can be created on one account.

After the team is created, its name and administrator's login appear in the left menu.

For team members, the left menu can be limited depending on their role.

The limits of the team owner's service plan are applied to all team members.

After creating the team, its name is displayed on the permanent access tab inside the agent instead of the account login:

Adding a member

Click the button in the upper right corner:

Specify the email of a user you want to add to your team and select their role.

  • Technician connects to team computers from the Permanent Access and handles Quick Support requests;
  • Administrator manages the list of team members, observes and configures team computers from the Permanent Access, views Quick Support requests, as well as changes branding settings.

The recipient will receive an email inviting them to join the team, as well as a notification in the team page of their personal account.

If a user has no account on, they are prompted to register.

Info on team members and their rules is displayed in the administrators' personal accounts.

Possible member statuses:

  • Green - active team member;
  • Yellow - invitation sent, a member has not joined the team yet.
When trying to link a computer to an account of any of the team members, it is linked to the owner's account.

Access limitation

Your computers will be available to the entire team by default. To limit access to any of the computers, go to its management. In the Access section, uncheck Allow access to all team members.

We recommend limiting access to necessary computers before inviting team members.

Deleting or changing the member role

Use the actions button to delete a member or reassign their role:

Deleting and configuring a team

To rename or delete a team, use the button in the upper right corner of the page.

Only an owner can delete a team.


Use the left menu to switch to the integrations:


The first tab features ready-made plugins and integrations:

For integration with platforms, use the installation and instruction buttons offered by the systems.

Also find the detailed instructions for individual platforms in the articles:

Contact us at or via the chat if you need to develop an individual integration for your platform.


Here you will find complete information about working with HTTP API:

API key

Located in the upper right corner of the page:

If you change the API key, be sure to change it in the request code. Otherwise, queries will stop working.

Connection history

Use the left menu to go to the connections journal:

The list contains connections performed:

  • to any computers on behalf of your account;
  • to computers linked to your account.

The completion command is available for active sessions:

Available session info

The following data is available for each session:

  • connection date and duration;
  • viewing video recordings;
  • computer connection was established to;
  • connection source.

Connection video recordings

Use the view button to play a video:

Use the actions button to delete a video:


The list allows sorting by computer, connection period and presence of a video recording:

Page-by-page display is also available:


Use the left menu to go to the account settings:


Profile settings are used for customization when displaying personal account and connection interfaces:

The following settings are available:

  • Name and surname
  • Country
  • System language
  • Timezone
  • Date format

Login/email change

To edit your email, click Change:

Enter your new email:

The verification window will appear:

Check your mailbox and enter the received code into the verification window:

Enter your current password to confirm the change:

After that, your login email will be changed.

Password change

To change your password, use the button in the upper right corner:

The new password should be at least 6 characters long and consist of numbers and letters.

Deleting an account

To delete your account, use the link in the lower right corner of the page:

After that, you will be prompted to confirm the operation by entering your current password:

Paid plan subscriptions are automatically canceled after you delete your account.

Two-factor authentication

To enable two-factor authentication, go to the Security tab:


When choosing Email as a delivery channel, no additional actions are required:

During the next login, you will see a window for entering the code, while all your personal account data is hidden:

An email with the confirmation code will be sent to the email address assigned to your account:


When choosing Telegram as a delivery channel, the confirmation window is opened right away:

Enter the code obtained from Bot in Telegram:

To get messages, configure integration with Telegram.

Google Authenticator

When choosing Google Authenticator as a delivery channel, you will see the window with the links to the application in App Store and Google Play. After downloading and installing Google Authenticator to your mobile device, move on to the next step:

Next, you will see a window with a QR code and a key:

Scan the QR code in Google Authenticator or enter the code manually and move on to the next step.

Enter the six-digit code from Google Authenticator to complete the setup.

We strongly recommend that you keep your key in a secure place to regain access to your account in case you lose your phone.


To disable two-factor authentication, select Off and confirm your action with the code.

Mobile version of personal account

The personal account is adapted for mobile devices using Progressive Web Application technology. See the details in the article Personal account for iOS and Android.