Three of ConsoleWorks' advantages are controlling and monitoring device
access, and logging activity from those devices. However, in some
cases, it may not be possible to provide direct access to a protected
device to the ConsoleWorks server. If, however, you are able to log into
the ConsoleWorks server command prompt from within the network containing
the protected device, this article shows a method for extending access
to the protected device onto the ConsoleWorks server.