| Device ID | Name | Status | Owner | Groups | Tags | Last Online | Actions | |
|---|---|---|---|---|---|---|---|---|
| You Other Unclaimed | - | Connect | ||||||
| No devices yet | ||||||||
Groups
| Name | Devices | Created | Actions |
|---|---|---|---|
| No groups yet | |||
Users
| Name | Status | Online | Admin | Last Login | Actions | |
|---|---|---|---|---|---|---|
| Online Offline | Admin | |||||
| No users yet | ||||||
Shares
| Type | Resource | Shared With | Permission | Created | Actions |
|---|---|---|---|---|---|
| No shares yet | |||||
Audit Logs
View connection history, file transfers, security alarms, and admin actions.
| Time | Action | Target | Info | IP |
|---|---|---|---|---|
| No admin actions recorded | ||||
| Time | Type | Remote Device | Local Device | Duration | IP |
|---|---|---|---|---|---|
| Started Ended Failed | |||||
| No connection history recorded | |||||
| Time | Type | Path | Size | Device |
|---|---|---|---|---|
| Upload Download | ||||
| No file transfers recorded | ||||
| Time | Type | Info | Device | User |
|---|---|---|---|---|
| Failed Login Unusual Location Permission Denied Brute Force Suspicious Activity | ||||
| No security alarms recorded | ||||
Showing to of results
User Groups
| Name | Note | Members | Created | Actions |
|---|---|---|---|---|
| No user groups yet | ||||
Configure access control rules. Priority order (highest to lowest): User-level > User Group > Device Group > Legacy Shares.
| User Group | Members | ACL Rules | Actions |
|---|---|---|---|
| Device Group | Devices | ACL Rules | Actions |
|---|---|---|---|
| User | ACL Rules | Actions | |
|---|---|---|---|
Strategies
Strategies define connection and security policies that can be assigned to users or device groups.
| Name | Status | Options Summary | Note | Created | Actions |
|---|---|---|---|---|---|
|
Remote
Files
Clipboard
Password
2FA
Locked
|
|||||
| No strategies yet. Create one to define connection policies. | |||||
Roles
Roles define what actions users can perform. System roles (Admin, Standard, Viewer) cannot be modified or deleted.
| Name | Type | Permissions | Scope | Note | Actions |
|---|---|---|---|---|---|
| System |
All
View
Connect
Devices
Users
Groups
Roles
Audit
|
|
|||
| No roles defined. Create one to manage user permissions. | |||||
Control Roles
Control Roles define what remote control capabilities users have during a session (keyboard, clipboard, file transfer, etc.). This is separate from administrative Roles which control dashboard permissions.
| Name | Status | Permissions | Note | Actions |
|---|---|---|---|---|
|
Keyboard
Clipboard
Audio
File Transfer
Restart
Recording
|
||||
| No control roles defined. Create one to manage remote control permissions. | ||||
Download T2D Remote Client
Install T2D Remote on your devices to enable remote access
Android
APK for Android 8+
DownloadWindows
Installer for Windows 10+
DownloadmacOS
Universal DMG (Intel & Apple Silicon)
DownloadGetting Started
- Download and install T2D Remote on the device you want to control
- Note down the Device ID displayed in the client
- Use "Adopt Device" in the Devices section to claim ownership using the device password
- Connect to your devices from any T2D Remote client
Version 1.4.8
Custom Clients
Custom client configurations allow you to pre-configure RustDesk clients with your server settings.
Clients can download their configuration from /api/custom-client/[name].
| Name | Options | Note | Created | Actions |
|---|---|---|---|---|
|
Rendezvous
Relay
API
Key
|
||||
| No custom clients yet. Create one to pre-configure RustDesk clients. | ||||
Address Book Rules
AB Rules control which devices appear in users' address books. Higher priority rules take precedence.
| Name | Type | Target | Subject | Priority | Status | Actions |
|---|---|---|---|---|---|---|
| No AB rules yet. Create one to control address book visibility. | ||||||
SSO/OIDC Settings
Configure OIDC identity providers used by RustDesk clients and web login.
| Name | Issuer | Client ID | Status | Actions |
|---|---|---|---|---|
| No OIDC providers configured. | ||||
API Tokens
Manage personal API tokens for automation and integrations.
New token (shown once):
| Name | Created | Last Used | Actions |
|---|---|---|---|
| No API tokens created. | |||
Client Versions
| Version | OS | Architecture | Size | Status | Actions |
|---|---|---|---|---|---|
| Latest Mandatory | |||||
| No versions uploaded yet. | |||||
Cross-Group Access Rules
| Source Group | Target Group | Permission | Valid From | Valid Until | Note | Actions |
|---|---|---|---|---|---|---|
| No cross-group access rules. | ||||||
Session Recordings
| Filename | Size | Actions |
|---|---|---|
| Download | ||
| No recordings available. | ||
License
SMTP Configuration
Global Settings
Configure global server settings. These key-value pairs control server behavior.
| Key | Value | Last Updated | Actions |
|---|---|---|---|
|
|
|
||
| No settings configured. | |||
Relay Servers
Manage relay servers, view online device counts by assigned teams, set location for map usage, and block/unblock relays.
Pending Adoption
| Candidate | Endpoint | Location | Live | Last Seen | Action |
|---|---|---|---|---|---|
|
live
kb/s
|
New hbbr relays appear here until an admin adopts them.
| Name | Endpoint | Location | Teams | Devices | Max Conn. | Status | Actions |
|---|---|---|---|---|---|---|---|
| Map |
live
kb/s
total
last seen:
last seen: never
|
Public Private | |||||
| No relay servers configured. | |||||||
Teams
Manage your teams and team memberships. Each user has a personal team and can create organization teams.
| Name | Type | Members | Created | Actions |
|---|---|---|---|---|
| No teams yet. Create one to get started. | ||||
Two-Factor Authentication
Add an extra layer of security to your account
Your account is protected with two-factor authentication.
Backup codes remaining:
Scan the QR code below using an authenticator app like Google Authenticator, Authy, or 1Password.
Can't scan? Enter this code manually:
Enter the 6-digit code from your authenticator app
Save your backup codes
Store these codes in a safe place. Each code can only be used once to access your account if you lose your authenticator.
Enter your current authenticator code to disable 2FA:
Change Password
Update your password to keep your account secure.
Active Sessions
Manage your active sessions. You can revoke access to any session.
Regenerate Backup Codes
This will invalidate your existing backup codes and generate new ones. Enter your authenticator code to continue.
Total Enrolled
Compliance Rate
Pending Commands
Recent Alerts
Enrolled Devices
| Device Name | OS | Last Check-in | Compliance | Actions |
|---|---|---|---|---|
| No enrolled devices. Click "Enroll Device" to get started. | ||||
MDM Policies
| Name | Type | Status | Assignments | Actions |
|---|---|---|---|---|
| No policies defined. Click "Create Policy" to add one. | ||||
MDM Commands
| Device | Type | Status | Created | Result |
|---|---|---|---|---|
| No commands in history. | ||||
App Catalog
| App Name | Platform | Version | Install Command | Actions |
|---|---|---|---|---|
| No apps in catalog. Click "Add App" to add one. | ||||
Compliance Overview
| Device | Total Policies | Compliant | Non-Compliant | Actions |
|---|---|---|---|---|
| No compliance data available. | ||||