Remote Environment Manager Desktop configuration and policy management software for Windows

remote environment manager


Remote Environment Manager – PC Configuration & Network Policy Enforcement Software

Available as an optional add-on to the N-central on-premises platform, Remote Environment Manager is a powerful desktop management tool that allows you to easily configure PCs and control network policy enforcement to manage the entire customer environment. Use it to create configuration profiles and apply them automatically to the devices at a customer site.

Remote Environment Manager significantly reduces the total cost of desktop and application management as well as network policy enforcement by enabling you to proactively and securely centralize and standardize desktop management.

Remote Environment Manager Benefits

  • Lower Total Cost of Support
    Automating and centralizing desktop configuration tasks reduces the hidden costs of supporting PCs. According to an IDC study, adopting a centrally managed PC environment results in average savings of $190 per PC per year or about $4,000 annually for a 20-seat customer.
  • Centralized Management
    A single management console allows you to configure, secure, inventory and support desktops and laptops from a central location.
  • Secure Client Configuration
    Standardize and secure desktops consistently across Windows versions.


With Remote Environment Manager's patented validation engine, you can easily construct granular configuration profiles that allow you to manage every aspect of the desktop environment – without having to write a single line of scripting code. Remote Environment Manager significantly reduces the total cost of desktop and application management, as well as network policy enforcement, by enabling you to proactively and securely manage desktops from one central location.

  • Remote USB and Port Security
    Remote Environment Manager allows you to control and prevent access to USB and peripheral storage devices at the level of individual device types. The USB and Port Security option can control read and write access to USB ports, storage and communication devices on the desktop. This is an important feature for differentiation and especially for customers with regulatory requirements for data security.
  • Remote Power Management
    With a focus today on energy efficiencies and cost, the power management feature of Remote Environment Manager is ideal to shut down idle machines.
  • Remote Support Management
    Ongoing management requires access and control of individual desktops from anywhere. The toolset works from any Java-enabled browser to give technicians the power to manage:
    • Point-to-point file transfers
    • Services, processes and drivers
    • File System and the Registry
    • Installed applications
    • Open files, DLLs and registry keys
    • Tasks and alerts
    • Remote reboots
    • Remote control
    • Chat with support agent


  • Comprehensive, Standardized and Enforceable Configuration
    Remote Environment Manager allows you to configure every aspect of the desktop at logon, logout or at frequent intervals throughout the day. Aspects of the remote PC you can control include:
    • Windows firewall (XP SP2+)
    • Power management
    • Mapped drives
    • Printers
    • Manage shortcuts
    • Manage Outlook profiles
    • Microsoft Office preferences
    • Registry and permissions management
    • Desktop file management
    • Active Directory environment standardization
    • Automatic script execution
  • Granular Management Selection
    You can create multiple profiles that are applied based on patented validation logic that allows you to determine which users and computers receive which configuration settings. There are 25 built-in validation types, but if these do not meet your customers' needs, a custom validation feature is also available.
  • Active Directory Integration
    Since Remote Environment Manager is fully integrated with Active Directory, administrators can use Active Directory variables in configurations allowing a standard configuration profile to configure user specific information. These profiles can then be used at multiple customer sites, dramatically lowering the number of unique configuration activities.


Compare the functional differences between Remote Environment Manager (REM) and N-central's integrated Remote Support Manager (RSM) tool.

N-central + RSM N-central + REM
Remote Control
Automated Software Distribution
Asset Management
License Management
Patch Management
In-Depth Troubleshooting Support
Help Desk/User Chat
Point-to-Point File Transfer
Remote Registry Configuration Management
File System
Virtual Memory
Password Changes
USB/Port Security
Activity-Based Login, Logout and Shutdown
Outlook Profiles
Microsoft Office Settings
Drive Mappings
Printer Mapping
Validation Engine
Group Policy Management
AD Environment Standardization
Automatic Script Execution
Automatic File System Cleanup
Security Policy Management


Ensim Unify Enterprise Edition



Ensim Unify Enterprise Edition


Unify Enterprise Edition redefines user provisioning and access control software for Microsoft Active Directory, MS Exchangeincluding Distribution List/Group Management, Office Communications Server (OCS), Google Apps, and mobility applications such as BlackBerry Enterprise Server and Windows Mobile. Ensim Unify is a complete suite of tools that allows organizations to decrease operating costs, improve workforce effectiveness, and meet security and compliance goals.Ensim Unify Enterprise provides change management, automated provisioning, mobile and client device configuration,delegated administration, and resource optimization, all via an easy to use role-based Web portal



View Demo



Network and Systems Management Software for MSPs and IT Professionals



Network and Systems Management Software for MSPs and IT Professionals


Managed Service Providers

N-able combines the top-rated MSP network and systems management (NSM) applications with industry-leading business and technical services to form a complete, scalable solution for providing highly profitable managed services to SMBs. Deliver 90% of your services remotely, drive down costs, generate recurring revenue and provide greater value to your customers. Learn more about our solutions for managed service providers


IT Professionals

Designed for midsize companies with a distributed infrastructure, hundreds of employees located across multiple sites, our network and systems management (NSM) software sets the standard for delivering centralized IT services remotely and cost-effectively. Generate rapid ROI by automating tasks, cutting costs and boosting productivity and service levels – then report these improvements to management with ease. Learn more about our solutions for IT professionals


N-central Technology Demo

In an extensive review, CRN magazine rated N-central the #1 IT automation and managed services software. Now you can see the features that convinced CRN's Test Center engineers that N-central is the best remote monitoring and management solution available. Simply choose to view either a Live Demo or Recorded Demo of N-central. Each demo provides a comprehensive overview of N-central's key features.


Elfiq SitePathMTPX Resilience Demonstration

The Elfiq Approach

Elfiq Networks is recognized for its innovative and refreshing approach to the link balancing product category. Through extensive research and development, a better method of balancing has been conceived enabling a true inline business continuity appliance which will keep your organization running, even if the unit loses power.  That is what we like to call "Building Smarter Networks". This approach based on handling link management at Layer-2 of the OSI model combined with Elfiq’s exclusive feature set enables benefits for any organization requiring management of multiple telecommunications circuits.   Through this integration the Primary Link concept was developed to bring integration into existing networks into a new level of simplicity and efficiency. Benefits of this approach include:

Lowest implementation costs

Lightning-fast throughput

Maximum equipment uptime

Maximum uptime