SlideShare a Scribd company logo
How to enable
Screen Sharing on Mac
Proprietary & Confidential
Setting up Screen Sharing on a Mac

To make this Mac available
for screen sharing, go to
System Preferences

Proprietary & Confidential

2
Within System Preferences

Click on Sharing

Proprietary & Confidential

3
Select the check
box for Screen
Sharing

Next, define who you
want share your Mac
access with by selecting
either specific or all users

Proprietary & Confidential

4
Computer settings (PC users)
If you want to share your
screen with PC users as
well, select Computer
Settings

Proprietary & Confidential

5
How to access your Mac from another Mac

To connect to another
Mac, select Go and
then Network

Proprietary & Confidential

6
Accessing your Mac

Click on the Mac you
want to connect to and
select Share Screen

Proprietary & Confidential

7
Setting up username and password
Provide the username
and password of the
person you are
connecting to

Proprietary & Confidential

8
Screen Share Options

Select Share Display to
see the current screen
Proprietary & Confidential

Select Log In to log in to
your account

9
Remote Screen

Voila. You are now
connected to the
remote Mac just as if
you were on the local
network

Proprietary & Confidential

10
Thanks for viewing!

Simple, secure, cloud-based networking
that connects people everywhere
with IT resources anywhere.
pertino.com
Proprietary & Confidential

Slide 11

More Related Content

What's hot

Printer sharing
Printer sharingPrinter sharing
Printer sharing
ARAVINDARAJ K
 
Um016008 e wifi_setting_usermanual_en
Um016008 e wifi_setting_usermanual_enUm016008 e wifi_setting_usermanual_en
Um016008 e wifi_setting_usermanual_en
ELECTRONICA INDUSTRIAL
 
How to get rid of stop online piracy automatic protection system virus
How to get rid of stop online piracy automatic protection system virusHow to get rid of stop online piracy automatic protection system virus
How to get rid of stop online piracy automatic protection system virusFixPCyourself
 
Pertino screensharing
Pertino screensharingPertino screensharing
Pertino screensharingddnoriega
 
Look trough your windows 10 privacy settings
Look trough your windows 10 privacy settingsLook trough your windows 10 privacy settings
Look trough your windows 10 privacy settings
Klaus Drosch
 
How to get rid of vista internet security 2013 virus
How to get rid of vista internet security 2013 virusHow to get rid of vista internet security 2013 virus
How to get rid of vista internet security 2013 virusFixPCyourself
 
CSS Module 8 - Configuring the Wireless Access Point
CSS Module 8 - Configuring the Wireless Access PointCSS Module 8 - Configuring the Wireless Access Point
CSS Module 8 - Configuring the Wireless Access Point
kenjifritz
 
Get rid of 90.84.59.147 connection virus
Get rid of 90.84.59.147 connection virusGet rid of 90.84.59.147 connection virus
Get rid of 90.84.59.147 connection virusFixPCyourself
 
174.123.230.82 virus removal guide
174.123.230.82 virus removal guide174.123.230.82 virus removal guide
174.123.230.82 virus removal guideFixPCyourself
 
How to get rid of microsoft security essentials alert virus
How to get rid of microsoft security essentials alert virusHow to get rid of microsoft security essentials alert virus
How to get rid of microsoft security essentials alert virusFixPCyourself
 
GSS Anti Scam Software How To Use Presentation.
GSS Anti Scam Software How To Use Presentation.GSS Anti Scam Software How To Use Presentation.
GSS Anti Scam Software How To Use Presentation.Saurav Misra
 
How to delete windows safety toolkit
How to delete windows safety toolkitHow to delete windows safety toolkit
How to delete windows safety toolkitFixPCyourself
 
How to get rid of xp internet security 2013 virus
How to get rid of xp internet security 2013 virusHow to get rid of xp internet security 2013 virus
How to get rid of xp internet security 2013 virusFixPCyourself
 
Der computer ist für die verletzung der gesetze der republik österreich block...
Der computer ist für die verletzung der gesetze der republik österreich block...Der computer ist für die verletzung der gesetze der republik österreich block...
Der computer ist für die verletzung der gesetze der republik österreich block...FixPCyourself
 
How to get rid of security shield 2012 virus
How to get rid of security shield 2012 virusHow to get rid of security shield 2012 virus
How to get rid of security shield 2012 virusFixPCyourself
 
How to remove startgo123.com hijacker from infected browsers easily
How to remove startgo123.com hijacker from infected browsers easilyHow to remove startgo123.com hijacker from infected browsers easily
How to remove startgo123.com hijacker from infected browsers easily
haroNaroum
 
Users cecilia app_data_local_temp_1f24
Users cecilia app_data_local_temp_1f24Users cecilia app_data_local_temp_1f24
Users cecilia app_data_local_temp_1f24Cecilia Rohrbach
 
Guide to remove infomoneyservice.com redirect virus
Guide to remove infomoneyservice.com redirect virusGuide to remove infomoneyservice.com redirect virus
Guide to remove infomoneyservice.com redirect virusFixPCyourself
 
How to get rid of adware win32 open candy virus
How to get rid of adware win32 open candy virusHow to get rid of adware win32 open candy virus
How to get rid of adware win32 open candy virusFixPCyourself
 
Remote desktop and print server
Remote desktop and print serverRemote desktop and print server
Remote desktop and print server
University of Central Punjab
 

What's hot (20)

Printer sharing
Printer sharingPrinter sharing
Printer sharing
 
Um016008 e wifi_setting_usermanual_en
Um016008 e wifi_setting_usermanual_enUm016008 e wifi_setting_usermanual_en
Um016008 e wifi_setting_usermanual_en
 
How to get rid of stop online piracy automatic protection system virus
How to get rid of stop online piracy automatic protection system virusHow to get rid of stop online piracy automatic protection system virus
How to get rid of stop online piracy automatic protection system virus
 
Pertino screensharing
Pertino screensharingPertino screensharing
Pertino screensharing
 
Look trough your windows 10 privacy settings
Look trough your windows 10 privacy settingsLook trough your windows 10 privacy settings
Look trough your windows 10 privacy settings
 
How to get rid of vista internet security 2013 virus
How to get rid of vista internet security 2013 virusHow to get rid of vista internet security 2013 virus
How to get rid of vista internet security 2013 virus
 
CSS Module 8 - Configuring the Wireless Access Point
CSS Module 8 - Configuring the Wireless Access PointCSS Module 8 - Configuring the Wireless Access Point
CSS Module 8 - Configuring the Wireless Access Point
 
Get rid of 90.84.59.147 connection virus
Get rid of 90.84.59.147 connection virusGet rid of 90.84.59.147 connection virus
Get rid of 90.84.59.147 connection virus
 
174.123.230.82 virus removal guide
174.123.230.82 virus removal guide174.123.230.82 virus removal guide
174.123.230.82 virus removal guide
 
How to get rid of microsoft security essentials alert virus
How to get rid of microsoft security essentials alert virusHow to get rid of microsoft security essentials alert virus
How to get rid of microsoft security essentials alert virus
 
GSS Anti Scam Software How To Use Presentation.
GSS Anti Scam Software How To Use Presentation.GSS Anti Scam Software How To Use Presentation.
GSS Anti Scam Software How To Use Presentation.
 
How to delete windows safety toolkit
How to delete windows safety toolkitHow to delete windows safety toolkit
How to delete windows safety toolkit
 
How to get rid of xp internet security 2013 virus
How to get rid of xp internet security 2013 virusHow to get rid of xp internet security 2013 virus
How to get rid of xp internet security 2013 virus
 
Der computer ist für die verletzung der gesetze der republik österreich block...
Der computer ist für die verletzung der gesetze der republik österreich block...Der computer ist für die verletzung der gesetze der republik österreich block...
Der computer ist für die verletzung der gesetze der republik österreich block...
 
How to get rid of security shield 2012 virus
How to get rid of security shield 2012 virusHow to get rid of security shield 2012 virus
How to get rid of security shield 2012 virus
 
How to remove startgo123.com hijacker from infected browsers easily
How to remove startgo123.com hijacker from infected browsers easilyHow to remove startgo123.com hijacker from infected browsers easily
How to remove startgo123.com hijacker from infected browsers easily
 
Users cecilia app_data_local_temp_1f24
Users cecilia app_data_local_temp_1f24Users cecilia app_data_local_temp_1f24
Users cecilia app_data_local_temp_1f24
 
Guide to remove infomoneyservice.com redirect virus
Guide to remove infomoneyservice.com redirect virusGuide to remove infomoneyservice.com redirect virus
Guide to remove infomoneyservice.com redirect virus
 
How to get rid of adware win32 open candy virus
How to get rid of adware win32 open candy virusHow to get rid of adware win32 open candy virus
How to get rid of adware win32 open candy virus
 
Remote desktop and print server
Remote desktop and print serverRemote desktop and print server
Remote desktop and print server
 

Viewers also liked

Staying Connected While on Vacation - Infographic
Staying Connected While on Vacation - InfographicStaying Connected While on Vacation - Infographic
Staying Connected While on Vacation - Infographic
Pertino
 
Pertino Overview for the IT Generalist
Pertino Overview for the IT GeneralistPertino Overview for the IT Generalist
Pertino Overview for the IT Generalist
Pertino
 
Cv’s futures - dey
Cv’s   futures - deyCv’s   futures - dey
Cv’s futures - deyBOAHistory
 
Demokrasi
DemokrasiDemokrasi
Demokrasi
Dewi Sanusi Noor
 
UFO infographic
UFO infographicUFO infographic
UFO infographic
toad36melody
 
HADITS SHOHIH
HADITS SHOHIHHADITS SHOHIH
HADITS SHOHIH
Dewi Sanusi Noor
 
Evaluation Question
Evaluation QuestionEvaluation Question
Evaluation QuestionBroganOBrien
 
Keselamatan kerja di laboratorium
Keselamatan kerja di laboratoriumKeselamatan kerja di laboratorium
Keselamatan kerja di laboratorium
Dewi Sanusi Noor
 
Comparing Your IT Networking Options
Comparing Your IT Networking OptionsComparing Your IT Networking Options
Comparing Your IT Networking Options
Pertino
 
How to Enable File and Print Sharing on Windows
How to Enable File and Print Sharing on WindowsHow to Enable File and Print Sharing on Windows
How to Enable File and Print Sharing on Windows
Pertino
 

Viewers also liked (18)

Bab i
Bab iBab i
Bab i
 
Staying Connected While on Vacation - Infographic
Staying Connected While on Vacation - InfographicStaying Connected While on Vacation - Infographic
Staying Connected While on Vacation - Infographic
 
Pertino Overview for the IT Generalist
Pertino Overview for the IT GeneralistPertino Overview for the IT Generalist
Pertino Overview for the IT Generalist
 
Cv’s futures - dey
Cv’s   futures - deyCv’s   futures - dey
Cv’s futures - dey
 
Demokrasi
DemokrasiDemokrasi
Demokrasi
 
Wk1 disc2
Wk1 disc2Wk1 disc2
Wk1 disc2
 
Media
MediaMedia
Media
 
UFO infographic
UFO infographicUFO infographic
UFO infographic
 
HADITS SHOHIH
HADITS SHOHIHHADITS SHOHIH
HADITS SHOHIH
 
Hero
HeroHero
Hero
 
Evaluation Question
Evaluation QuestionEvaluation Question
Evaluation Question
 
Keselamatan kerja di laboratorium
Keselamatan kerja di laboratoriumKeselamatan kerja di laboratorium
Keselamatan kerja di laboratorium
 
Comparing Your IT Networking Options
Comparing Your IT Networking OptionsComparing Your IT Networking Options
Comparing Your IT Networking Options
 
My task presentation general
My task presentation generalMy task presentation general
My task presentation general
 
Wk1 disc2
Wk1 disc2Wk1 disc2
Wk1 disc2
 
Bab ii
Bab iiBab ii
Bab ii
 
How to Enable File and Print Sharing on Windows
How to Enable File and Print Sharing on WindowsHow to Enable File and Print Sharing on Windows
How to Enable File and Print Sharing on Windows
 
Wk1 disc2
Wk1 disc2Wk1 disc2
Wk1 disc2
 

Recently uploaded

Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 

Recently uploaded (20)

Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 

How to Enable Screen Sharing on Mac

  • 1. How to enable Screen Sharing on Mac Proprietary & Confidential
  • 2. Setting up Screen Sharing on a Mac To make this Mac available for screen sharing, go to System Preferences Proprietary & Confidential 2
  • 3. Within System Preferences Click on Sharing Proprietary & Confidential 3
  • 4. Select the check box for Screen Sharing Next, define who you want share your Mac access with by selecting either specific or all users Proprietary & Confidential 4
  • 5. Computer settings (PC users) If you want to share your screen with PC users as well, select Computer Settings Proprietary & Confidential 5
  • 6. How to access your Mac from another Mac To connect to another Mac, select Go and then Network Proprietary & Confidential 6
  • 7. Accessing your Mac Click on the Mac you want to connect to and select Share Screen Proprietary & Confidential 7
  • 8. Setting up username and password Provide the username and password of the person you are connecting to Proprietary & Confidential 8
  • 9. Screen Share Options Select Share Display to see the current screen Proprietary & Confidential Select Log In to log in to your account 9
  • 10. Remote Screen Voila. You are now connected to the remote Mac just as if you were on the local network Proprietary & Confidential 10
  • 11. Thanks for viewing! Simple, secure, cloud-based networking that connects people everywhere with IT resources anywhere. pertino.com Proprietary & Confidential Slide 11