Quickbooks Hosting Frequently Asked Questions
When you use the RDP client from Microsoft or the ITX server, you can choose to map your local disks through the Remote Desktop connection into the terminal services environment. This is done by clicking the “Options” button on the first window that appears, then clicking on the “Local Resources” tab. Check the box marked “Disk Drives”, and your drive will appear as a networked drive in the server environment. If you download the prebuilt distribution package (this zip file) we have preset this option for you.
ITX performs a nightly backup of the quickbooks files from the server and securely transfers them to an offsite location.
Yes, you can copy files into your own computer’s hard drive through the drive mapping mechanism provided in the Remote Desktop client.
Yes, you can generate and email PDF’s directly from the Quickbooks software. This is a function provided by the software itself.
No, this is a feature that, for security reasons, ITX has chosen to refrain from issuing to its CPA clients. ITX support personnel can, however, provide remote support through desktop sharing in the event a client needs special assistance with a process.
The server is set up to recover your session if you disconnect and attempt to reconnect within 15 minutes. After that time it assumes that you forgot to log off and terminates the session.
ITX does not represent Intuit or Quickbooks, but we have found that Quickbooks recovers quite gracefully from a terminated session or service disruption, and have not seen any loss of data due to terminated connections. If this occurs Quickbooks may seem unresponsive for several moments; be patient, as it is probably making sure that its data is intact.
Some versions will work on the same system, but under limited conditions. Check with your ITX sales representative for specifics.
Intuit currently places no limit on the number of Quickbooks files that you can have on the system.
Yes, the Quickbooks hosting environment is secure. Located in a guarded hosting facility, with multiple-level firewalls in place, the system is safe from outside intrusion. The use of Microsoft’s Group Policy also allows us to lock down the desktop environment as well. File permissions are set up so that only you can your clients can get at their files.