Can anyone tell me why we can remote into a User by username when remote
control is only enabled in workstation policy and not the user policy?
Sometimes even bipassing rules which prevent stealth.

6.5 server, 4 interm agent