Continuing our run down of the options in the file sharing preference pane, we are going to explain the Remote Management option.
Remote management works with the Apple Remote Desktop app which is a paid app from the Mac app store, so you won’t need to use this service unless you want to allow other people to control your Mac using the Apple Remote Desktop app.
Go to: System Preferences > Sharing

Now check the Remote Management option from the service list:

You may be prompted to choose which options users are allowed to perform if not click the options button:

By default, all the options apart from “Show when being observed” will be selected and you should leave them set unless instructed by the person accessing your Mac or if you specifically don’t want them to have certain functions.

When it comes to whom can access your Mac via Remote Management, firstly in the Computer Settings options you can set Anyone may request permission to control screen, if you select this option a dialogue will open asking you to allow someone to access the Mac when they attempt to connect using Remote Desktop.

In this same screen, you can also enable the option “Show Remote Management status in the menu bar” when selected an icon which looks like a pair of binoculars will appear in the menu bar which will show whether an Administrator is logged in and also allow you to message them.

You can enable “VNC viewers may control screen with password:” and enter a password VNC clients can use to access, this is less secure than Apple Remote Desktop but useful if the person you want to control your Mac does not have Apple Remote Desktop.
Lastly you can set the access permissions in the “Allow access for:” list, by default All users will be selected which will allow anyone with an account on your Mac to share the screen.
Or you can choose which users can access your Mac via remote Management by pressing the + plus button at the bottom of the “Allow access for:” list.

As ever it is more secure to restrict the list of users able to access the Mac via Remote Management rather than to allow anyone with an account to access the Mac via Remote Management.
Related Posts
10 Things You Didn't Know You Could Do With Apple Configurator (That Save Mac Admins Hours)
1) Retro-enroll Devices into Apple Business Manager (iOS/iPadOS) If a Mac wasn’t purchased through your ABM-linked reseller, you can still claim it. Adding it via Configurator means you get Automated Device Enrollment...
The Evolution of Apple Certification: A Journey Through Versions, Challenges & Growth
A Look Back: The macOS 10.5 Era and the Early Certification Landscape Back in 2008 when I first became an Apple Certified Support Professional, the certification process was a different beast entirely....
Secure Software, Secure Career: How I Passed the CSSLP
Where the CISSP is broad, the CSSLP is laser-focused. This exam dives deep into secure software principles, threat modeling, data protection, API security, database hardening, and development methodologies like Agile, DevOps, and...
Managing Bring Your Own Device (BYOD) for Android with Microsoft Intune
BYOD For Android using Microsoft Intune Alright, so today we’re going to be talking about the management of bring your own device BYOD for Android devices. There’s a lot of information out...
BYO with me in 2025: iOS with User Enrollment in JAMF Pro
BYOD Is for Mobile Devices only right? It really depends on your companies needs. For example many companies need to hire 1099 contractors and in such a case they come with their...
Securing BYOD Email Access: Exploring Strategies in Microsoft 365
Strengthening Your BYOD Program with Secure Email Policies In today’s mobile-first world, organizations increasingly rely on Bring Your Own Device (BYOD) programs to empower employees while optimizing costs. However, this flexibility introduces...
How I Conquered the CISSP Exam: 9 Months, Top Resources, and Proven Strategies
My Study Plan 1. Set a Realistic Timeline From the outset, I knew this wasn’t a sprint—it was a marathon. I gave myself 9 months to study, breaking the material into manageable...
Get more out of scripting than you may expect
Expect is an extension to the Tcl scripting language written by Don Libes. The program automates interactions with programs that expose a text terminal interface. Expect, originally written in 1990 for the...
Cybersecurity is more than having the right tools
Cybersecurity is the convergence of people, processes and technology that come together to protect organizations.