How to Use Chrome Remote Desktop to Help Family with Tech Issues
Chrome Remote Desktop lets you view and control a family member's computer to help with tech problems — securely, for free.
Both people open Chrome and go to remotedesktop.google.com/support
~15sThe receiver installs the Chrome Remote Desktop extension
~26sQuick Tip
The code only lasts about 5 minutes before it expires and a new one is generated. Have the receiver read it to you quickly by phone or video call.
The helper enters the access code
~16sFix the problem
~30sWarning
Only accept remote access sessions from people you fully trust. Never allow someone who contacts you unexpectedly — by phone, email, or pop-up message — to remotely access your computer. Scammers often use remote access tools to steal personal information.
End the session
~20sYou Did It!
You've completed: How to Use Chrome Remote Desktop to Help Family with Tech Issues
Need more help? Get Expert Help from a TekSure Tech
Chrome Remote Desktop is a free tool from Google that lets one person view and control another person's computer over the internet. If a family member is struggling with a tech problem on their computer, Chrome Remote Desktop lets you see exactly what they are seeing and take control of their mouse and keyboard to fix the issue — without needing to be in the same room or even the same state.
Both people need to have the Google Chrome browser installed on their computers. Chrome is free and available at google.com/chrome if either person does not already have it.
The process works like this: the person needing help (we will call them the "receiver") shares their screen by going to remotedesktop.google.com/support in Chrome and installing a small extension. The extension generates a one-time access code — a string of numbers that expires after a few minutes. The receiver reads this code to you (or texts or calls it to you).
You (the "helper") go to the same website — remotedesktop.google.com/support — and enter the access code in the "Give Support" section. Within seconds, you will see the receiver's entire screen on your computer. You can move their mouse, click things, type, open programs, and install software — exactly as if you were sitting at their keyboard.
The receiver can see everything you are doing the entire time. Nothing happens without them watching it happen. At any time, they can click "Stop Sharing" to immediately end the session and take back control.
This is a completely legitimate, official Google tool used by professional IT departments and families alike. The one-time codes expire quickly, which means someone cannot reconnect without the receiver generating a new code. This makes it safe for occasional use.
For situations where you frequently help the same person — for example, you regularly help a parent — Chrome Remote Desktop also offers a "This device" section for setting up persistent remote access with a PIN. This allows you to connect to their computer whenever they are logged in, without them needing to generate a code each time. Only set this up with people you fully trust, and make sure the PIN is kept private.
A few important notes: both computers need to be on and awake (not in sleep mode) during the session. Both people need a working internet connection. The connection quality depends on both parties' internet speed. And Chrome Remote Desktop works on Windows, Mac, and Linux computers — not mobile phones or tablets.
Was this guide helpful?
Your feedback helps us make TekSure better for everyone.
Want to rate with stars?
Still have questions?
Ask TekBrain a follow-up question about this guide. It’s free, no sign-up needed, and the answer will be in plain English.
Official Resources
Sources used to create and verify this guide. View all sources →
← Previous
How to File Your Taxes Free with FreeTaxUSA
Next →
How Blind and Low-Vision Users Can Use Seeing AI on iPhone
Still stuck? Let a pro handle it.
Our verified technicians can fix this issue for you — remotely or in person.
Related Guides
More from Essential Skills
How to Create a Strong Password
Learn the rules for creating passwords that are nearly impossible to crack.
1 min read
How to Set Up Two-Factor Authentication on Any Account
Add an extra layer of security to your online accounts with 2FA — a must for everyone.
2 min read
How to Identify Phishing Emails
Spot fake emails designed to steal your personal information before you fall for them.
2 min read