This article applies to all TeamViewer users.
All TeamViewer versions use full encryption. Encryption is based on 4096bit RSA private/public key exchange and 256 Bit AES session encoding. This uses the same security level as https/SSL and is considered completely safe by today's standards.
The key exchange also guarantees that the data transfer is completely encoded from client to client and that any routers or servers in between (including our routers) are unable to read or analyze the data stream.
Security and privacy have always been a top priority during development.
We invite you to visit our Security Handbook.
This technical security document is for IT professionals and network administrators who want an overview of TeamViewer security standards and protocols. Please feel free to share this document with your customers and colleagues to address their security questions.
If you’re not a professional network administrator, please refer to “TeamViewer: The Company and Software” for a summary of our commitment and approach to security.
The Company and the Software
TeamViewer GmbH was founded in 2005, and is headquartered in Göppingen, Germany, with offices is Australia, Asia, and the United States. We develop and sell remote connectivity software for secure remote access and support, IoT solutions, customer engagement, and industrial augmented reality workflows. Within a short span of time, the free version of TeamViewer has led to rapid growth, with more than 200 million users of the TeamViewer software on more than 2.5 billion devices, in more than 200 countries around the world. The software is available in more than 30 languages.
Fundamentals of TeamViewer Security
TeamViewer is used by more than 45 million users at a time, on any given day. These users provide spontaneous support over the internet, accessing unattended computers (e.g. providing remote support for servers) and host online meetings. Depending on the configuration, TeamViewer can be used to remotely control the mouse and keyboard of another computer in real time, as though you were accessing it in person.
If a Windows, Mac, or Linux administrator logs in to a remote computer, that person will be granted administrator rights to that computer as well. Clearly, using this powerful functionality over the internet must be protected with stringent security protocols. As such, we put security at the center of everything we do by engineering our software by security by design.
Our goal is to ensure access to computers is safe. Your security is our highest priority: users only trust secure solutions and we’re fully committed to providing secure solutions to sustain long-term business success.
Security management is inconceivable without an established quality management system. TeamViewer GmbH is a leading global vendor in the market with an ISO 9001 certfied quality management system (QMS). Our quality management follows internationally recognized standards and is reviewed by external audits on an annual basis.
External Expert Assessment
TeamViewer software has been awarded a five-star quality seal, the maximum rating given by the Federal Association of IT Experts and Reviewers (Bundesverband der IT-Sachverständigen und Gutachter e.V., BISG e.V.). The independent reviewers of the BISG e.V. inspect products of qualified producers for their quality, security, and service characteristics.
Leading global enterprises across industries — such as financial services, healthcare, government, and other sectors with highly sensitive data — leverage TeamViewer for secure remote access and support, customer engagement, IoT, and industrial augmented reality solutions. To see how your peers have used TeamViewer in their organizations, explore our customer success stories, available on our website at
Remote Connections and Sessions
When establishing a remote session, TeamViewer determines the optimal type of connection.
After the handshake through our master servers, a direct connection through User Datagram Protocol (UDP) or Transmission Control Protocol (TCP) is established in 70 percent of all cases— even behind standard gateways, NATs, and firewalls.
The rest of the connections are routed through our highly redundant router network via TCP or http-tunnelling. That means you don’t have to open any ports in order to use TeamViewer.
As described in the below section “Secure Connections” section, not even TeamViewer — as the operators of the routing servers — can read the encrypted data traffic.
TeamViewer traffic is secured using RSA 4096 public/private key exchange and AES 256-bit session encryption. This technology is used in a comparable form for https/TLS and is considered completely safe by today’s standards.
As the private key never leaves the client computer, this ensures that the interconnected computers, including the TeamViewer routing servers, cannot decipher the data stream.
Each TeamViewer client has a certificate of the master cluster, enabling it to verify certificates of the TeamViewer system. These certificates are used in a handshake between participants of the TeamViewer network.
See the below image for a simplified overview of the handshake key exchange
Using the Secure Remote Password (SRP) protocol version 6, no password equivalent data is shared during the TeamViewer password authentication process.
Only a password verifier is stored on the local computer. For more details, refer to the “TeamViewer Account” section.
Validation of TeamViewer IDs
TeamViewer IDs are based on various hardware and software characteristics and are automatically generated by TeamViewer. The TeamViewer servers check the validity of these IDs.
When it comes to TeamViewer security, prospective customers regularly ask about encryption. Understandably, their top concerns are that TeamViewer access data could be tapped or that a third party could monitor their connections. TeamViewer has brute-force attack security protocols in place to keep connections safe and private.
In the context of computer security, a brute-force attack is a trial-and-error method to guess a password that is protecting a resource. With the growing computing power of standard computers, the time needed for guessing long passwords has been increasingly reduced.
As a defense against brute-force attacks, TeamViewer exponentially increases the required wait time between failed password attempts. For example, it takes 17 hours for 24 failed attempts. The required wait time between logins is only reset after successfully entering the correct password.
TeamViewer not only has a mechanism in place to protect its customers from attacks from one specific computer, but also from attackers controlling a large number of computers trying to access a specific target computer (e.g. using a botnet).
As an additional security layer, all of our software is signed via DigiCert Code Signing. Consequently, the publisher of the software is always readily identifiable. If the software has been changed afterwards, the digital signature automatically becomes invalid.
Datacenter & Backbone
To provide the best possible security and availability of TeamViewer services, all TeamViewer servers are located in data centers which are compliant with ISO 27001, leveraging multi-redundant carrier connections and redundant power supplies. Furthermore, only industry-grade hardware is used and all servers that store sensitive data are located in Germany or Austria.
Being ISO 27001-certified means that personal access control, video camera surveillance, motion detectors, 24/7 monitoring, and on-site security personnel ensure access to the data center is only granted to authorized persons, guaranteeing the best possible hardware and data security. There is also a detailed identification check at the single point-of-entry of the data centers.
TeamViewer accounts are hosted on dedicated TeamViewer servers. For information on access control, please refer to the “Data Center and Backbone” section. For authorization, the Secure Remote Password protocol (SRP) version 6 is used. This protocol combines the advantages of conventional ways of password storage. We do not store any information on our servers that could be used by an unauthorized third party to authenticate as the given account. Additionally, passwords are never sent to our servers during the authentication. Rather, TeamViewer uses a unique verification process, valid for a single authentication run only, which can’t be reused again.
Data stored in the account — such as passwords, keys, and chat logs — are encrypted using a combination of RSA and AES, where the root key for the encryption is derived from the user’s password. This ensures that anyone without the password can’t access the data stored in the account.
The TeamViewer Management Console is a web-based platform for user management, connection reporting, and managing Computers and Contacts.
It is hosted in ISO 27001-certified, HIPAA compliant data centers. All data transfer is through a secure channel using TLS (Transport Layer Security) encryption, the standard for secure internet network connections. Sensitive data is stored AES/RSA 256-bit encrypted. It uses the same encryption and authentication mechanisms as those described for TeamViewer accounts.
From within the TeamViewer Management Console, users are able to define, distribute, and enforce setting policies for the TeamViewer software installations on devices that belong specifically to them.
Setting policies are digitally signed by the account that generates them. This ensures that the only account permitted to assign a policy to a device is the account to which the device belongs.
Application Security in TeamViewer
Block- and Allowlist
Especially when TeamViewer is used for unattended computer maintenance and support (i.e., no connection partner is at the remote computer to accept incoming connection requests), AllowList adds more security.
Adding TeamViewer IDs or accounts to your AllowList enables you to limit the number of people who can access specified machines to the explicit named IDs or accounts.
Moreover, even if a password is lost or compromised, unauthorized third parties still won’t be able to access the device. The restrictions can either be done to allow only specific TeamViewer IDs or TeamViewer accounts to access the computer remotely.
AllowLists can be managed using the Policies described in the “Management Console” section.
The BlockList lets you prevent certain partners or devices from establishing a connection to your computer. TeamViewer accounts or TeamViewer IDs on the BlockList can’t connect to your computer.
📌Note: You will still be able to set up outgoing TeamViewer sessions with partners on the BlockList
Chat messages and their history are end-to-end encrypted, stored in the TeamViewer account using RSA/AES as described in the “TeamViewer Account” section. Only participants in a chatroom or 1:1 chat can access the messages and history.
No Stealth Mode
There is no function that enables you to have TeamViewer running undetected in the background.
Even if the application is running as a Windows service in the background, TeamViewer is always visible by means of an icon in the system tray.
After establishing a connection, there is always a small control panel visible above the system tray. Therefore, TeamViewer is intentionally unsuitable for covertly monitoring computers or employees. This allows users to prevent sensitive or confidential from being shown on their screen during a TeamViewer session.
Trusted Devices is an alternative to two-factor authentication and provides an extra layer of security for your TeamViewer Account.
If you do not set up two-factor authentication, Trusted Devices automatically applies. As a preventive measure to ensure your account’s security, you must manually authorize new devices or browsers when signing in to access your TeamViewer account from them for the first time.
As part of the authorization process, an email is sent to your email address associated with your TeamViewer account. Without adding a device, browser, or IP to your Trusted Devices, you can´t log in. This protects your account from others trying to log in as they would need access to your email inbox as well to authorize the login.
Learn more about Trusted Devices and Managing Trusted Devices:
1. Trusted Devices
2. Trust Management for Trusted Devices
For spontaneous customer support, TeamViewer and TeamViewer QuickSupport generate a random password that can be changed at any time. If your connection partners or support requesters share their password with you, you can connect to their computers by entering their ID and password.
Depending on the settings, TeamViewer generates a new password after it restarts, after the session, or when manually requested. TeamViewer QuickSupport always generates a new password when it’s launched or when users request it.
When using TeamViewer for unattended remote support (e.g. accessing and maintaining servers), we recommend the following:
Please learn more about it in our Security handbook.
Combined with two-factor authentication, using these security features will help ensure only authorized people can access specified devices. All passwords are verified using the same SRP protocol described in the “TeamViewer Account” section.
Incoming and Outgoing Access Control
You can individually configure the connection modes of TeamViewer. For instance, you can configure your remote support or meeting computer so no incoming connections are possible.
Limiting functionality to those features actually needed also means mitigating the risks of potential breaches or attacks
TeamViewer assists companies with their HIPAA and PCI compliance requirements. Two-factor authentication adds an additional security layer to protect TeamViewer accounts from unauthorized access.
In addition to both username and password, the user must enter a code in order to authenticate. This code is only valid for a short period of time, generated via the Time-based One-time Password (TOTP) algorithm.
Through two-factor authentication and limiting access by means of adding devices to the AllowList, TeamViewer enables you to meet all necessary criteria for HIPAA and PCI certification.
Both TeamViewer infrastructure and the TeamViewer software are subject to penetration tests on a regular basis. The tests are performed by independent companies, specialized in security testing.