-
Conditional Access
This chapter applies to TeamViewer clients that have a TeamViewer Tensor license with the Conditional Access Add-on. Description With Conditional Access, you can control the TeamViewer usage and access rights throughout your organization using a rules engine you configure within the Management Console. This conditional…
-
Two-Factor authentication for connections
Two-factor authentication for connections offers an extra layer of protection to desktop computers. When enabled, connections to that computer must be approved using a push notification sent to specific mobile devices. This article applies to all TeamViewer users. How to enable two-factor authentication To learn how to…
-
Manage access for users in your company
As already discussed in the previous chapter, it is, in general, only possible to make a connection to a device if the TeamViewer ID and the associated password are known or if the access is confirmed via Easy Access or the connection partner confirmed the access manually. Accessing a device is impossible if none of the…
-
Remove app from unauthorized users
There can be cases in which you need to remove the TeamViewer application from devices of unauthorized users and block the use of the free version in the corporate network. Remove TeamViewer from unauthorized users To remove TeamViewer from unauthorized users (e.g., former employees), you can uninstall TeamViewer by using…
-
Single Sign-On
TeamViewer Single Sign-On (SSO) aims to reduce user management efforts for large companies by connecting TeamViewer with identity providers and user directories. With Single Sign-On, you can enable users to log in to TeamViewer Tensor with their existing corporate SSO credentials. With this, you prevent unauthorized remote…
-
Security key redirection
Two-factor authentication is a security measure that requires both a password and an additional verification method. The most secure type of two-factor authentication is a physical security key, which provides an added layer of protection against unauthorized access. With a security key, a user's account cannot be accessed…
-
Roll out TeamViewer securely
As you already learned in the last chapter, you can deploy TeamViewer via MSI to the users and devices within your company with the desired security settings. No user interaction is required for this, and you can define which dimensions TeamViewer can use in your organization. By rolling out a limited TeamViewer, you can…
-
Auditability
To support audit trails and optional documentation of internal and external compliance processes, comprehensive logging is used to support you with this. TeamViewer Tensor allows companies to opt in and out at any time to collect a log of all relevant actions (who, what, when, where) during remote control sessions and for…
-
Connection reports
As a company administrator, you can review the connection reports for incoming and outgoing connections. This feature is not a traditional security setting but rather a feature that allows you to review all incoming and outgoing connections performed with your license. Find detailed information about Connections Reports…