-
Golden Security Rules
After installing Teamviewer and creating your TeamViewer account, you first want to set up your individual security level based on your demand. Set up two-factor authentication for your account Two-factor authentication helps to stop hackers from getting into your accounts, even if they have your password. Two-factor…
-
Fundamental Security overview
After checking the individual security settings the TeamViewer software offers, we want to provide some background information about the Data Centers and the Backbone of our infrastructure, as well as some information about encryption, authentication and validation. We want you to feel safe and secure, knowing that…
-
Home Office
When using TeamViewer in your HomeOffice, we recommend the following settings: The Golden Security Settings: Set up two-factor authentication Manage your device and set up Easy Access Set up an allowlist Make sure to have strong password hygiene Update your devices Back up your data Black Screen When connecting to your…
-
Conditional Access
This chapter applies to TeamViewer clients that have a TeamViewer Tensor license with the Conditional Access Add-on. Description With Conditional Access, you can control the TeamViewer usage and access rights throughout your organization using a rules engine you configure within the Management Console. This conditional…
-
Set up unattended access
If you plan to use unattended access for TeamViewer, you have to think about security, as your devices will be accessible all the time. Please follow the instructions below to make sure your Host is protected from unauthorized access at any time. Manage your device and grant Easy Access To guarantee the most secure remote…
-
Compliance - International standards
Besides providing a strong and secure backbone and infrastructure, TeamViewer is proud to be in compliance with a variety of international standards and requirements: SOC2 Service Organization Controls 2 (SOC2) is a reporting framework for service organizations to report on non-financial internal controls for the five…
-
IT Support
When using TeamViewer for IT Support, we recommend the following initial settings: The Golden Security Settings: Set up two-factor authentication Manage your device and set up Easy Access Set up an allowlist Make sure to have strong password hygiene Update your devices Back up your data Deploy TeamViewer Make sure to…
-
Two-Factor authentication for connections
Two-factor authentication for connections offers an extra layer of protection to desktop computers. When enabled, connections to that computer must be approved using a push notification sent to specific mobile devices. This article applies to all TeamViewer users. How to enable two-factor authentication To learn how to…
-
Online Collaboration
When using TeamViewer or TeamViewer Meeting for Online Collaboration, we recommend the following settings: The Six Golden Security Settings: Set up two-factor authentication Set up Easy Access Set up an Allowlist Make sure to have a strong password hygiene Update your devices Back up your data 2-factor authentication…
-
Restrict access
In general, it is only possible to make a connection to a device if the TeamViewer ID and the associated password are known or if the access is confirmed via Easy Access or the connection partner confirmed the access manually. If none of the above points is given, accessing a device is impossible. Depending on where you…