-
Welcome and Introduction
Welcome to the TeamViewer Security Handbook. Introduction (Online) Security is very important and always has been. Especially for us here at TeamViewer, a leading global technology company that provides a connectivity platform to remotely access, control, manage, monitor, and repair devices of any kind. We are proudly…
-
Six Golden Security Rules
For getting started, we are proud to present you with the Six Golden Security Rules, we recommend to all our users. General After installing Teamviewer and setting up your TeamViewer Account, the first thing you want to set up is your individual security level based on your demand. 1. Set up Two-factor authentication a.)…
-
Manage access for users in your company
As already discussed in the previous chapter it is in general only possible to make a connection to a device if the TeamViewer ID and the associated password is known or if the access is confirmed via Easy Access or the connection partner confirmed the access manually. If non of the above points is given, it…
-
Home Office
When using TeamViewer in your HomeOffice, we recommend the following settings: The Six Golden Security Settings: Set up two-factor authentication Set up Easy Access Set up an Allowlist Make sure to have a strong password hygiene Update your devices Back up your data Black Screen When connecting to your work computer, make…
-
Fundamental Security overview
After checking the individual security settings the TeamViewer software is offering, we want to provide some background information about the Data Centers and the Backbone of our infrastructure as well as some information about encryption, authentication and validation. We want you to feel safe and secure knowing that…
-
Set up unattended access
Even though we walked through the Six Golden Security Rules in the chapter before that already discussed secure unattended access, we´d like to focus on it once more to have a proper starting point for you: General If you plan to use unattended access for TeamViewer, you have to think about security, as your devices will…
-
Roll out TeamViewer securely
As you already learned in the last chapter, you can deploy TeamViewer via MSI to the users and devices within your company with the desired security settings. No user interaction is required for this and you can define in which dimensions TeamViewer can be used in your organization. With rolling out a limited TeamViewer,…
-
IT Support
When using TeamViewer for IT Support, we recommend the following initial settings: The Six Golden Security Settings: Set up two-factor authentication Set up Easy Access Set up an Allowlist Make sure to have a strong password hygiene Update your devices Back up your data Deploy TeamViewer Make sure to deploy TeamViewer…
-
Compliance - International standards
Besides providing a strong and secure backbone and infrastructure, TeamViewer is proud to be in compliance with a varienty of international standards and requirements: SOC2 Service Organization Controls 2 (SOC2) is a reporting framework for service organizations to report on non-financial internal controls for the five…
-
Restrict access
In general, it is only possible to make a connection to a device if the TeamViewer ID and the associated password is known or if the access is confirmed via Easy Access or the connection partner confirmed the access manually. If non of the above points is given, it is not possible to access a device. Depending on where you…