-
Manage access for users in your company
As already discussed in the previous chapter it is in general only possible to make a connection to a device if the TeamViewer ID and the associated password is known or if the access is confirmed via Easy Access or the connection partner confirmed the access manually. If non of the above points is given, it…
-
Roll out TeamViewer securely
As you already learned in the last chapter, you can deploy TeamViewer via MSI to the users and devices within your company with the desired security settings. No user interaction is required for this and you can define in which dimensions TeamViewer can be used in your organization. With rolling out a limited TeamViewer,…
-
Remove app from unauthorized users
Description There can be cases in which you need to remove the TeamViewer application from devices of unauthorized users and block the use of the free version in the corporate network. Remove TeamViewer from unauthorized users To remove TeamViewer from unauthorized users (e.g. former employees), you can…
-
Conditional Access
👉 This chapter applies to TeamViewer clients that have a TeamViewer Tensor license with the Conditional Access Add-on. Description With Conditional Access, you can control the TeamViewer usage and access rights throughout your organization using a rules engine you configure within the Management Console. This conditional…
-
Single Sign-On
👉 This chapter applies to TeamViewer clients that have a TeamViewer Tensor license. Introduction TeamViewer Single Sign-On (SSO) aims to reduce the user management efforts for large companies by connecting TeamViewer with identity providers and user directories. With Single Sign-On, you can enable users to log in to…
-
Auditability
👉 This article applies to all TeamViewer customers with an Enterprise/Tensor license. Audit trails and compliance To support audit trails and optional documentation of internal and external compliance processes, comprehensive logging is used to support you with this. TeamViewer Tensor allows companies to opt-in and out at…
-
Connection reports
As a company administrator you can review the connection reports for incoming and outgoing connection. This feature is not a traditional security setting rather a feature that allows you to review all incoming and outgoing connections performed with your license. Find detailed information about Connections Reports and its…