Illustration showing cybersecurity feature concept

Strengthening Security Foundations: The Role of Enhanced Access and Control

Dive into our on-demand webinar to learn how to maintain and manage your organization’s most important data and digital assets.

Strengthening Security Foundations: Enhanced Access & Control

Q&A from this webinar

They would need to connect to the device once to enable further means to automatically be able to unattended access the devices in the future, either via a personal password, windows authentication, or easy access. You can prevent this by managing the devices with a policy to restrict the device configuration.

Only the scoped users in the enterprise app will be allowed to login via the idp, all other users will be blocked as they not are allowed.

There are logs on the devices and in the management console, however that will only show when there is a successful connection. The block and allow list is your best control over WHO is authorized to connect to that device, the simplest configuration is for "members of this company profile" that will only mean that accounts in your licensed tenant would be authorized to connect to your devices. There is a large trust and safety team that is working to build various campaigns to target this type of behavior, however open configurations are still open and there is limited actions TeamViewer can enable in this realm.

Want to understand what Tensor could do for you?

Want to know more about TeamViewer Tensor? Let us know or ask your TeamViewer certified partner, and a TeamViewer expert will get in touch with you to schedule a talk, product demo or free trial depending on your needs.

Fill out the form below and we will get back to you as soon as possible.

Talk directly to an expert now. Call: