

As soon as the random password changes the person cannot access your device any longer until you give him the newly generated password or a One-Time Password.đź’ˇHint: Only allow persons you trust to remote control your device. Use caseIf you give your TeamViewer ID and the random password, this person will be able to connect to your device. The random password is shown on the Remote Control tab of your TeamViewer application by default. The second option is to Grant access to your device via One-Time Access. Random password disabled on host modules, enforcedÄoes this setup look like it's secure enough to let those host modules run on computers so that the admin can take unattended access whenever needed? If not, please include reasons for it and/or tips and tricks to make it more secure.GeneralThis article applies to all TeamViewer users.The random password is one of two options for spontaneous access via password.Any changes to host requires local admin password, enforced.Prevent the unassignment of the assigned admin account in host modules, enforced.Whitelist in use to allow connections only from the admin account, enforced.Install all new updates automatically, enforced.On top of that there's a policy attached to the custom host module deployment that specifies the following things for every host: TeamViewer custom host module with account assignment for the admin account (easy access/unattended access) enabled, so the deployment happens with the specific api token.Full TeamViewer client for admin to give remote assistance (random password disabled).TeamViewer account with a complex password and 2FA enabled.Now I decided to come seek professional and objective opinions about the security of the following scenario: I'm a systems specialist in our organization and I've read a lot about TeamViewer security concerns over the last few years.
