The Security Center helps administrators to monitor and strengthen the security of their company’s TeamViewer environment.
This initial release includes the first of three security pillars: Users. This section provides a centralized overview of your users' security status and offers actionable recommendations to help you immediately improve the security posture of your TeamViewer environment.
This article applies to Premium, Corporate, or Tensor license holders.
How to access the Security Center
To open the Security Center, please follow the instructions below:
- Sign in to your administrator TeamViewer account within the TeamViewer client or via https://web.teamviewer.com/.
- Go to the Admin settings.
- Within the Organization management section, click Security Center.
Strengthen your users’ security
The Users section helps administrators identify potential risks related to user accounts and apply best practices to secure them. The system automatically checks several key criteria and provides actionable buttons to resolve issues.
Secure accounts with two-factor authentication or Single Sign-On
To enhance access security, TeamViewer checks whether user accounts are secured with either two-factor authentication (2FA) or Single Sign-On (SSO). Enabling one of these methods is critical for protecting your organization from unauthorized access.
- 2FA adds a second layer of verification to user logins, providing enhanced protection.
- SSO (Tensor only) centralizes user authentication, enforces strong password policies, and ensures secure access through your identity provider.
Note: If SSO is not enabled, 2FA becomes mandatory to ensure adequate protection.
Reduce the number of admin users
The system identifies how many admin users exist within your organization. Keeping the number of admin users to a minimum helps:
- Reduce the risk of unauthorized configuration changes.
- Ensure tighter control over user and system permissions.
While there is no hard limit, we recommend minimizing admin accounts wherever possible.
Enable connection reports for all users (Premium, Corporate, or Tensor plans only)
For improved transparency and auditing, you can enable connection reports to track user activity across the organization. This feature helps you:
- Monitor remote sessions.
- Enforce security policies.
- Detect anomalies and ensure compliance.
Enable event logs for full visibility (Tensor license only)
Event logs record detailed information about user actions and changes made within TeamViewer. Enabling event logging allows you to:
- Review system activities such as logins, permission changes, and configuration updates.
- Audit compliance with internal and external security requirements.
Gain visibility into connection activity
The Connections section helps administrators monitor how TeamViewer is being used across the organization and identify potential risks related to remote access.
Monitor incoming and outgoing connections
The system displays the number of incoming and outgoing connections over the past 30 days. This helps you:
- Understand usage trends.
- Detect unusual activity.
- Ensure remote access aligns with your security policies.
Analyze the used authentication methods
Clicking View connection methods opens a detailed overview of the authentication methods used for incoming connections to managed devices.
This allows you to:
- Verify that secure connection methods have been used such as prompt for confirmation or Easy Access.
- Identify gaps in authentication practices.
- View or export detailed connections and take granular control.
Note: Authentication method recommendations are only available to users with access to the Event Log.
You can also click Export CSV to download the data for further analysis or reporting.
Review Conditional Access rule coverage (Tensor license only)
TeamViewer shows how many Conditional Access rules are currently active.
In this example, a 10 out of 13 indicator means:
- 10 rules are active
- 3 rules are inactive (2 expired, 1 scheduled)
This visibility helps ensure that Conditional Access is enforced consistently across your organization.
Take immediate action
Each recommendation in the Security Center includes a clear explanation and a button to take immediate action. This allows administrators to fix issues directly or navigate to the appropriate settings without switching tabs or searching through the platform.