The Security Center helps administrators to monitor and strengthen the security of their company’s TeamViewer environment.
This initial release includes the first of three security pillars: Users. This section provides a centralized overview of your users' security status and offers actionable recommendations to help you immediately improve the security posture of your TeamViewer environment.
This article applies to Premium, Corporate, or Tensor license holders.
To open the Security Center, please follow the instructions below:
The Users section helps administrators identify potential risks related to user accounts and apply best practices to secure them. The system automatically checks several key criteria and provides actionable buttons to resolve issues.
To enhance access security, TeamViewer checks whether user accounts are secured with either two-factor authentication (2FA) or Single Sign-On (SSO). Enabling one of these methods is critical for protecting your organization from unauthorized access.
Note: If SSO is not enabled, 2FA becomes mandatory to ensure adequate protection.
The system identifies how many admin users exist within your organization. Keeping the number of admin users to a minimum helps:
While there is no hard limit, we recommend minimizing admin accounts wherever possible.
For improved transparency and auditing, you can enable connection reports to track user activity across the organization. This feature helps you:
Event logs record detailed information about user actions and changes made within TeamViewer. Enabling event logging allows you to:
The Connections section helps administrators monitor how TeamViewer is being used across the organization and identify potential risks related to remote access.
The system displays the number of incoming and outgoing connections over the past 30 days. This helps you:
Clicking View connection methods opens a detailed overview of the authentication methods used for incoming connections to managed devices.
This allows you to:
Note: Authentication method recommendations are only available to users with access to the Event Log.
You can also click Export CSV to download the data for further analysis or reporting.
TeamViewer shows how many Conditional Access rules are currently active.
In this example, a 10 out of 13 indicator means:
This visibility helps ensure that Conditional Access is enforced consistently across your organization.
Each recommendation in the Security Center includes a clear explanation and a button to take immediate action. This allows administrators to fix issues directly or navigate to the appropriate settings without switching tabs or searching through the platform.