Solved

Is team viewer safe

Posted on 2011-02-15
3
3,015 Views
Last Modified: 2012-05-11
Hi,

Some employees in the company access network resources remotlyfrom home with team viewer so, is it secure access.If not, how can I deny access through team viewer.
0
Comment
Question by:tech-007
3 Comments
 
LVL 11

Expert Comment

by:Snibborg
ID: 34895547
This is from the Teamviewer site:

"TeamViewer includes full encryption, based on RSA private-/public key exchange and AES (256 Bit) session encoding. "

On that basis Teamviewer is quite safe, but that very much depends upon your passcode.  I would recommend using a passphrase rather than a password to make things more difficult.

My only concern is that it is difficult to monitor usage with Teamviewer and you can also copy files back and forth, which increases the likelihood of virii and malware being passed into your network.

Snibborg
0
 
LVL 23

Expert Comment

by:jakethecatuk
ID: 34895552
Teamviewer is fairly safe as everything is done over SSL.  However, it doesn't intergrate with AD so if an employee leaves and their account is disabled, they could potentially still gain access to the PC.  Also, it can be used to suck data out of the remote PC so in that respect it's not secure.

If they need to access the resources from home, you need to deploy a corporate wide solution that is under your management.  That solution may involve Teamviewer (or similar), but it will be under your management.

As for Teamviewer itself - if you want to stop it, block access to the IP address used on your firewall.
0
 
LVL 15

Accepted Solution

by:
Russell_Venable earned 500 total points
ID: 34911394
This all depends on what version you are using and what operating system you are running. If you are using a 4.x build and are using lets say XP you will be open to buffer overflows resulting in a remote vulnerabilty. If your operating system is Vista or Win7 this issue is not possible as the operating system automatically increases a buffer by 400kb more evertime the buffer is overrun preventing a overflow. So the only thing that could happen on Vista/Win7 is a gradual increase of CPU usage leading to your computer going to 100%( No more memory) .

TeamViewer is also based on VNC technology, as long you have a strong password you will be safe on bruteforce attempts. You can also install Snort IDS to detect multiple password attempts and tell your firewall to block the IP Address for added security. SSL is also used for Teamviewer. Reasonably secure 256 AES encryption. Stops most people dead in there tracks as they do not know how to decipher the stream of encrypted traffic being sent over. Teamviewer runs on port 80 HTTP by default and 5938 TCP alternatively. Assuming your network is already slaved to port 80 you can block Teamviewer on port 5938 TCP respectively if so choosen.



Vulnerability Details
Some organizations prefer to prevent their employees from using remote control applications, since many of these applications are prone to multiple vulnerabilities. Also, remote connections can potentially take up a lot of bandwidth, because these sessions transmit picture, mouse, and keyboard data from the remote computer. In addition, remote connections capabilities such as file transfer are a potential source of virus and worm infections.

SOLUTION:
Use the application only in trusted network environments.
0

Featured Post

Announcing the Most Valuable Experts of 2016

MVEs are more concerned with the satisfaction of those they help than with the considerable points they can earn. They are the types of people you feel privileged to call colleagues. Join us in honoring this amazing group of Experts.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

If you thought ransomware was bad, think again! Doxware has the potential to be even more damaging.
One of the biggest threats facing all high-value targets are APT's.  These threats include sophisticated tactics that "often starts with mapping human organization and collecting intelligence on employees, who are nowadays a weaker link than network…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
A short tutorial showing how to set up an email signature in Outlook on the Web (previously known as OWA). For free email signatures designs, visit https://www.mail-signatures.com/articles/signature-templates/?sts=6651 If you want to manage em…

828 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question