Solved

Is team viewer safe

Posted on 2011-02-15
3
2,991 Views
Last Modified: 2012-05-11
Hi,

Some employees in the company access network resources remotlyfrom home with team viewer so, is it secure access.If not, how can I deny access through team viewer.
0
Comment
Question by:tech-007
3 Comments
 
LVL 11

Expert Comment

by:Snibborg
ID: 34895547
This is from the Teamviewer site:

"TeamViewer includes full encryption, based on RSA private-/public key exchange and AES (256 Bit) session encoding. "

On that basis Teamviewer is quite safe, but that very much depends upon your passcode.  I would recommend using a passphrase rather than a password to make things more difficult.

My only concern is that it is difficult to monitor usage with Teamviewer and you can also copy files back and forth, which increases the likelihood of virii and malware being passed into your network.

Snibborg
0
 
LVL 23

Expert Comment

by:jakethecatuk
ID: 34895552
Teamviewer is fairly safe as everything is done over SSL.  However, it doesn't intergrate with AD so if an employee leaves and their account is disabled, they could potentially still gain access to the PC.  Also, it can be used to suck data out of the remote PC so in that respect it's not secure.

If they need to access the resources from home, you need to deploy a corporate wide solution that is under your management.  That solution may involve Teamviewer (or similar), but it will be under your management.

As for Teamviewer itself - if you want to stop it, block access to the IP address used on your firewall.
0
 
LVL 15

Accepted Solution

by:
Russell_Venable earned 500 total points
ID: 34911394
This all depends on what version you are using and what operating system you are running. If you are using a 4.x build and are using lets say XP you will be open to buffer overflows resulting in a remote vulnerabilty. If your operating system is Vista or Win7 this issue is not possible as the operating system automatically increases a buffer by 400kb more evertime the buffer is overrun preventing a overflow. So the only thing that could happen on Vista/Win7 is a gradual increase of CPU usage leading to your computer going to 100%( No more memory) .

TeamViewer is also based on VNC technology, as long you have a strong password you will be safe on bruteforce attempts. You can also install Snort IDS to detect multiple password attempts and tell your firewall to block the IP Address for added security. SSL is also used for Teamviewer. Reasonably secure 256 AES encryption. Stops most people dead in there tracks as they do not know how to decipher the stream of encrypted traffic being sent over. Teamviewer runs on port 80 HTTP by default and 5938 TCP alternatively. Assuming your network is already slaved to port 80 you can block Teamviewer on port 5938 TCP respectively if so choosen.



Vulnerability Details
Some organizations prefer to prevent their employees from using remote control applications, since many of these applications are prone to multiple vulnerabilities. Also, remote connections can potentially take up a lot of bandwidth, because these sessions transmit picture, mouse, and keyboard data from the remote computer. In addition, remote connections capabilities such as file transfer are a potential source of virus and worm infections.

SOLUTION:
Use the application only in trusted network environments.
0

Featured Post

Are your AD admin tools letting you down?

Managing Active Directory can get complicated.  Often, the native tools for managing AD are just not up to the task.  The largest Active Directory installations in the world have relied on one tool to manage their day-to-day administration tasks: Hyena. Start your trial today.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Article by: btan
The intent is not to repeat what many has know about Ransomware but more to join its dots of what is it, who are the victims, why it exists, when and how we respond on infection. Lastly, sum up in a glance to share such information with more to help…
If you thought ransomware was bad, think again! Doxware has the potential to be even more damaging.
This Micro Tutorial hows how you can integrate  Mac OSX to a Windows Active Directory Domain. Apple has made it easy to allow users to bind their macs to a windows domain with relative ease. The following video show how to bind OSX Mavericks to …
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

773 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question