Operate more efficiently, reduce complexity, improve EBIDTA, and much more with the purpose-built platform for MSPs.
Protect and defend what matters most to your clients and stakeholders with ConnectWise's best-in-class cybersecurity and BCDR solutions.
Leverage generative AI and RPA workflows to simplify and streamline the most time-consuming parts of IT.
Join fellow IT pros at ConnectWise industry & customer events!
Check out our online learning platform, designed to help IT service providers get the most out of ConnectWise products and services.
Search our resource center for the latest MSP ebooks, white papers, infographics, webinars and more!
Join hundreds of thousands of IT professionals benefiting from and contributing to a legacy of industry leadership when you become a part of the ConnectWise community.
Join hundreds of thousands of IT professionals benefiting from and contributing to a legacy of industry leadership when you become a part of the ConnectWise community.
Today’s workforces look a lot different than in the past. With more employees working remotely, many organizations have either gone fully remote or have a hybrid structure. In either case, a disbursed user base can bring in new risks and vulnerabilities as well as user downtime and loss of productivity that can’t be left unattended.
ConnectWise ScreenConnect can help you reduce these risks by providing a behind-the-scenes help desk and secured remote user support with security as a top priority. We also provide many security features our partners can implement to secure their installations.
In this post, we’ll dive into account security and offer some new user configuration tips for ScreenConnect remote support. We also offer many security features our partners can implement to secure their installations. Let’s get started.
One of the best ways to ensure user security is with authentication best practices. Administrators can use a combination of internal or external authentication sources to secure user accounts. When using an internal authentication source, passwords and multi-factor authentication are handled in ScreenConnect. If you opt to use an external authentication source, the source is responsible for passwords and additional layers of authentication. User roles and permissions, session groups, and temporary host passes are additional security features within ScreenConnect.
There are other policies and restrictions you should have in place to limit unauthorized access. Features such as timeouts, authentication factors, blocking or restricting IP addresses, token expiration, idle times, and more are configurable via the Advanced Configuration Editor extension.