advanced security icon

ConnectWise Control Access: Security

Trusted, world-class security that’s scalable

Your customers are relying on you to keep their environments secure, so we've equipped you with a layered approach to security, designed for teams of all sizes. ConnectWise Control Access provides you with the tools that provide world-class threat protection including role-based permissions, 256-bit AES encryption, and multiple authentication methods, along with premium reporting capabilities.

Control who has access at every level

Security in ConnectWise Control puts you in full control over which technicians have remote access, and to which networks. This also ensures that you are meeting your customers’ security and compliance requirements as they relate to restricted access.

security checks icon
Role-based security

Unrestricted access invites threats. With ConnectWise Control’s role-based security, administrators can determine user permissions and control who has access to what features, functions, and groups of machines—down to the most granular details.

Learn how to define who sees what >>
BOM icon
Session activity logging

ConnectWise Control audit logs provide full accountability of your services, while helping track down security breaches and data misuse for your customers. Review hosts and guests, timestamps, and session activity including executed scripts, commands, tools, and files transferred.

play button icon
Video session logging

ConnectWise Control lets customers enforce transparency through video session recordings of every remote engagement. Video logs can be stored to a specified network drive, private, or public cloud location.

Make your clients comfortable

Ease customer qualms about allowing remote access to their networks and servers.
protection icon
Permission-based security

By enabling permission-based security in ConnectWise Control, end-users can allow or deny remote access to their system. It’s a control designed to make customers feel more comfortable and in control, but it’s also intended to let your technicians know that they have the green light.

Consent requests

ConnectWise Control lets technicians send end users requests for consent to remotely connect and control their systems. This action doesn’t interrupt the end user while they’re working, and lets them decide whether or not they wish to hand over control.

chat icon
Open communication

Communication is the key to a successful technician/end user relationship. ConnectWise Control adds an extra layer of transparency by allowing the end user to observe the tech’s actions during a session via VOIP and chat, and later review via video recordings.

automated scripting icon
No footprint

ConnectWise Control removes the support client from the remote computer after the completion of every session. This feature effectively eliminates the possibility of leaving the client device vulnerable to cyberthreats and should curb any reservations users or their organizations may have.

Ensure in-house security

ConnectWise Control protects any and all information passing between host and guest systems while in session. This includes data, file transfers, keystrokes, and chats—using encryption similar to that used by many banking and government institutions.

security checks icon
Self-hosting

With ConnectWise Control, you have a choice of licensing models, including self-hosting for TSPs or for customers that either: 1) need to meet state or federal regulatory compliance requirements, or 2) cannot, or choose not to host their applications in the cloud.

embed icon
AES-256 encryption

Protect data transmitted between the user's browser and the server through a proprietary protocol and our AES-256 encryption algorithm. In addition, all cloud instances of ConnectWise Control are automatically encrypted with SSL certificates.

hardware security icon
Server-level auditing

ConnectWise Control features include the ability to store audit logs and optional session video recordings if ever needed for auditing or security vulnerability tracking purposes. The server's SQLite database stores all logged data, which authorized users can query for analysis and reporting.

User authentication and security

More than ever, hackers are attempting, and are becoming far more effective at breaking into unsuspecting user accounts. To combat these never-ending cyberattacks, ConnectWise Control employs a diverse set of commercial-grade features and methods to validate real users.

2 way sync icon
Windows and forms authentication

ConnectWise Control permits can securely authenticate using their existing Windows® and Forms credentials. While Windows authentication uses local Windows usernames and passwords to authenticate users, Forms authentication relies on user IDs and passwords stored in a secured database.

security compliance icon
Two-factor authentication

ConnectWise Control requires multi-factor authentication—an electronic authentication method that gives users access to a website or application only after successfully presenting two or more pieces of evidence. This method adds yet another layer of defense to thwart cybercriminals.

security solutions icon
Brute force attack

While brute force attacks are premised on the old-school “trial-and-error” method of guessing access credentials, they are still relatively effective. ConnectWise Control locks out users after a predetermined number of failed login attempts, foiling potential hackers from access to your data.

no delay icon
Session timeout

ConnectWise Control triggers session timeouts if a user's actions remain idle on the host or admin page for a specified amount of time. The resulting timeout will automatically log out the user—keeping potential hackers from entering the open connection.

LDAP and Active Directory

There's no need to manage users in multiple systems. ConnectWise Control lets you use external sources including: MS Active Directory, OpenLDAP or OpenDJ to securely and confidently authenticate users.

automated scripting icon
IP login restrictions

Administrators can invoke IP login restrictions to specify which IPs have access to sign in to ConnectWise Control. Addresses can be associated with named users or associated with an organization’s range of IP addresses. It’s an optional, added layer of protection for granular control.

Try remote access & support that just works

Trusted by 30,000+ companies, ConnectWise Control gives you powerful, affordable, easy-to-use secure remote access for remote desktop support, access, and online meetings.

Start your free trial >>
ConnectWise Control Support logo, horizontal full-color
Discover the other side of ConnectWise Control
Explore ConnectWise Control Support >>