User Guide TeamViewer Remote Management
User Guide TeamViewer Remote Management
User Guide TeamViewer Remote Management
Remote Management
December 2019
Table of Contents
1. General ................................................................................................................................................ 4
1.1 About the User Guide ................................................................................................................... 4
1.2 About TeamViewer Remote Management ................................................................................... 4
2. Requirements ...................................................................................................................................... 6
2.1 Licensing ........................................................................................................................................ 6
2.2 License Activation ......................................................................................................................... 7
2.3 System Requirements ................................................................................................................... 8
2.3.1 TeamViewer Monitoring & Asset Management .................................................................... 8
2.3.2 TeamViewer Endpoint Protection.......................................................................................... 9
2.3.3 TeamViewer Backup .............................................................................................................. 9
3. Get Started ........................................................................................................................................ 10
3.1 Activation .................................................................................................................................... 10
3.1.1 TeamViewer Full Version Activation .................................................................................... 10
3.1.2 Management Console Activation ......................................................................................... 14
3.2 Policies ........................................................................................................................................ 16
3.2.1 Default Policy and Policy Options ........................................................................................ 17
3.2.2 Assign a Policy ...................................................................................................................... 18
4. Monitoring & Asset Management .................................................................................................... 19
4.1 Monitoring & Asset Management Activation ............................................................................. 20
4.2 Monitoring Checks ...................................................................................................................... 20
4.3 Monitoring Policy ........................................................................................................................ 28
4.4 Remote Task Manager ................................................................................................................ 28
4.5 Alarms and Notifications ............................................................................................................. 29
4.5.1 Alarms .................................................................................................................................. 29
4.5.2 Notifications ......................................................................................................................... 30
4.6 Monitoring Device View .............................................................................................................. 31
4.7 Monitoring Alarms View ............................................................................................................. 32
4.7.1 Monitoring Filtering ............................................................................................................. 33
4.7.2 Monitoring Export ................................................................................................................ 33
4.8 Network Monitoring ................................................................................................................... 34
4.8.1 Network Monitoring Activation ........................................................................................... 35
4.8.2 Network Monitoring Settings .............................................................................................. 35
4.8.3 Network Monitoring Checks ................................................................................................ 36
This user guide describes how to work with the Remote Management tool from TeamViewer. Unless
stated otherwise, the functionalities described always refer to the TeamViewer full version for
Microsoft Windows. Mac OS, iPhone, and iPad are trademarks of Apple Inc. Linux® is a registered
trademark of Linus Torvalds in the US and other countries. Android is a trademark of Google Inc.
Windows and Microsoft are registered trademarks of Microsoft Corporation in the US and other
countries. For simplification purposes, this manual refers to the operating systems Microsoft®
Windows® XP, Microsoft® Windows® Vista, Microsoft® Windows® 7, Microsoft® Windows® 8 and
Microsoft® Windows® 10 simply as “Windows.” For a list of all supported operating systems, visit our
website or our Community page to learn more.
With TeamViewer Remote Management, you will maintain a clear overview of all the important
information and functions of your system and IT infrastructure.
1. With TeamViewer Monitoring & Asset Management, you can proactively monitor your
devices, and set up individual checks to receive notifications on, for example, disk health,
antivirus software, online status, RAM use, and running processes on a computer. The
integrated Asset Management feature also lets you track your deployed assets and create IT
inventory reports for your network. Manage all your devices conveniently via the TeamViewer
Management Console or your TeamViewer Client and receive direct e-mail alerts.
2. With TeamViewer Endpoint Protection, you can keep your computers clean and safe.
Endpoint Protection safeguards your devices against threats such as viruses, Trojans, rootkits,
3. With TeamViewer Backup, you can store your data in the cloud under the highest security
standards, and backed up files can be remotely restored from anywhere, at any time. Protect
your important files by backing up the complete file system, common file formats, or specific
files and folders regularly. Restore files and thus avoid potential data loss. With the
TeamViewer Management Console, you have access to each backup of any of your devices at
any time.
These are the requirements that must be met in order to use all the functions of TeamViewer
Remote Management.
Note: You can also try TeamViewer Remote Management free for 14
days, with no license or obligation to subscribe.
2.1 Licensing
TeamViewer Remote Management is an add-on to the TeamViewer remote control product, but it is
not included in the TeamViewer license model. This means that:
Note: You will need separate endpoints for the TeamViewer Remote Management services:
Monitoring & Asset Management and Endpoint Protection. The different endpoints can be
used independently of one another.
For example:
1. If you want to protect five (5) computers with TeamViewer Endpoint Protection, you'll
need a TeamViewer Endpoint Protection license with 5 endpoints.
2. If you want to monitor ten (10) computers with TeamViewer Monitoring & Asset
Management, you will need a TeamViewer Monitoring & Asset Management license
with 10 endpoints.
3. If you want to backup twenty (20) computers with TeamViewer Backup, you will need a
TeamViewer Backup license with the necessary storage volume. TeamViewer Backup
can be installed on unlimited devices.
For more information about the Remote Management license model, visit our TeamViewer Remote
Management shop.
You need a TeamViewer Remote Management license in order to use all the functions of the
TeamViewer Remote Management services.
After you purchase a TeamViewer Remote Management license, you'll receive a confirmation e-mail.
Click on the activation link in the e-mail in order to activate the license for your TeamViewer
account.
Once you have activated the license, it will automatically be linked to your TeamViewer account and
will be ready for immediate use.
To configure and manage TeamViewer Remote Management services, you will need the
TeamViewer Management Console.
The TeamViewer Management Console is browser-based and is therefore independent of the
operating system.
To activate and to view alerts, you can use the TeamViewer full version with the following operating
systems:
1. Windows
To view alerts only you can install the TeamViewer remote control application on:
1. Android
2. iOS
To use Monitoring, one of the following operating systems must be running on the devices
(endpoints) you wish to monitor:
Windows
macOS
1. Debian 9 or newer
2. GRML, Kali Linux, Purism, Pure OS, Tails, Ubuntu and other .deb distributions.
3. TeamViewer 14 full version of Host (14.1.9025 and newer).
a. Account needs to be assigned before activation.
To use Asset Management (which includes Patch Management), one of the following operating
systems must be running on the devices (endpoints) you wish to monitor:
To use Endpoint Protection, one of the following operating systems must be running on the devices
(endpoints) you wish to protect:
1. Windows 10 / 8.1 / 8 / 7.
2. Windows Server 2012 R2 / 2012 / 2008 R2.
3. TeamViewer 11 full version or Host (or newer) must be installed.
To use Backup, you should make sure that one of the following operating systems is running on the
device(s) you wish to backup using TeamViewer Backup:
1. Windows 10 / 8.1 / 8 / 7 SP1 and later.
2. Windows Server 2012 R2 / 2012 / 2008 R2.
3. TeamViewer 11 full version or Host (or newer) must be installed.
You can use the TeamViewer Management Console to configure all Remote Management services.
To do this, open the TeamViewer Management Console at https://login.teamviewer.com and log in
with your TeamViewer account. All other steps for configuring TeamViewer Remote Management
are described below.
3.1 Activation
All computers that users want to use TeamViewer Remote Management on are called “endpoints.”
The TeamViewer Remote Management service must be activated and configured on each endpoint.
The license can be activated using bulk activation or on each endpoint separately.
After activating Monitoring & Asset Management on the endpoints, the following steps are taken
automatically:
After activating Endpoint Protection on the endpoints, the following steps are taken automatically:
After activating Backup on the endpoints, the following steps are taken automatically:
Single Activation
To do this:
If you haven't saved the personal password for the device in your Computers & Contacts list, enter it
in the dialog box.
If you have not set a personal password for the endpoint, you can assign the endpoint to your
account via the settings in the TeamViewer full version.
To do so, you'll need to access the settings locally on the computer under:
Extras Options General Account assignment.
Starting with TeamViewer 14 and up, we introduced a new tab in the TeamViewer client.
Remote Management Tab will display the status for all active services, and will contain quick links to
the Management Console:
2. Open Settings
Single activation
You can activate Remote Management services for individual devices in your Groups list. In order to
use this feature, you must have an active license.
1. Go to any group in the left pane, select the device, and click on the desired services icon on
the right side.
2. Click activate.
3. Now, the device is assigned to your TeamViewer account, and then the respective Remote
Management service is configured.
Bulk activation helps you activate TeamViewer Remote Management services on multiple devices
and assigns all of them to your TeamViewer account collectively. By using your personal passwords,
all endpoints are automatically assigned to your account and the TeamViewer Remote Management
service(s) will be activated for the endpoints in one step. In order to use this feature, you must have
an active license.
3.2 Policies
Policies are defined as individual settings which are sent to the endpoints once applied.
Monitoring policies: determine the criteria your devices will be set to for reporting when something
is not running within the assigned thresholds or parameters.
Asset Management policies: determine the criteria based on which missing patches will be
automatically deployed.
For each service, a default policy is created when the first endpoint is activated.
1. The default policies will be applied to each activated endpoint if no other policy is specified
when activating the endpoint.
2. The default policies can be changed at any time.
3. Newly created policies can be assigned as default policies.
1. Create a Policy.
2. Edit a policy.
3. Duplicate a policy.
You can assign a policy to each device by going to the desired service Tab and selecting the policy
column on the right side of the Device view. Click the check mark to save.
If you would like to have a policy for an entire group of computers, select ‘Inherit from group’
located in the Policy row for all computers in a group (you can also filter by individual groups). Click
the check mark to save.
To monitor your devices and manage your IT assets, use the service TeamViewer Monitoring &
Asset Management.
Monitoring policies will define the proactive behaviors of individual checks assigned to devices.
For configuring policies and assigning them to a device, please see 3.2 Policies.
When all defined conditions for a check are met, an alert is triggered and displayed as an alarm
message in the TeamViewer Management Console and in the TeamViewer full version. An e-mail
notification will also be sent if configured in the policy. An alert message indicates that a problem
has occurred on one of the monitored devices.
Monitoring checks are categorized in 3 Categories which will help you determine how critical the
situation is on a device.
Windows Checks
2. Software Operations
a. Windows Service
i. This check will monitor a defined Windows service, and it will trigger an alert
if the set service is running or not running.
ii. In order to set up this check, the exact service name must be added in the
check configuration menu.
iii. The exact service name can be found under:
Windows services Service properties.
b. Processes
i. This check will monitor a defined Windows process, and it will trigger an
alert if the process is running or not running.
ii. In order to set up this check, the exact process name must be added in the
check configuration menu.
iii. The name of the process is case sensitive.
c. Event Log
i. This check will report event logs from the Windows Event Viewer after an
entry is written in the configured logs folder.
ii. Many applications and critical windows operations record logs making the
event log checks a very powerful check to monitor key operations on a
Windows device.
iii. In order to set up this check, the queried category needs to be selected:
1. Security
2. Application
3. System
iv. After selecting the folder where the logs will be monitored, the source
needs to be selected.
v. After selecting the source, the event ID needs to be added. Multiple event
ID’s can be added separated by “,” (comma).
vi. After selecting the ID, one or more event log categories needs to be
selected:
1. Audit
2. Information
3. Error
vii. When an event log is written and matches the predefined check settings, a
notification is sent. A full description of the triggered event log will be
outlined in the e-mail.
Linux Checks
3. Hardware
a. Disk Space
i. This check will monitor the free space on a system drive and will report
when the free space is less than the defined value.
ii. Multiple disk space checks can be added to one policy with different drive
letters.
iii. In order to set up the disk space check, first add the “mount point” that
must be monitored (e.g. /home or /media/data)
iv. After selecting the drive, select the needed variable:
1. % - percentage of free space left on drive.
2. GB – Gigabytes of free space left on drive.
3. MB – Megabytes of free space left on drive.
v. After selecting the variable, enter the minimum threshold value. Whenever
the disk space falls below this value, an alert will be triggered.
b. Memory Usage
i. This check will monitor the amount of free Random-Access Memory or RAM
on the device.
c. CPU Usage
i. This check will monitor the CPU usage on the device and an alert will be
triggered if the usage is higher than the defined percentage in the check
configuration menu.
The default Monitoring & Asset Management policy includes the following checks, described in 4.2
Monitoring Checks.
The Remote Task Manager can be opened for every device that has Monitoring & Asset
Management installed. (Windows)
The window will display a current list of processes or services on the remote device which can be
terminated if necessary.
Note: This is a very important tool when users need to troubleshoot a remote
computer without connecting to it remotely.
4.5.1 Alarms
Alarms are generated when there is a risk of breaching a set threshold defined in the monitoring
policy.
Alarms are displayed in the TeamViewer Management Console and TeamViewer application.
There are several alarm types:
1. Raised Alarm
a. When a check is at risk for breaking its configured threshold, an alarm will be
created and reported in the management console.
b. The alarm can be identified by a red triangle.
2. Acknowledged Alarm
a. A raised alarm can be acknowledged by the user. Once this is done, the alarm will
become ‘Acknowledged.’
b. Acknowledging the alarm does not mean that the problem is resolved. It only means
that the supporter acknowledged that there is a problem, and will fix it later because
issue is not critical enough to be fixed immediately.
3. Recovered/Cleared Alarm
4.5.2 Notifications
E-mail Notifications can be set up in the Monitoring policy. E-mail addresses accepted by the system
are the ones which are recognized by the TeamViewer account or company profile:
1. For TeamViewer accounts, the e-mail address needs to be in the contact list as a contact.
2. For TeamViewer company profiles, the e-mail address needs to be a contact or a user in the
company profile.
E-mail notifications regarding raised or recovered alarms will contain the following information:
The device view is designed to display metrics relevant to each device that has Monitoring & Asset
Management installed.
In the device view for Monitoring, the user can see all relevant checks that are within their
thresholds and all checks that failed.
Every failed check can be acknowledged and rechecked individually if the user decides that the
raised alarm is not critical for the operation of that device.
The alarms view is focused on incident response. All raised alarms where the check threshold has
been breached can be filtered, organized, and exported.
Filtering alarms will enable the user to get a comprehensive view based on need:
View settings can be used to check or uncheck the view structure of the reports:
1. Columns
a. Alert Type
b. Alert Description
c. Device
d. Start
e. End
f. Duration
g. Acknowledged by
h. Group
2. Group By
a. Alert Type
b. Device
c. Group by none
3. Other
a. Charts
Export to Print
This function will generate a web view that can be printed out or saved in any document format by
using print plugins.
Export to CSV
This function will generate and download a CSV file that can be stored, managed, or modified as
needed for auditability or other proposes.
To discover and monitor network devices within your local network use network monitoring by
TeamViewer Monitoring.
With network monitoring, your discovered network devices will be sorted into one of the following
categories:
• Computer – For all windows computers detected during the discovery process
• Router & Switch – For all routers and switches detected during discovery process
• Printer – For all network printers which were detected during discovery process
• UPS – For all universal power suppliers detected during discovery process
• NAS – For all network attached storages detected during discovery process
• Other Device – For all other devices which have an IP address and are available in your local
network but do not fit into any other category
Network monitoring was released as a Laboratory version, so right now this feature can be used for
free. In order to use network monitoring, you must have at least one license for TeamViewer
For TeamViewer Monitoring license activation, please see 2.2 License Activation.
In order to activate network monitoring, TeamViewer Monitoring must be activated on the node*
that will be discovering and monitoring your network devices. If you select a node that does not
have TeamViewer Monitoring activated, the system will automatically install it on the node.
*Node: Is the device from which network monitoring will trigger a discovery, and will monitor your
network devices. Each Node can discover its own local network.
Network monitoring can be activated in just a few clicks from the ‘Network’ tab in Remote
Management Monitoring:
After changing and saving the discovery settings, the system will start a discovery with the new
settings in place. If you do not want to run a new discovery, press cancel.
After the discovery of network devices is complete, you can set up checks for periodical monitoring
of your network devices. Currently, network monitoring supports the following checks:
Port state: If selected, this will raise an alarm when a port from a router or switch is
blocked or broken. This only works for devices with SNMP support.
Disk Space: If selected, this will raise an alarm when the NAS disk space is lower than
the configured threshold. This only works for devices with SNMP support.
Disk Health: If selected, this will raise an alarm when the NAS disk health reports
hardware errors. This only works for devices with SNMP support.
Toner: If selected, this will raise an alarm when the toner from a network printer is
low. This only works for devices with SNMP support.
Paper: If selected, this will raise an alarm when the paper from a network printer is
low. This only works for devices with SNMP support.
Battery time remaining: If selected, this will raise an alarm when the UPS energy
storage "in minutes" falls below the configured threshold. This only works for
devices with SNMP support.
Checks will run every 1 min. If any issue is detected, an alert will be displayed in the management
console.
In addition to the above checks, users can see the IP address and on- and offline status for each
discovered device.
Tip: network monitoring uses SNMP protocol for discovering and monitoring the network. In order to
effectively monitor your network devices, SNMP should not be restricted in your local network.
Please be informed that after activating network monitoring, your device policy will be renamed. All
previous checks (TeamViewer Monitoring checks) will still be available, and the new policy will also
include network discovery and monitoring settings.
You can open the policy page for network discovery from here:
Next, choose which policy you want to edit, and select the needed checks for monitoring your
network devices.
All Node View: In this view you can see all your networks in one place with details about device
quantity and alerts. Click on the Home button to get to this view.
List View: In this view you can see all your networks in one place with details about device quantity
and alerts. You can click on the Node header and go to list view for more details. You can also extend
rows to see more details about each device.
Map view: Map view is under construction now. It will allow you to see the interconnections
between discovered network devices.
After the installation of the Monitoring & Asset Management service, a snapshot of installed
software and hardware will be collected and organized in the device view and asset view.
Information about missing Patches will also be displayed in the Asset Management Device view.
The device view will sort and display the information in the following categories:
Device Information: Computer Name, Domain, Internal IP, External IP
Hardware: CPU name and model, physical memory (RAM), motherboard model and serial number (if
available), video controller name and model, disk drives’ name, model, capacity and serial number (if
available).
From the Asset view, reports can be generated based on the categories below and exported as a
web view (print) or as a CSV file.
Severity icon: This field shows the importance of the patch -> Critical, Important, Low, Not rated.
Patch/Software: Here you can see the patch name and version for some patches
Bulletin ID: The Patch ID provided by the vendor. The ID is also a link to the changelog which is
provided by each software vendor.
Type: This field shows if the patch is security or non-security (this information is coming from the
Software Vendor)
CVE: This field contains all Common Vulnerabilities and Exposures which are related to the patch
Release: Here you can see when each patch was released
Device: This field displays the device name on which the patch is missing. In case there are more
devices which have the same patch missing, instead of the device name you will see the number of
devices which are affected.
Details: The button after clicking on which you will see some short notes from the vendor and patch
size.
In the Patch view within Asset Management you can select a patch or multiple patches and deploy the
selected patches to one or multiple devices. After selecting a patch, you just need to press on the
deploy button.
• Group
• Device
• Importance
• Install status (here you can also see previews of installed patches)
In the Patch view you can see some patches which are not possible to select, the row is greyed out
with this tooltip: “This patch cannot be deployed remotely. Please Connect to the device and patch it
manually.” It means that the patches require some additional action on the device side, e.g. captcha,
additional authentication, accept EULA etc.
In Asset Management, under the “Device” tab, users can now see a policy section. Here, users can
define and select policies for automatic patch deployment.
The policy should have a name (this is a mandatory field) and each policy can contain up to 5
conditions. In each condition, users can set the necessary criteria and schedule for automatic patch
deployment. Each condition has several fields which need to be filled in order to be able to save the
condition. These fields are:
Creating a policy without any defined conditions will not trigger any actions.
After adding the required conditions and assigning policies to devices, the system will automatically
check the set conditions, and will trigger the deployment for those patches which comply with the
predefined conditions.
Note: In cases where the automatically scheduled deployment cannot be done (e.g. device will be
offline) as soon as the device is available, deployment will be triggered automatically after the
first rescan.
To protect your devices against malware, ransomware, and more, use the TeamViewer Endpoint
Protection service.
For license activation, please see 2.2 License Activation.
For configuring policies and assigning them to devices, please see: 3.2 Policies.
The configured devices are scanned and protected by the assigned policies defined under 3.2
Policies. Whenever malware is detected on the device, an alert is triggered and displayed as an alert
message within the TeamViewer Management Console and the TeamViewer full version. An alert e-
mail notification also indicates that malware was detected on one of the devices.
The default Endpoint Protection policy includes the following scans and settings:
Real-time Protection
Choose whether-or-not real-time protection should be activated for the policy. If activated, all files
that are accessed (opened, running, etc.) are scanned for malware. If deactivated, threats are only
detected if a scan is performed.
Note: If real-time protection is disabled, the device is potentially at risk between scans.
Outlook Add-In:
The Endpoint Protection Outlook Add-In is a Visual Studio Tool for Office Add-Ins for Microsoft
Outlook. This will enable TeamViewer Endpoint Protection to delete infected attachments found in
the Outlook archive files (.pst,.ost) while they are in use by Outlook.
Without this, TeamViewer Endpoint Protection is unable to delete these types of threats without
first closing Outlook. The use of this feature requires the activation of the outlook add-in in the
TeamViewer Management Console.
Enabling this feature automatically starts a scan on any removable drives when they are attached to
the device.
Define any number of scans. Depending on the scan type and schedule, all devices are scanned for
malware on a regular basis.
Note: Please note that the speed of your system may be affected for the duration of a
scan.
Tray Icon:
This will allow the user to see the current state of Endpoint Protection, and the notifications about
detected threats. The user will also be able to trigger quick and full scans.
5.2.2 Exclusions
Here, the user can specify specific drives, folders, files, or file types that should be excluded from the
scan (e.g. D:\ to exclude drive D, C:\\Directory\ to exclude a folder, *.xyz to exclude a file type).
5.2.3 Notifications
The user can set up notifications via the Computer & Contact list. Endpoint protection offers the
possibility to be notified for all detected threats that require immediate attention. The user can also
decide if the notifications should be shown in the TeamViewer console, and can also specify the e-
mail address where the notifications should be sent.
If a threat is detected, Endpoint Protection will send an e-mail notification to the defined e-mail
addresses. The user can enter the e-mail addresses that should receive notifications about detected
threats.
1. For all detected threats: This is the default setting. You will be notified about any threat that
is detected on one of your devices.
2. Only when I need to take action: If a threat is detected, Endpoint Protection moves the
affected file(s) to quarantine and thus disposes of the threat. You will only be notified about
a threat if you need to take immediate action (e.g. if you need to restart the computer to
move a threat to quarantine).
3. Never: All notifications are deactivated. If you select this option, you will have to open the
alert report to get information about detected threats. Even with deactivated alert
notifications, your systems remain protected by Endpoint Protection.
E-mail addresses accepted by the system are the ones recognized by the TeamViewer account or
company profile:
1. For TeamViewer Accounts, the e-mail address needs to be in the contact list as a contact.
2. For TeamViewer company profiles, the e-mail address needs to be a contact or a user in the
company profile.
This provides the user with an overview of all devices with Endpoint Protection activated. The filter
on the top right of the dialog box allows users to search for a specific device by the device name.
They are sorted by the device alias, where they belong to, and the policy applied to the device.
Additionally, the device list can be exported as a table in a CSV file. Each device offers some
important functionalities such as:
1. Devices status
2. Show threats
3. Acknowledge all threats
4. Change the policy
5. Uninstall the software
You can select which type of scan you want and schedule the scans as follows:
1. Scan Type
a. Quick Scan
b. Full Scan
c. Custom Scan: this allows the user to add a specific disk, folder, or file that should be
scanned.
2. Scheduler: the user can set the frequency of the scans. Users can choose between a daily,
weekly, or a specific time interval (that users can set individually).
Start a manual scan for individual endpoints. Check the endpoints for malware, regardless of
scheduled scans from the Endpoint Protection policies, at any time. A manual scan will be started
within the TeamViewer Management Console or the TeamViewer full version for each online device.
1. In the TeamViewer Management Console, click the name of the endpoint and select ‘Quick
scan’ or ‘Full scan.’
2. In the TeamViewer full version, select the ‘Quick scan’ or ‘Full scan’ option within the
context menu (right click) of the endpoint.
For every endpoint, the status of the Endpoint Protection scan can be viewed. The status contains
information about the time and date of the previous and next scheduled scans, as well as general
details about the device's protection.
1. Click on the name of a device and select the ‘Status’ option from the context menu.
2. The following information is displayed in the Endpoint Protection status dialog box:
a. Status – the status of the device can be identified by its color.
i. Green: the endpoint is protected.
ii. Yellow: minor issue, e.g. old malware definitions or scheduled scan was not
performed.
iii. Red: ongoing issue, e.g. malware was found but not removed.
b. Last Scan – date, time and scan type of the latest scan.
c. Endpoint protection policy – the assigned Endpoint Protection policy.
d. Schedule – all scheduled scans for the endpoint as defined in the Endpoint
Protection policy.
This report displays all threats in quarantine. They can be filtered by device and by a specific time
interval.
Active ransomware protection will protect specified folders to be read or written to by unknown
applications such as ransomware or other malicious software. We have an intelligent system which
will check read/write attempts by applications and will grant access or deny access to those folders.
To use this feature, you will need to click the check box ‘active ransomware protection’ and set up
your configurations.
Protected folders:
These are the locations the user would like to protect from being accessed or modified by untrusted
applications.
Trusted applications:
These are the applications known by the user and can access or modify files within the protected
folders.
Blocked applications:
This is the report of the applications which are blocked by active ransomware protection when trying
to access files or folders in the user protected locations.
Note: Active ransomware protection will not be set per default. In order to use this
feature, the user will need to activate it in the Endpoint Protection policy. Then, the
user must make sure that at least one folder is set in the protected folders.
The device view of TeamViewer Endpoint Protection is designed to improve user efficiency when
using the software. It gives the user an overview of all devices with Endpoint Protection activated,
allowing the user to react faster when necessary. The device view first displays the devices with
alarms that require immediate attention. This view is very useful for the users who manage a large
number of endpoints.
Search function: This allows users to search for devices by device name. Only the endpoints with
Endpoint Protection activated will be displayed.
Filtering:
By groups: Users can select only the groups with Endpoint Protection endpoints.
By device status: Users can select the devices based on their status (single and multi-selection is
possible).
Endpoints: Users can see how many endpoints are available on the account, how many are in use,
and how many are infected or need attention.
Devices status:
The red icon is used to identify the devices that are infected.
The yellow icon is used to identify the devices that need attention because:
The green icon is used to identify the devices which are safe.
The threats view shows all of the alerts for every computer that has Endpoint protection installed,
and is displayed in the TeamViewer Management Console. An alert message is triggered as soon as
irregularities are noticed for a device. This depends on the defined Remote Management policies.
The default Endpoint Protection policy includes the following scans, which are described in Section
5.2 Endpoint Protection Policies.
1. In the sidebar, click on Remote Management select the Endpoint Protection tab select
the threats view tab.
2. In the sidebar, click on a group from your Computers & Contacts list select the Endpoint
Protection tab.
Threat details
You can display detailed information of detected malware. Quickly get information about the type of
malware and be able to more effectively rate the threat of the malware.
1. Click the icon next to an alert message and select the ‘details’ option.
2. Select all of the alert messages that you wish to acknowledge, and click: Tools Details.
The following information is displayed within the Threat details dialog box:
Options: Select how you would like to proceed with the malware:
1. Delete from quarantine – select this if you want to remove the malware from quarantine
and permanently delete it.
2. Restore from quarantine – select this if you want to restore the malware to its original
location and remove it from quarantine.
You can filter alert messages by Alert Type, Device, Status, and Date Range. If you click on an entry
within the table header, you can sort the alert messages within the column. Using the view menu,
you can define which columns should be displayed in the table and activate or deactivate the charts.
1. If a threat is detected during a scan, the detected malware will be moved to the quarantine
folder immediately. The malware cannot cause any damage there. In addition, an e-mail
notification is sent to the e-mail addresses you have defined for the policy.
2. The status of the alerts is indicated by different icons.
3. Confirm threat
Threats (malware) that are detected during a scan are displayed in the alert report and can
be acknowledged there. Acknowledge an alert message if you know or can verify the threat
and start troubleshooting. If you confirm a threat, the threat is no longer displayed in the
notifications of the device, and will be displayed with a check in the alert report.
Example: Malware was found during a scan. As an administrator of the device, you
will receive a corresponding notification via e-mail. Verify the notification within the
TeamViewer Management Console. Now that you know what the threat is about,
you can confirm the discovery of the malware and initiate measures, if necessary, in
order to avoid future discoveries.
a. Click the icon next to an alert message and select the ‘Acknowledge’ option.
b. Select all the alert messages that you wish to acknowledge and click ‘Acknowledge
selected.’
Note: The threat will remain in quarantine after you have acknowledged it. At your
discretion, delete the malware from the device.
Export
This allows you to export a list of the threats found on all your endpoints.
Export to Print
This function will generate a web view which can be printed out or saved in any document format by
using print plugins.
Export to CSV
This function will generate and download a CSV file which can be stored, managed, or modified as
needed for auditability or other proposes.
For configuring policies and assigning them to devices, please see: 3.2 Policies.
The configured devices are backed up according to the assigned policies defined under Section 3.2
Policies. Whenever a backup could not be performed properly, an alert is triggered and displayed as
an alert message in the TeamViewer Management Console and the TeamViewer full version.
Service icon: The user can perform the main functionalities of TeamViewer backup from the service
icon. Here they can easily check the backup status on the device, start an instantaneous backup,
paused a running backup or triggered a restore without a need to login to the Management Console.
The section about TeamViewer Backup will provide you with information about the version of the
software currently running on the device.
Note:
6.2 Policies
After activating TeamViewer Backup on a device, a default Backup policy which contains some basic
settings is created and the user can immediately perform the first backup. The user can customize
the individual backup policy, specify which data should be backed up, adjust the frequency of the
backups, and even define the usage of certain process, such as the bandwidth throttling. These
policies can be applied to single devices or a group of devices. In order to customize your policies,
the user should navigate through the option: Manage Policy Manage Backup policies edit.
This is the starting point for policy creation and change. There are different settings which can be
configured in the TeamViewer Backup policies and help the user to use efficiently the product.
The first thing to define when creating a policy is the name of the policy. Users can create many
different policies, so the policy name is critical.
Next, define the name for the created policy. This name is used to identify the policy within the
overview of all created policies.
In order to use TeamViewer Backup, the user first needs to upload data to the cloud. TeamViewer
Backup offers several options to specify the data that needs to be included in the backup. This will
Backup selection
1. Full selection
a. This is the default backup selection. It will automatically select all files supported by
TeamViewer Backup on the device.
2. Quick selection
a. The quick selection offers the ability to select specific file types on the device that
must be included in the backup.
3. Advanced selection
a. With the advanced selection, the user can specify one or more specific paths that
need to be backed up simply by adding the path name.
Note: When choosing ‘full selection,’ it is important to consider that some locations
or drives are auto excluded, and the files within those locations will not be backed up.
Follow the steps below to select all files that should be included in backups using the policy.
1. Click Edit.
2. Select one of the following options depending on your requirements:
a. Full backup: A full backup includes all files without limitations to file type or save
location on a device.
b. Quick selection: Choose the files that should be included in the backup from the
most important file types. You can choose between Office files (documents,
presentations, spreadsheets, text files, etc.), E-mails, PDFs, eBooks, and Pictures.
c. Advanced selection: Define a hard drive (e.g. D:\), folder (e.g. C:\Folder), a file (e.g.
C:\Folder\Report.xlsx) or a file type (e.g. *.mp3) that should be included in the
backup. Doing this allows users to backup specific files from individual devices.
3. Click on Add Path.
Tip: you can use placeholders to back up file paths that contain specific keywords (e.g.
C:\Users\*\Documents).
TeamViewer Backup offers several options which allow for a flexible setup and ease of use.
TeamViewer Backup offers the ability to define the backup cycle and specify how often should the
automatic backup should be performed – within a specific time interval, every day at a certain time,
or specific days at a certain time.
Define when the backup for the selected files on the device should be initiated.
With this option the user can simply limit the throughput of traffic sent to the backup servers by
setting a maximum bandwidth and the timeframe for when the throttling applies.
Limit the bandwidth that is used for your backups, for example during working hours. This will
reduce the effect a backup has on the speed of your internet connection.
The following settings can be configured:
1. Time frame: Define the time when bandwidth throttling starts and when it ends. Between
start and end time, the bandwidth is limited.
2. Bandwidth: Select the maximum amount of bandwidth used during throttling.
Note: If the bandwidth is not limited, TeamViewer Backup will use the
maximum bandwidth available.
6.2.7 Exclusion
TeamViewer Backup offers the ability to easily exclude specific data from the backup without
impacting the whole backup selection. This can be done by specifying the path of the drives, the
folders, the files, or the file types that should not be included in the backup.
Follow these steps to exclude files to the backup: click Edit Add exclusion.
Define a drive (e.g. D:\), folder (e.g. C:\Folder), a file (e.g. C:\Folder\Report.xlsx), or file types (e.g.
*.mp3) that should be excluded from the Backup.
TeamViewer Backup will notify the user by sending an e-mail to the admin account in the following
cases:
1. When a web restore is completed, the download link is sent in an e-mail notification.
2. When a backup failed on a device.
3. When a restore to the original device or to another device is completed.
4. When the backup storage in use reaches 75% of the purchased storage.
TeamViewer Backup offers users the ability to define how long the older version of each file should
be kept in the cloud. This can be set up under the button ‘Global settings’ on the dashboard.
Note: The retention period will be applied only for the account that
modified the settings and will affect all the devices with backup activated
for that account.
TeamViewer Backup offers flexible options to manage your backups and facilitate your work within
the product.
For every device, the status of its backups can be viewed in the Management Console or from the
backup service icon.
1. Click on the name of a device and select ‘Status’ from the context menu.
2. In the TeamViewer full version, right-click on ‘Status’ within the context menu of the device.
The following information is displayed in the Backup status for dialog box:
Status Description
Green The backup is completed as scheduled.
Additionally, in order to monitor the backup storage, the user can see the how much storage space is
used monthly. The user can also see how much space is used daily on each device, in a time interval
of 2 weeks.
TeamViewer Backup offers the ability to delete unwanted files, folders, and/or drives from the
backup storage. This maximizes the efficacy of the product.
After a backup is successfully performed, the user can choose how the files should be restored:
The user has the option to restore files to the web browser on the device the user is currently logged
in to.
The user has the option to restore files remotely onto the device where the backup is running.
The user can restore files remotely onto another device in the event that the original device is
damaged or lost.
Users have the option to restore a backup that was previously performed on a prior device. This
allows the user to recover older backed-up files in the event that TeamViewer Backup is re-installed
on a device where a backup has already been performed.
When selecting files for restore, the user can choose if s/he wants to 1) restore a single version of a
file, or 2) restore files within a specific time interval and select the files by that particular date range.
The user can also search for a file or folder by name in the search box or select the file or folder via
the tree.
After the files have been selected, the user can specify where the files should be restored to. There
are two options:
1. Restore to the original location: the files will be restored to the same location they were in
on the original device.
Note: It is important to make sure that the drive(s) where the files will be restored
to exists on the selected device and has enough space.
The TeamViewer Backup device view is designed to make sure the user has the most important
information up front. It was developed in order to make working with TeamViewer Backup easier
and more efficient. By utilizing the search functions and filters, the user can search for a specific
device by the device name, a group of devices, or for backup status.
6.7.1 Filtering
The user can search for devices by the device name, or filter the devices by the groups and the
backup device status.
This provides an overview of the number of the endpoints in use, and displays the amount of storage
used compared to the purchased storage.
For questions, additional assistance, and support, please contact our experienced support team by
submitting a ticket. You can also visit our Community page for further support. We are always happy
to help!
V4.01.1912