The Ultimate Guide to AnyDesk’s Security Features
We all want to be safe on the Internet. As a remote access software provider, we have a responsibility to protect our user data. So today, on a secure Internet day, we want to answer this question:
How does anyone secure a desk?
Encryption protects your computer from unauthorized access. We use TLS 1.2, a protocol that is also used in online banking. In addition, we use 2048bit RSA or 256bit Elliptic curve DH asymmetric key switches and AEAD to validate each connection.
The connection itself – the hidden thread between you and the remote device – is therefore wrapped up in multiple layers of security.
But there’s more: If InDesign detects modification of the connection signal, it is immediately deleted for security reasons. Renegotiation is not a priority, with no scope for MITM-type attacks.
The current encryption mode, authentication status, and client fingerprint can be viewed during the session by hovering over the lock icon in the station bar.
You have a lot of options within the session. On the far side, you can choose who you want to allow, whether it is to transmit the sound or let the incoming user control your mouse and keyboard. You can also add additional permissions in the Settings Security tab. For example: Do you trust the incoming user enough to allow you to restart your computer?
If you do not want to receive session requests, deny direct interactive access or set a password for unauthorized access, that is, to only the person who can access the device. And you don’t have to worry about the password! We don’t save them and use salty password hashing instead. This will allow you to tailor your specific needs to the level of security.
You can exclude your device from being detected and disable auto-updates. By placing trusted tables in the Access Control List white list, you ensure that only select people can contact you and all others will be blocked.
For my.anydesk.com, we provide a two-factor-authentication option as an added security layer, which means you need a verification app to log in in addition to your password. ۔ Just make sure you save the recovery key or print it out!
Any desk enterprise
If no direct connection is made, your data usually runs on our servers on any desk, complete with the encryption mentioned above. An additional option for security is to use your servers, on-premises, to ensure that your data remains in a sealed network. If working within a sealed network (DMZ) is important to you, Indy Desk Enterprise is the solution for you.
Finally, but most importantly, we need to spread awareness. To ensure a secure remote session, we constantly remind you not to share personal information with people you don’t know. We use social media, our blog and all other communication sources to inform and protect consumers about online security topics. If you ever encounter a scammer trying to use a desk, we ask that you report it so we can stop them.
We do our best to keep you safe. To find out more about how there is no fraud in giving you access to your data through scammers, check out our blog article.