How to Preventing Clients from Viewing or Accessing Your Other Devices
When providing remote support or managing multiple computers via the same account, you may face a critical issue: clients being able to see or even remotely access your own computer or other clients’computers. This can pose serious privacy and security risks.
Below we explore in detail why this happens, and what solutions exist to prevent it.
Scenario:
When you log in with the same account on multiple computers (e.g., your own PC plus your clients’PCs), all those devices will appear under the same device list. By default, each logged-in device can see and connect to the others in that account.
This setup is convenient for personal device management, but in a client-service provider relationship, itcreates an unintended security gap. Clients might gain visibility into machines they should not access.
Solutions:
We recommend selecting the appropriate version based on your needs to ensure clients can only be remotely accessed by you, without gaining access to your device or other clients' computers.For Professional Edition Users
Donot log in to your account on client machines.
Clients’PCs (acting as the controlled side) do not need an account login.
Instead, connect using:Device ID + Temporary Security Code, orDevice ID + Fixed Security Code.
Once you connect successfully the first time, the client’s computer will appear in your Recent Connections List. As long as the security code remains unchanged, you can quickly reconnect without requiring the client to log in.
Benefits:
Clients cannot see your computer or other clients’computers.
Full control remains with you as the service provider.
For Enterprise Edition Users
Client computers can be added as Team Devices.
Team devices cannot see or directly connect to one another.
Centralized management ensures complete isolation between clients.
This model is ideal for organizations or IT providers handling multiple customers in bulk.
Benefits:
Professional-level segregation of customer environments.
Enhanced control, compliance, and security.
Best Practices for Security
Note:
Avoid account sharing: Never log your account into a client’s device unless absolutely required.
Use fixed or temporary security codes: Easier for clients, safer for you.
Apply role-based access (Enterprise Edition): Assign appropriate permissions to ensure clients can only access what they need.
Audit connections regularly: Review your recent connection list and clear devices you no longer manage.