AnyViewer Help Guides

Get a quick instruction to make better use of AnyViewer for remote access, remote control, and remote support.

How to Preventing Clients from Viewing or Accessing Your Other Devices

AnyViewer Post By AnyViewer Updated September 28, 2025

When providing remote support or managing multiple computers via the same account, you may face a critical issue: clients being able to see or even remotely access your own computer or other clientscomputers. This can pose serious privacy and security risks.

Below we explore in detail why this happens, and what solutions exist to prevent it.

Scenario

When you log in with the same account on multiple computers (e.g., your own PC plus your clientsPCs), all those devices will appear under the same device list. By default, each logged-in device can see and connect to the others in that account.

This setup is convenient for personal device management, but in a client-service provider relationship, itcreates an unintended security gap. Clients might gain visibility into machines they should not access.

Solutions

We recommend selecting the appropriate version based on your needs to ensure clients can only be remotely accessed by you, without gaining access to your device or other clients' computers.

For Professional Edition Users

Donot log in to your account on client machines.

ClientsPCs (acting as the controlled side) do not need an account login.

Instead, connect using:Device ID + Temporary Security Code, orDevice ID + Fixed Security Code.

Once you connect successfully the first time, the clients computer will appear in your Recent Connections List. As long as the security code remains unchanged, you can quickly reconnect without requiring the client to log in.

Benefits:

Clients cannot see your computer or other clientscomputers.

Full control remains with you as the service provider.

For Enterprise Edition Users

Client computers can be added as Team Devices.

Team devices cannot see or directly connect to one another.

Centralized management ensures complete isolation between clients.

This model is ideal for organizations or IT providers handling multiple customers in bulk.

Benefits:

Professional-level segregation of customer environments.

Enhanced control, compliance, and security.

Best Practices for Security

Note:

Avoid account sharing: Never log your account into a clients device unless absolutely required.

Use fixed or temporary security codes: Easier for clients, safer for you.

Apply role-based access (Enterprise Edition): Assign appropriate permissions to ensure clients can only access what they need.

Audit connections regularly: Review your recent connection list and clear devices you no longer manage.