Hello Zoho Assist Community!
We are back again this week with another setting from Preferences: Security. Ensuring the security of remote support sessions is crucial, especially when sensitive data is frequently accessed during these interactions. It’s important to implement robust security measures to protect both the technician and the customer. In this post, we will discuss essential security settings that can significantly enhance the safety of your remote support sessions.
Disabling clipboard sharing
Clipboard sharing can be a potential security risk as it allows the technician or customer to copy and paste information between computers. Imagine you are providing support to a client handling confidential financial data. By disabling clipboard sharing, you ensure that sensitive information cannot be inadvertently or maliciously transferred to or from the client's system. To implement this:
Click the checkbox next to Disable Clipboard Sharing.
Enabling idle session timeout
Picture a situation where a technician is remotely working on a client’s server to perform routine maintenance. Another client steps in with an urgent requirement, and the technician gets caught up with the other device, leaving the session unattended. Enabling the idle session timeout ensures that if the session remains inactive for too long, it will automatically end, protecting the server from any unauthorized access during the client's absence.
An idle session can be a significant security vulnerability. You can enable an idle session timeout to automatically terminate a session if the technician's computer is left idle for a specified duration. A reminder will pop up 90 seconds before the session ends, giving the technician the option to continue or end the session. To enable this:
Click the checkbox next to Enable Idle Session Timeout.
Fill in the desired timeout period in minutes in the space provided. Choose Disconnect session to terminate the session or Disconnect session and lock the remote computer to lock the remote computer also.
Locking the remote computer post-session
To add an extra layer of security, you can configure the remote computer to lock automatically at the end of every support session. After finishing a remote troubleshooting session, locking the remote computer ensures that no one can access it until a legitimate user logs back in, maintaining the security of the client's system. By configuring these settings, you can provide secure and efficient remote support, ensuring that your client's data remains protected.To enable this:
Click the checkbox labeled Lock remote computer on disconnection after remote connection.
Writer is a powerful online word processor, designed for collaborative work.