I would heavily advise against attempting to launch teamviewer on a corporate machine without written admin approval. It would not be surprising if corporate firewalls already have explicit detection for TeamViewer connections. It would be simple enough to identify the traffic as belonging to TeamViewer - from both statistical methods on the packets and the destination IP. If that app was, say, TeamViewer connecting to my home computer, what would the traffic look like to the admins? Its also trivial for an admin to actively pull a list of running processes on a machine. And attempts which trigger this policy may get automatically flagged for admin review. What is a lot more common is blocking access to USB ports or using a policy to block execution of any file that has come from an unknown source. But a system to report unrecognized executable execution could easily be implemented - I would not be surprised if vendors offer this. If I run an app from a USB drive on a corporate network, can its execution be seen by the admins?īy default on a "normal" windows corporate setup you would not usually expect them to be notified.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |