Security is in Your Hands
A well-configured remote access solution increases productivity with no adverse impact on network security. Use this practical guide to ensure that you are using LogMeIn remote access solutions securely, safely, and wisely.
Each section of this document provides tips and step-by-step instructions that help you secure your LogMeIn remote access implementation:
- Ensure that the process of logging in to the LogMeIn website or apps is as secure as possible
- Manage LogMeIn users in a secure way
- Manage and access your LogMeIn host computers with an eye on extra security
- Help your users secure their workstations
- Defend against attack from scammers, malware, and keyloggers
- Protect your POS terminals and sensitive data
- Secure hosts on your domain using Administrative Template and Group Policy services
Overview of LogMeIn Security Architecture
Before looking at the specific actions you can take to secure your implementation of LogMeIn, you should understand the basics of LogMeIn's security architecture. There are three key components to any LogMeIn remote access session:
- Client
- Any device you use to access a computer in your LogMeIn account
is called a
client. The client is "welcomed" by the host.
The client can be a PC or Mac, or a phone or tablet running Android or iOS:
- From a PC or Mac, log in to LogMeIn.com or use the LogMeIn Client desktop app
- From iPhone, iPad, or iPod touch, use the LogMeIn app
- From an Android device, use the LogMeIn app
- Host
- The host is the computer to which you are connecting. Some call it the remote computer since it is the computer you are "remote controlling." Each computer you want to access must be running the LogMeIn host software. In a sense, the LogMeIn host software safely and securely "opens the door" to a computer for a qualified remote user.
- Gateway
- The LogMeIn gateway refers to sets of servers in our secure datacenters. With LogMeIn, instead of establishing a direct link between the client and the host, the LogMeIn gateway brokers this connection.
When you connect to a host computer from a client (that is, when you connect to a remote computer from a computer or mobile device), you must first log in to your LogMeIn account. You are then presented a list of your computers that are running the LogMeIn host software (these are computers to which you can connect). In order to actually connect and control a computer, you must enter a valid password for that computer.
For more information...
For additional insight into LogMeIn security architecture, see our whitepaper LogMeIn Security: An In-Depth Look. We also strongly encourage you to practice Critical Security Controls for Cyber Defense as discussed by the SANS Institute.