Securing your LogMeIn Remote Environment

Tips for Securely Managing Secondary Users

Follow these tips to help ensure that your secondary users do not present a security risk to your organization.

  • Regularly audit your Users list to remove terminated employees
  • Do not give users access to all computers in your account unless absolutely necessary
    • When adding users on the Invite users to access your computers page, be sure to Specify the groups and computers the selected user can access
  • Do not give One2Many access to unless absolutely necessary (since, in the wrong hands, One2Many can be used to distribute harmful files)
    • When adding users on the Invite users to access your computers page, be sure this option is NOT selected: Run One2Many tasks