Anydesk Intune



  1. Learn how to get started when using AnyDesk for the first time. This includes important topics such as unattended access, setting up your license and security settings. 1 Download AnyDesk. Download AnyDesk at www.anydesk.com. 2 Install AnyDesk on your Device.
  2. Discover AnyDesk, the secure & intuitive remote desktop software, and take advantage of the application's innovative features!
  3. AnyDesk AnyDesk vs. 2016 TeamViewer - All information is supplied without guarantee. TeamViewer AnyDesk Remote support & access Service case chat (before initialising a customer support session). Microsoft Intune, Mobile Iron.

AnyDesk vs TeamViewer

AnyDesk allows you to establish remote desktop connections in Windows 10 and opens up unprecedented possibilities of collaborating online and administrating your IT network. With AnyDesk, you can work remotely from everywhere! Dynamic Performance for Smooth Windows Remote Access. As of version 6.1.10 the AnyDesk Android app can be integrated with Microsoft Intune. This is currently only available for the standard AnyDesk client, which can then be customized on the Microsoft Intune Web-UI. On the Microsoft Intune Web-UI all available options are displayed, including short descriptions of how they work and what they do.

Following our previous discussions on comparing remote desktop tools, today we are going to compare Anydesk vs TeamViewer.

Today, many individuals and organizations around the globe need to be able to access computers that are physically away from them, and that is exactly what remote desktop tools such as AnyDesk and TeamViewer enable people to do. Online education, teleworking and software troubleshooting are just a few examples of situations that can be simplified a great deal with the help of remote desktop tools.

TeamViewer and AnyDesk are both developed by German companies. TeamViewer was first released in 2005 by TeamViewer GmbH and has been going strong, ever since. A decade later, AnyDesk was created by some ex-TeamViewer employees and soon, joined the other front runners like Microsoft’s Remote Desktop Connection and TeamViewer, in the remote desktop software market. In the past few years, AnyDesk has been gaining popularity, increasingly. So much so that in 2019, Gründerszene Awards acknowledged AnyDesk as Germany’s 36th fastest-growing digital company.

Editions and cross-compatibility in AnyDesk vs TeamViewer

Both AnyDesk and TeamViewer are both free for private use but need to be purchased for commercial purposes.

TeamViewer is available for many platforms, including Windows, macOS, Linux, ChromeOS, Raspberry Pi, Android, iOS, Windows Phone, and BlackBerry. AnyDesk has client and server versions for Windows, macOS, Linux, and FreeBSD, but only client versions for Android, iOS, Raspberry Pi, and Chrome OS, that means you can use AnyDesk to connect from an Android phone to a PC, but no remote computer can access your Android device through AnyDesk. In contrast, TeamViewer allows mobile to mobile, desktop to mobile, mobile to desktop and desktop to desktop connections. Also, unlike TeamViewer, AnyDesk is not available for Windows phone, Blackberry and some older versions of Windows (before Windows XP).

Therefore, in terms of cross-compatibility, in the AnyDesk vs TeamViewer competition, TeamViewer is more successful, even though, AnyDesk is very cross-platform compatible, too.

Performance and efficiency in AnyDesk vs TeamViewer

In order to use AnyDesk, all you need to do is download a 3M file and run it! By default, AnyDesk runs in portable mode, so you can start using it right away, without any installation, configuration or port forwarding required. All you need to do is enter the address of the remote computer. However, you can choose to install AnyDesk, too, if you want. The installation is very simple and it gives you the option to create an alias for yourself, so you can use it instead of the address which is a random string of numbers.

Similarly, TeamViewer is very easy to install, as well. Even though it is not as lightweight as AnyDesk, and it does not require any firewall configurations, either.

AnyDesk is based on a proprietary video codec, DeskRT that is designed as a fast and optimized means to transfer image data from graphical user interfaces (GUIs) between computers. With its innovative compression process, DeskRT is able to send out data with a rate of up to 60 frames per second.

DeskRT also has powerful algorithms to compress some of the usual elements of GUIs, such as large areas of color, sharp edges and repetitions of pixels, efficiently. Besides, AnyDesk can adjust the connection to provide users with the fastest possible remote experience and the best achievable video quality. As a result, AnyDesk performs rather well in low bandwidths and poor Internet connectivity, too, whilst, TeamViewer users, sometimes, experience difficulties in low-bandwidths.

Anydesk Intune

Accordingly, AnyDesk is believed to be the fastest remote desktop software by some people, but nothing is proven, yet and TeamViewer is still very much in the competition.

Security in AnyDesk vs TeamViewer

AnyDesk uses banking-standard TLS 1.2 technology to protect systems against unauthorized access. It also uses RSA 2048 asymmetric key exchange encryption to verify every and all connections.

TeamViewer secures its traffic by using RSA public/private key exchange and AES (256 bit) session encryption. The private key only stays on the client computer and never leaves it, therefore, none of the connecting computers in between can decrypt the data stream; even the TeamViewer routing servers are no exception.

Anydesk Intune

As an additional security measure, it is possible to create a whitelist in AnyDesk, so only trusted devices can send connection requests to you. TeamViewer offers the whitelist option, too. It also has a blacklist function, to block certain TeamViewer IDs and/or accounts from requesting to connect to your system.

Nevertheless, both these powerful remote desktop tools have been exploited by online fraudsters, few times, now.

For example, in 2019, the Reserve Bank of India sent a warning to banks and payment systems operators that AnyDesk was being used by cybercriminals to steal sensitive data, such as information on bank accounts.

TeamViewer had a similar incident in 2016, when many TeamViewer users complained about unauthorized access to their systems, and reported raided PayPal, eBay, and Amazon accounts due to stolen information saved in their browsers.

There’s no doubt that TeamViewer and AnyDesk both are protected by some advanced and state of the art security techniques. However, as the saying goes, “a chain is only as strong as its weakest link.” So without a security-aware user, no amount of security measures taken by the software developers is enough, especially, for a high-risk activity like remote connection.

Features and properties of AnyDesk vs TeamViewer

Here is a comparison of some other properties and features in AnyDesk vs TeamViewer.

  • TeamViewer and AnyDesk both can remotely connect to other systems through the Internet as well as the local network.
  • Both allow remote printing.
  • AnyDesk allows file transfer through Copy and Paste synced clipboard for all platforms. It also has a dedicated file manager for Windows and macOS, only. Users can prevent file transfer in AnyDesk altogether, by disabling clipboard transmission in the security settings. In addition to Copy and Paste and file manager options, TeamViewer permits Drag and Drop file transfer too, but just for the Windows users. You can disable file sharing on TeamViewer, as well.
  • TeamViewer only supports audio sharing in Windows, but AnyDesk supports it in all platforms.
  • Video is supported in both TeamViewer and AnyDesk.
  • TeamViewer provides cloud-based management services, which enables users to use TeamViewer on browsers without having to install it. AnyDesk does not have this feature.
  • You can integrate TeamViewer with many third-party apps such as Cherwell, Microsoft Intune, and Zendesk. AnyDesk can be integrated with some third-party widgets, too, but it requires getting REST-API and documentation for domain and authentication.
  • TeamViewer and AnyDesk both have a chat tool. They both also offer a whiteboard to draw and write on the presented screen, so everyone can see it.
  • AnyDesk allows recording sessions. You can either manually turn on recording whenever you decide to record a session or set AnyDesk to automatically record all sessions. The same goes for TeamViewer. Plus, TeamViewer lets you convert your recorded session into an AVI file with just a click.
  • AnyDesk and TeamViewer both support unattended access which lets the user access a host computer with no one sitting at it required.
  • In TeamViewer, the maximum number of simultaneous connections you can have depends on your license and only goes up to 15 for the highest license tier. In AnyDesk, the maximum number depends on your license, likewise. The Free and Lite license will only allow one simultaneous session. The Professional license allows for as many sessions as ordered and Power license enables unlimited sessions for the number of active devices ordered.
  • By default, both TeamViewer and AnyDesk allow the local user to see everything that the remote user is doing, on their screen, so they can be good choices for remote assistance.
  • Screen blanking, i.e. concealing the screen content during a session for anyone with physical access to the remote device, is sometimes required for privacy reasons. TeamViewer currently offers screen blanking as an option which is only possible when connecting to Windows systems. In AnyDesk, the option is called Screen Privacy and is available for Windows 8/10, macOS and Linux.

Conclusion

TeamViewer and AnyDesk have many similarities and a few differences. For example, TeamViewer is easier to integrate with third-party apps and AnyDesk supports audio in more platforms, comparing to TeamViewer. Generally, it is best to assess your needs carefully and compare them to some top remote desktop tools, such as AnyDesk, TeamViewer, Remote Desktop Connection, VNC, so you can choose the one that can fulfill your or your organization’s requirements, best.

As for comparing AnyDesk vs TeamViewer in terms of security, as discussed earlier, despite being truly competent, both of these remote desktop apps have been misused by cyberattackers, at some point, and it is not really safe to expose your computer and data directly to the Internet with any of them. However, by developing better security habits, like using a powerful firewall, you can make your remote connection way more safe and secure.

-->

Applies to:

Potentially unwanted applications (PUA) are a category of software that can cause your machine to run slowly, display unexpected ads, or at worst, install other software that might be unexpected or unwanted. PUA is not considered a virus, malware, or other type of threat, but it might perform actions on endpoints that adversely affect endpoint performance or use. The term PUA can also refer to an application that has a poor reputation, as assessed by Microsoft Defender for Endpoint, due to certain kinds of undesirable behavior.

Here are some examples:

  • Advertising software that displays advertisements or promotions, including software that inserts advertisements to webpages.
  • Bundling software that offers to install other software that is not digitally signed by the same entity. Also, software that offers to install other software that qualifies as PUA.
  • Evasion software that actively tries to evade detection by security products, including software that behaves differently in the presence of security products.

Tip

For more examples and a discussion of the criteria we use to label applications for special attention from security features, see How Microsoft identifies malware and potentially unwanted applications.

Potentially unwanted applications can increase the risk of your network being infected with actual malware, make malware infections harder to identify, or waste IT resources in cleaning them up. PUA protection is supported on Windows 10, Windows Server 2019, and Windows Server 2016. In Windows 10 (version 2004 and later), Microsoft Defender Antivirus blocks apps that are considered PUA for Enterprise (E5) devices by default.

Microsoft Edge

The new Microsoft Edge, which is Chromium-based, blocks potentially unwanted application downloads and associated resource URLs. This feature is provided via Microsoft Defender SmartScreen.

Enable PUA protection in Chromium-based Microsoft Edge

Although potentially unwanted application protection in Microsoft Edge (Chromium-based, version 80.0.361.50) is turned off by default, it can easily be turned on from within the browser.

  1. In your Edge browser, select the ellipses, and then choose Settings.

  2. Select Privacy, search, and services.

  3. Under the Security section, turn on Block potentially unwanted apps.

Tip

If you are running Microsoft Edge (Chromium-based), you can safely explore the URL-blocking feature of PUA protection by testing it out on one of our Microsoft Defender SmartScreen demo pages.

Anydesk vs

Block URLs with Microsoft Defender SmartScreen

In Chromium-based Edge with PUA protection turned on, Microsoft Defender SmartScreen protects you from PUA-associated URLs.

Security admins can configure how Microsoft Edge and Microsoft Defender SmartScreen work together to protect groups of users from PUA-associated URLs. There are several group policy settings explicitly for Microsoft Defender SmartScreen available, including one for blocking PUA. In addition, admins can configure Microsoft Defender SmartScreen as a whole, using group policy settings to turn Microsoft Defender SmartScreen on or off.

Although Microsoft Defender for Endpoint has its own blocklist based upon a data set managed by Microsoft, you can customize this list based on your own threat intelligence. If you create and manage indicators in the Microsoft Defender for Endpoint portal, Microsoft Defender SmartScreen respects the new settings.

Microsoft Defender Antivirus and PUA protection

The potentially unwanted application (PUA) protection feature in Microsoft Defender Antivirus can detect and block PUA on endpoints in your network.

Note

This feature is available in Windows 10, Windows Server 2019, and Windows Server 2016.

Microsoft Defender Antivirus blocks detected PUA files and any attempts to download, move, run, or install them. Blocked PUA files are then moved to quarantine. When a PUA file is detected on an endpoint, Microsoft Defender Antivirus sends a notification to the user (unless notifications have been disabled) in the same format as other threat detections. The notification is prefaced with PUA: to indicate its content.

The notification appears in the usual quarantine list within the Windows Security app.

Configure PUA protection in Microsoft Defender Antivirus

You can enable PUA protection with Microsoft Intune, Microsoft Endpoint Configuration Manager, Group Policy, or via PowerShell cmdlets.

You can also use PUA protection in audit mode to detect potentially unwanted applications without blocking them. The detections are captured in the Windows event log.

Tip

Anydesk Msi Intune

Visit the Microsoft Defender for Endpoint demo website at demo.wd.microsoft.com to confirm that the feature is working, and see it in action.

PUA protection in audit mode is useful if your company is conducting an internal software security compliance check and you'd like to avoid any false positives.

Use Intune to configure PUA protection

Anydesk Client Install

See Configure device restriction settings in Microsoft Intune and Microsoft Defender Antivirus device restriction settings for Windows 10 in Intune for more details.

Use Configuration Manager to configure PUA protection

PUA protection is enabled by default in the Microsoft Endpoint Manager (Current Branch).

See How to create and deploy antimalware policies: Scheduled scans settings for details on configuring Microsoft Endpoint Manager (Current Branch).

For System Center 2012 Configuration Manager, see How to Deploy Potentially Unwanted Application Protection Policy for Endpoint Protection in Configuration Manager.

Note

PUA events blocked by Microsoft Defender Antivirus are reported in the Windows Event Viewer and not in Microsoft Endpoint Configuration Manager.

Use Group Policy to configure PUA protection

  1. Download and install Administrative Templates (.admx) for Windows 10 October 2020 Update (20H2)

  2. On your Group Policy management computer, open the Group Policy Management Console.

  3. Select the Group Policy Object you want to configure, and then choose Edit.

  4. In the Group Policy Management Editor, go to Computer configuration and select Administrative templates.

  5. Expand the tree to Windows Components > Microsoft Defender Antivirus.

  6. Double-click Configure detection for potentially unwanted applications.

  7. Select Enabled to enable PUA protection.

  8. In Options, select Block to block potentially unwanted applications, or select Audit Mode to test how the setting works in your environment. Select OK.

  9. Deploy your Group Policy object as you usually do.

Use PowerShell cmdlets to configure PUA protection

Anydesk Msi Download

To enable PUA protection

Setting the value for this cmdlet to Enabled turns on the feature if it has been disabled.

To set PUA protection to audit mode

Setting AuditMode detects PUAs without blocking them.

To disable PUA protection

Anydesk

We recommend keeping PUA protection turned on. However, you can turn it off by using the following cmdlet:

Setting the value for this cmdlet to Disabled turns off the feature if it has been enabled.

For more information, see Use PowerShell cmdlets to configure and run Microsoft Defender Antivirus and Defender cmdlets.

View PUA events using PowerShell

PUA events are reported in the Windows Event Viewer, but not in Microsoft Endpoint Manager or in Intune. You can also use the Get-MpThreat cmdlet to view threats that Microsoft Defender Antivirus handled. Here's an example:

Get email notifications about PUA detections

You can turn on email notifications to receive mail about PUA detections.

Anydesk Silent Install

See Troubleshoot event IDs for details on viewing Microsoft Defender Antivirus events. PUA events are recorded under event ID 1160.

View PUA events using advanced hunting

If you're using Microsoft Defender for Endpoint, you can use an advanced hunting query to view PUA events. Here's an example query:

To learn more about advanced hunting, see Proactively hunt for threats with advanced hunting.

Exclude files from PUA protection

Teamviewer Anydesk

Sometimes a file is erroneously blocked by PUA protection, or a feature of a PUA is required to complete a task. In these cases, a file can be added to an exclusion list.

For more information, see Configure and validate exclusions based on file extension and folder location.

See also