Skip to main content

LevelBlue Completes Acquisition of Cybereason.  Learn More

LevelBlue Completes Acquisition of Cybereason.  Learn More

Services
Cyber Advisory
Managed Cloud Security
Data Security
Managed Detection & Response
Email Security
Managed Network Infrastructure Security
Exposure Management
Security Operations Platforms
Incident Readiness & Response
SpiderLabs Threat Intelligence
Solutions
BY TOPIC
Offensive Security
Solutions to maximize your security ROI
Operational Technology
End-to-end OT security
Microsoft Security
Unlock the full power of Microsoft Security
Securing the IoT Landscape
Test, monitor and secure network objects
Why LevelBlue
About Us
Awards and Accolades
LevelBlue SpiderLabs
LevelBlue Security Operations Platforms
Security Colony
Partners
Microsoft Security
Unlock the full power of Microsoft Security
Technology Alliance Partners
Key alliances who align and support our ecosystem of security offerings
Loading...
Loading...

HOWTO: Blocking the Teamviewer Client using the WF or WFR

Expand / Collapse


This article applies to:

  • WF - All Versions
  • WFR - All Versions

Question:

  • How do I block Teamviewer software on the web filter?

Procedure:

Web Filter is a TCP based filter, so it is only able to block TCP packets. The filter can block navigation to the teamviewer.com website since the connection is made over TCP. However, the Teamviewer client also uses UDP. Any UDP based application is out of scope of the filter's design.

To block applications that use UDP traffic you can control application installation via user policies, or block the UDP packets from the application on the firewall. Another option is to combine Web Filter with other Trustwave products which are capable of filtering UDP traffic.

Diagnosing UDP Ports To Block:

The procedure below is a suggested starting point to help you determine the ports in use. You may need to experiment to use the procedure in your network environment.

  • Run Wireshark on a workstation that has a connection to teamviewer.  This workstation should be inside your network.
  • Have the connecting host from outside of the network provide their IP address (they can determine this by navigating to whatismyip.com). You can use the IP address as a filter in Wireshark to see only the traffic to this IP using the following filter: 

        ip.addr==[external address] && udp

    For example:

         ip.addr==203.0.113.1 && udp
  • If the connection is local, use the internal IP to filter.
  • You should be able to deduce from the output which packets are generated by Teamviewer. On the packet details pane you will see an entry similar to:
     
    User Datagram Protocol, Src Port: mapper-ws-ethd (3986), Dst Port:56869 (56869)
     
  • Blocking the non-ephemeral port at the firewall should stop the teamviewer traffic. However, if teamviewer changes the UDP port, you will need to run the same test and continue this process until no connections are established.  

Notes:

You can use this same procedure to try stopping connections from other UDP based applications.


To contact LevelBlue about this article or to request support:


Rate this Article:
     

Add Your Comments


Comment submission is disabled for anonymous users.
Please send feedback to Trustwave Technical Support or the Webmaster
.