Patent attributes
In an embodiment, a method of securing remote technical support includes monitoring a computing environment for at least one indicator of remote-control software in the computing environment in accordance with stored authentication settings. The method also includes, responsive to the monitoring, detecting the at least one indicator of remote-control software in the computing environment. The method also includes, responsive to the detection, identifying an authentication profile in the stored authentication settings that is applicable to the at least one indicator of remote-control software. The method also includes executing an authentication workflow in accordance with the authentication profile. Other embodiments of this aspect include corresponding computer systems, apparatus, and computer programs recorded on one or more computer storage devices, each configured to perform the actions of the methods.