What's my plan?
Suite Team, Growth, Professional, Enterprise, or Enterprise Plus
Support Team, Professional, or Enterprise

For added security, Zendesk tracks the devices used to access your account. It also tracks third-party applications that accessed your account on your behalf.

Check the list on a regular basis for any suspicious devices or applications. You can view the information in your user profile; nobody else has access to the information.

New devices are added when somebody (presumably you) signs in to your account from a new device, such as a computer or smartphone. When you sign in to Zendesk, the application stores a cookie named _zendesk_cookie on your device. If the cookie doesn't exist or is invalid, Zendesk deems that device as new.

To review the devices and third-party applications that accessed your account

  1. Click your profile image on the upper-right side of the page, then click the View profile option.
  2. Open the Security Settings tab.
  3. Click the Devices & Apps link on the right side of the menu bar.
  4. Review the My Devices and Third-party Applications sections.
  5. Do any of the following:
    • To remove a device, click Remove. Reset your password immediately if you think the device is unauthorized. You'll need to sign in with the device again to reauthorize the device.
    • To rename a device, click the name and rename it.
    • To get an email notification each time somebody signs in from a new device, select the On option in the Email Notifications section.
    • To revoke an application's authorization, click Revoke. You'll need to reauthorize the application to access the account again.
Powered by Zendesk