{"showBanner":false,"urlFilters":[],"type":"warning","title":"Service Incident","content":"We are investigating reports of customers being unable to use our Zendesk Widget for support. If you need urgent assistance, please reach out to serviceincident@zendesk.com. For more information, .","linkURL":"https://support.zendesk.com/hc/en-us/articles/4577692745114-Service-Incident-May-4th-2022-Zendesk-ZBot-Widget-unavailable","linkText":"please read this announcement"}
Logo
Community
English (US)
languages
Deutsch Español Français 日本語 한국어 Português do Brasil
Current: English (US)
Sign in
  1. Zendesk help
  2. Admin Center
  3. Using Admin Center
  4. Managing global security and user access
  1. Zendesk help
  2. Admin Center
  3. Using Admin Center
  4. Managing global security and user access

Managing global security and user access

  • Global security and sign-in resources
  • Understanding account owner permissions
  • Zendesk's secure-by-design cloud solution
  • Managing security settings in Admin Center
  • Security best practices
  • Securing sensitive information
  • Security for third party integrations
  • Advanced security for Support
  • Enhanced Disaster Recovery
  • Advanced Compliance
  • Security, passwords, and an opportunity to have a more secure digital life.
  • Creating a secure environment for Zendesk
  • Zendesk's Commitment to International Standards for Information Security and Privacy (ISO 27001 and ISO 27018)
  • Changing the account owner
  • Granting Zendesk temporary access to assume your account
  • Setting the password security level
  • Configuring end user access and sign-in
  • Split authentication methods for customers and agents
  • Managing two-factor authentication (2FA)
  • Restricting access to Zendesk Support and your Help Center using IP restrictions
  • Understanding your Zendesk session time
  • Configuring your firewall for use with Zendesk
  • Managing malicious attachments
  • Choosing the best authentication option for my account
  • Global security and sign-in resources
  • Understanding account owner permissions
  • Zendesk's secure-by-design cloud solution
  • Managing security settings in Admin Center
  • Security best practices
  • Securing sensitive information
  • Security for third party integrations
  • Advanced security for Support
  • Enhanced Disaster Recovery
  • Advanced Compliance
  • Security, passwords, and an opportunity to have a more secure digital life.
  • Creating a secure environment for Zendesk
  • Zendesk's Commitment to International Standards for Information Security and Privacy (ISO 27001 and ISO 27018)
  • Changing the account owner
  • Granting Zendesk temporary access to assume your account
  • Setting the password security level
  • Configuring end user access and sign-in
  • Split authentication methods for customers and agents
  • Managing two-factor authentication (2FA)
  • Restricting access to Zendesk Support and your Help Center using IP restrictions
  • Understanding your Zendesk session time
  • Configuring your firewall for use with Zendesk
  • Managing malicious attachments
  • Choosing the best authentication option for my account
Zendesk 989 Market St., San Francisco, CA 94103 Privacy Policy | Terms & Conditions | Cookie Policy | System Status
Powered by Zendesk