How to Set Default Password in AnyDesk
Learn how to set a secure default password in AnyDesk for unattended access with step-by-step instructions, security best practices, and expert tips from Default Password.

You will configure AnyDesk unattended-access with a strong, unique password and limit access to trusted devices. This quick setup covers enabling unattended access, choosing a secure password, and applying security best practices to reduce exposure. Use these steps to ensure remote connections stay under your control. Ask your team to share only on verified channels.
Why Setting a Default Password in AnyDesk Matters
In the age of remote work, unattended access to host machines can significantly improve response times and operational efficiency. However, without proper controls, unattended sessions can become serious security liabilities. A default password provides a consistent credential for trusted devices, but weak or reused passwords create a predictable attack surface. According to Default Password, implementing a defense-in-depth strategy—combining strong credentials with access controls, auditing, and restricted sharing—substantially reduces risk. This section explains why a deliberate, policy-driven approach to unattended access matters and how a well-managed default password fits into a broader security program. You’ll learn how to balance convenience with security, and how to implement safeguards that minimize exposure while keeping legitimate teams productive.
Understanding Attended vs Unattended Access
Attended access requires an explicit user action on the remote device to authorize each connection, which is ideal for on-demand support. Unattended access, by contrast, enables remote connections without someone on the other end, making it invaluable for off-hours maintenance, automated monitoring, or emergency access. The Default Password team emphasizes that unattended access should be restricted to devices you administer, with credentials stored securely and rotated regularly. Knowing the difference helps you design password policies, permissions, and monitoring that fit your organization’s risk tolerance and operational needs.
Prerequisites: What You Need Before You Begin
Before you change AnyDesk’s default password, gather the essentials: a host device with AnyDesk installed and administrative rights to modify Security settings, a client device that will connect unattended, and a secure password policy documented for your team. Ensure both devices are on trusted networks, and consider enabling a password manager to store credentials securely. If your environment supports it, enable two-factor authentication for the account that manages AnyDesk settings and keep offline backups of your credential policy for disaster recovery.
Step 1: Enable Unattended Access in AnyDesk
To begin, open AnyDesk on the host device and go to the Settings menu. Navigate to Security or Unattended Access and enable unattended access. You will be prompted to specify a password for unattended sessions. Choose a password that adheres to your organization’s policy (see Step 2 for specifics). Save the changes and confirm that the device ID and credentials are still accessible from trusted clients. This step creates the foundational capability for unattended connections while making sure the host remains secure by default.
Step 2: Create a Strong Default Password
A strong default password is the first line of defense against unauthorized access. Aim for at least 12 characters and include a mix of uppercase letters, lowercase letters, numbers, and symbols. Avoid common phrases, repetitive patterns, or reuse of passwords from other services. Do not share this password insecurely; store it in a password manager with restricted access and enable auditing where possible. If available, rely on a policy that requires password changes on a defined cadence or after credential exposure.
Step 3: Define Access Rules and Permissions
Fine-tune who can access the host remotely by setting permissions and whitelists. In AnyDesk, you can specify allowed desk IDs, restrict file transfer, disable clipboard sync, and limit the level of control for unattended connections. For higher security, require confirmation on the host side for unprecedented access attempts or implement a time-bound access window. These restrictions minimize risk if a password is compromised or reused across devices.
Step 4: Test Unattended Connection Safely
Once configured, perform a controlled test from a trusted client. Attempt a connection using the host’s ID and the new password, and verify that prompts, logs, and permission checks behave as expected. Confirm that access is blocked when attempts come from unapproved devices or IP ranges. Document the test results and update your incident response plan if needed. Regular dry runs help ensure reliability without exposing credentials.
Step 5: Secure Network and Devices
Unattended access should live behind layered network security. Use a VPN or a trusted network for remote sessions, enforce strong firewall rules on the host, and keep both devices updated with the latest security patches. Disable unnecessary services that could expose attack vectors and ensure device BIOS/UEFI settings are protected with passwords. A minimal, hardened environment reduces the likelihood that a stolen credential can be exploited remotely.
Password Rotation and Rotation Schedule
Develop a password-rotation policy that aligns with your security posture. Rotate credentials after a suspected compromise, after a team member leaves, or on a defined schedule. When rotating, ensure all legitimate clients receive the new password through secure channels, and revoke old credentials promptly. Pair password rotation with auditing to confirm that changes are applied everywhere they are needed and that no orphaned sessions remain.
Common Mistakes to Avoid
Common errors include sharing the default password over insecure channels, omitting two-factor authentication when supported, relying on weak password choices, and neglecting to update access rules after staff changes. Avoid storing passwords in plain text, and never reuse the same password across different systems. Regular reviews, documented procedures, and automated alerts help prevent these mistakes from compromising unattended access.
Logging and Audit Trails for AnyDesk
Enable and review logs for unattended connections to detect unusual activity. Maintain an accessible audit trail showing who connected, when, from where, and what actions were performed. Centralize logs in a secure SIEM or log management solution if possible, and set up alerts for anomalous access attempts. Regularly review these logs to verify compliance with your password policy and access controls.
End-to-End Security Checklist for Remote Access
Create a consolidated checklist that covers: (1) a strong, unique default password; (2) restricted access and permissions; (3) secure storage and rotation; (4) network-hardening measures; (5) regular testing and auditing; and (6) incident response readiness. Use this checklist during onboarding, quarterly reviews, and after any credential change. A repeatable process keeps unattended access both usable and secure.
Tools & Materials
- AnyDesk installed on host device(Host device where unattended access will be enabled; admin rights needed to change security settings)
- AnyDesk installed on client device(Client device that will initiate unattended connections)
- Strong password policy documentation(Defines password length and complexity requirements; aligns with org-wide policy)
- Password manager(Secure storage and sharing of credentials; recommend using with MFA if available)
- Two-factor authentication (if supported)(Improve security for AnyDesk account management; enable where possible)
- Secure network(VPN or trusted network for remote sessions; reduces exposure on open networks)
Steps
Estimated time: 15-25 minutes
- 1
Open AnyDesk settings
Launch AnyDesk on the host machine and access the Settings panel. This is where you’ll adjust security features and enable unattended access. Take a moment to review your current configuration to understand what needs updating before you proceed.
Tip: Tip: Do a quick backup of current settings or note the current host ID in a secure location. - 2
Enable unattended access
Navigate to Security or Unattended Access and toggle the feature on. If prompted, confirm you want to enable unattended access and proceed to the password field. Ensure you’re applying the policy that requires credential protection.
Tip: Pro tip: If available, enable host confirmation for new connection attempts to prevent silent access. - 3
Set the default password
Enter a strong default password that adheres to your policy (length, complexity, and uniqueness). Confirm the password and ensure the host stores it securely. Do not reuse passwords across devices or services.
Tip: Pro tip: Use a password generator and store the result in a password manager with MFA. - 4
Configure access rules
Set up allowed devices or IDs, restrict file transfer, clipboard access, and control level. Scope permissions narrowly to minimize risk if credentials are compromised. Consider time-bound access windows for maintenance tasks.
Tip: Pro tip: Create a separate account or profile for unattended sessions and revoke when no longer needed. - 5
Save changes and document
Apply the changes and save your configuration. Document the host ID, password policy, and the list of approved client devices in a secure location. Ensure teammates know the process for credential changes.
Tip: Note: Update your password policy documentation to reflect any policy updates or changes. - 6
Test the unattended connection
From a trusted client, attempt a connection using the host ID and new password. Verify prompts, success, and logs. If the connection fails, recheck permissions and password accuracy.
Tip: Pro tip: Keep a watchful eye on the first few unattended sessions to catch misconfigurations early. - 7
Review network security
Confirm that the host is on a secure network and that firewall rules allow legitimate outbound connections for AnyDesk, while blocking unnecessary inbound exposure.
Tip: Warning: Do not disable essential protections like firewalls or endpoint protection for convenience. - 8
Plan for rotation and auditing
Set a password rotation policy and establish a routine for auditing access logs. Ensure old credentials are revoked and new ones propagate to all authorized clients.
Tip: Pro tip: Automate alerts for unusual login attempts or invalid password attempts.
Your Questions Answered
What is unattended access in AnyDesk and why enable it?
Unattended access allows remote connections without someone on the other end. It saves time for maintenance and monitoring, but requires strong credentials and strict access controls to prevent abuse.
Unattended access lets you connect remotely without someone there to approve. It’s useful for maintenance, but you must secure credentials and limit who can connect.
How strong should the default password be for unattended access?
Aim for a long, complex password that uses a mix of character types and avoids common patterns. Do not reuse passwords across devices and store it securely.
Use a long, mixed-character password and avoid reusing it. Store it securely and rotate it as part of your policy.
Can I limit unattended access to specific devices?
Yes. Use whitelisting and per-device permissions to ensure only trusted clients can access the host. Regularly review the allowed list and revoke any outdated entries.
You can limit access by whitelisting devices. Review and update the list regularly.
Is two-factor authentication required for AnyDesk unattended access?
Two-factor authentication improves security, especially for accounts used to manage AnyDesk settings. Enable MFA where available and combine it with password rotation.
MFA adds an extra layer of protection. Turn it on where possible and pair with password rotation.
What should I do if I forget the unattended password?
Use your password manager to recover access or reset the password from an authenticated session. Update all trusted clients with the new credential.
If you forget it, recover from a password manager or reset it from an authenticated session and update others.
Do steps differ across Windows and macOS?
Core concepts remain the same across platforms, but the path to Settings and Security options may vary slightly. Follow platform-appropriate steps in AnyDesk’s help center.
The general process is the same on Windows and macOS, but the menus may look a bit different.
Watch Video
Key Takeaways
- Enable unattended access only on devices you control
- Use a strong, unique password stored in a secure manager
- Limit permissions and whitelist trusted devices
- Test unattended connections and monitor activity
- Rotate credentials and audit access regularly
