chrome.exe

Google Chrome Web Browser

CPU Usage
N/A
Memory
N/A
Location
N/A
Publisher
N/A

Cpu Usage
During idle periods, bomgar-host typically uses minimal CPU (1-2%). During an active remote session, CPU usage can spike to 5-15% depending on screen sharing, video, and chat activity.
Memory Usage
Bomgar-host generally consumes 20-60 MB of RAM when idle. Active sessions with screen sharing and file transfer can raise memory usage toward 100-300 MB, influenced by clipboard activity and session logs.
Network Traffic
The component maintains TLS-encrypted connections to Bomgar gateways. Idle traffic is low; during sessions, bandwidth depends on screen sharing quality, file transfers, and chat, usually staying within typical enterprise VPN allowances.

What is chrome.exe?

Bomgar-host is the remote support host component used by BeyondTrust Bomgar deployments. It runs on user endpoints to establish secure, permission-controlled connections with approved technicians, enabling live assistance, screen sharing, and file transfer. The agent coordinates session setup, auditing, and policy enforcement while remaining unobtrusive.

Bomgar-host operates as a background service that authenticates to the Bomgar gateway and negotiates a TLS-encrypted channel for remote control. It respects local policy, prompts for user consent when required, and registers session IDs for audit trails.

Is bomgar-host Safe?

Bomgar-host, when installed from official BeyondTrust/Bomgar sources, is a legitimate enterprise remote-support component. It runs with controlled privileges, communicates exclusively with approved Bomgar gateways, and adheres to strict access policies and auditing. In standard enterprise deployments it supports consent prompts, role-based access, and centralized logging, reducing risk during remote sessions. Unusual configuration or unsigned executables should trigger an IT security review.

Is bomgar-host a Virus?

Like any legitimate remote-support agent, bomgar-host can be misrepresented by malware if downloaded from untrusted sources or tampered with. A malicious version would attempt to disguise its path, signing, and network destinations. Always confirm publisher, digital signature, and install path, and verify with your security team before allowing it to run. If doubts remain, isolate the device and run a full malware scan.

How to Verify Legitimacy

  1. Check File Location: Verify the executable resides in a sanctioned Bomgar install directory, such as C:\Program Files\Bomgar\Bomgar Host\bomgar-host.exe.
  2. Verify Digital Signature: Inspect the certificate; it should show BeyondTrust or Bomgar as the publisher.
  3. Check File Hash: Compare the file’s SHA-256 hash against the hash published by your IT department.
  4. Scan for Malware: Run a current antivirus/malware scan and confirm no related UM.dldr, droppers, or suspicious network activity.

Red Flags: Unrecognized publisher, unexpected install paths, unsigned executables, or connections to unknown domains are red flags that warrant immediate IT review and containment.

Why is it Running?

Reasons it's running:

Can I Disable or Remove It?

Common Problems

Common Causes & Solutions

Frequently Asked Questions

What is bomgar-host and what does it do on my computer?

Bomgar-host is the endpoint component of BeyondTrust Bomgar used for secure remote support sessions. It negotiates connections, shares screens, and transfers files under policy controls.

Is bomgar-host safe to run on my device?

Yes, when installed from an approved enterprise source and governed by IT policies, it operates as a controlled remote support agent with auditing.

Can I disable bomgar-host temporarily?

Disabling is usually restricted in managed environments. If permitted, use the organization’s management console or service settings to stop the service.

How do I remove bomgar-host from my computer?

Uninstall it via Programs and Features or an IT-provided removal script. After uninstall, restart the device and verify no Bomgar components remain.

Why is bomgar-host connecting to a remote server?

The host maintains connections to approved Bomgar gateways to enable authorized technician sessions and ensure secure remote access.

Do I need an administrator to manage bomgar-host?

Yes. Endpoint installation, updates, and policy configuration are typically managed by IT administrators with the appropriate permissions.

Related Processes