This log file is the complete history of all incoming and outgoing connections.
[..]
The other details like IP, IE version etc. represents the machine details from where the system is accessed. It is important for forensic investigator that to identify location from which the remote access had been done.
[..]
These logs are valuable & as important as the evidence acquisition of emails, to find evidence if someone is accused to be done any cybercrime related with TeamViewer & involvment with other email platforms. In above session, we have discussed evidence artifacts fabricated in the log files and TeamViewer TVC files.