Originally posted by Voltage Spike
Announcement
Collapse
No announcement yet.
Remote Access Benefits???
Collapse
X
-
-
Originally posted by AlxRoganwith VNC you are connecting to the actual console of the running system
Leave a comment:
-
Originally posted by Voltage SpikeWhile I'm all for using more open tools, what would be the advantage of VNC? Security-wise, capabilities, convenience? It would seem to me that RDP is faster, tunnels sound, and is running over the same SSL connection.
/me goes back to sleep
Leave a comment:
-
Originally posted by Deviant Ollamuse VNC
Leave a comment:
-
Originally posted by FunkyChickeni dont actually need access to the data on the server but instead just need to be able to control the server from home, i.e. running certain programs on the server, or even just simply viewing the current print jobs, what other option are there?Last edited by Deviant Ollam; March 2, 2006, 17:19.
Leave a comment:
-
thanks for all the excellent help guys.
i dont actually need access to the data on the server but instead just need to be able to control the server from home, i.e. running certain programs on the server, or even just simply viewing the current print jobs, what other option are there?
cheers guys
Leave a comment:
-
Originally posted by FunkyChickenHi there guys,
I have set up remote access at work so that when im at home i can access the work server using mstsc (Remote Desktop Connection). This allows me to make changes to the configuration and to possibly fix any problems that arrise.
My boss is not computer literate and is worried about the security issues of allowing remote access, how can i convince him that it is a benefit to both myself and the company to use remote access?
We have a fire wall in place and i have set up very tight rules on it. The only reason for keeping the datasafe on the server is to satisfy the rules of the Data Protection Act.
Cheers in advance Guys
Things to consider include the security of your own PC, how secure your access method is, and what you can do once you have gained access. The hardest bit is the access method and you have already received some excellent advice on the forum. It is always worthwhile defining the security measures you take on the remote PC; FW / AV / IDS etc etc.
I notice you mention the Data Protection Act; Your boss may have a different view of the value of the data on the server. Do you actually need to have access to the data, or just the server itself?
Leave a comment:
-
Originally posted by Voltage SpikeIf a VPN is available, the Terminal Service need not be visible to the outside world. All traffic on the public network will be strongly encrypted, but, depending on configuration, you might be placing your home computer inside the firewall.
As for the presence of Terminal Services itself, has the lack of such a service prevented remote attacks against Microsoft Windows in the past?
Also, even if you're doing that, your Group Policy should limit who does and does not have access to it internally. Your domain admins are probably the only ones who need to be able to access Terminal Services on servers (helpdesk may need RDP for troubleshooting XP boxes); it might not be a bad idea to pull everyone else out of the 'Allow Terminal Services' object.
Leave a comment:
-
If a VPN is available, the Terminal Service need not be visible to the outside world. All traffic on the public network will be strongly encrypted, but, depending on configuration, you might be placing your home computer inside the firewall.
You could use TLS (the same technology we use for securing web sites). The system might still be a target, but information leakage would be less of a concern.
Does the server already offer a service that allows tunneling (I'm thinking SSH here)?
As simple as it sounds, changing the port number is likely to deflect 80% of the attention the server might otherwise have drawn.
As for the presence of Terminal Services itself, has the lack of such a service prevented remote attacks against Microsoft Windows in the past?
Leave a comment:
-
I think you should be careful that your home machine doesn't carry trojans or send spyware or worms into the corporate network. Thats the next biggest concern I think, besides the obvious job of locking down the RDP server.
Leave a comment:
-
There are other problems that arise when people telecommute:
Who is responsible for ensuring workstations are "ergonomically configured" so to mitigate risk to kinds of work injuries?
When working from home, who is responsible for injuries sustained while "on the job" ? If injured, will workman's comp apply?
Other than the above, other security problems apply too, and many are comparable to taking a company laptop out on the road and then bringing it back behind the "protection" of the firewall/filters incuding mail-based malware scanners.
If you have a lot of physical security at work, that is designed to protect data or resources (like a bank, or the military, or a business with trade secrets, or other similar cases) then, does knowledge that your home computer can bypass the firewall for remote access make your home "the weakest link" for some skilled computer criminal? (Key logger -> access to your network without having to break your work's phyical security.)
Leave a comment:
-
Originally posted by FunkyChickenHi there guys,
I have set up remote access at work so that when im at home i can access the work server using mstsc (Remote Desktop Connection). This allows me to make changes to the configuration and to possibly fix any problems that arrise.
My boss is not computer literate and is worried about the security issues of allowing remote access, how can i convince him that it is a benefit to both myself and the company to use remote access?
We have a fire wall in place and i have set up very tight rules on it. The only reason for keeping the datasafe on the server is to satisfy the rules of the Data Protection Act.
Cheers in advance Guys
Restrict the number of client sessions that can remain active on the server (making it easier to keep track of who is connected)
Set session time limits (helping to ensure that sessions are not left unattended and active for long periods)
Configure encryption levels You're using Remote Desktop Protocol with RC4 encryption
Set permissions for users and groups on the terminal server
Leave a comment:
-
Remote Access Benefits???
Hi there guys,
I have set up remote access at work so that when im at home i can access the work server using mstsc (Remote Desktop Connection). This allows me to make changes to the configuration and to possibly fix any problems that arrise.
My boss is not computer literate and is worried about the security issues of allowing remote access, how can i convince him that it is a benefit to both myself and the company to use remote access?
We have a fire wall in place and i have set up very tight rules on it. The only reason for keeping the datasafe on the server is to satisfy the rules of the Data Protection Act.
Cheers in advance GuysTags: None
Leave a comment: