Question about use of

Posted on 2006-06-06
Last Modified: 2013-12-04
What are the risks associated with allowing a user on my Windows Cleint-Server network to access his home pc via - or any other program that would allow a user to access their home pc over the net?

thank you,

Question by:kpdonahue
    1 Comment
    LVL 7

    Accepted Solution

    Any protocol that is allowed is some sort of risk, but if you set a good security policy, then risks are minimized. About remote control apps - They're usually OK but please note the following issues:
    1) (first and obvious) make sure the policy is one-way (meaning, the user can control his home pc from work but not the other way around).
    2) Some remote control apps (like MS remote desktop) have a feature which allows local drives to be mapped to the remote system. When security is concerned, this feature is dangerous because if turned on, the minute your employee connects to his home PC, his home PC will be able to access the local drive on his work PC. The simple solution is simply not to use any software that has this feature.
    Note - A good security policy never trusts random machines on the Internet. Any computer outside the company's firewall is potentionally malicious. Even if you trust your employees, you can't assume that none of them has a virus on his home PC that will attempt to spread to your network, that's why the feature discussed in #2 is so dangerous.
    3) Make sure that the latest version of the RC software is used and that there are no known security issues.

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Highfive Gives IT Their Time Back

    Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

    SHARE your personal details only on a NEED to basis. Take CHARGE and SECURE your IDENTITY. How do I then PROTECT myself and stay in charge of my own Personal details (and) - MY own WAY...
    Security measures require Windows be logged in using Standard User login (not Administrator).  Yet, sometimes an application has to be run “As Administrator” from a Standard User login.  This paper describes how to create a shortcut icon to launch a…
    Sending a Secure fax is easy with eFax Corporate ( First, Just open a new email message.  In the To field, type your recipient's fax number You can even send a secure international fax — just include t…
    Internet Business Fax to Email Made Easy - With eFax Corporate (, you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, fr…

    761 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    15 Experts available now in Live!

    Get 1:1 Help Now