Solved

Secure Remote Access Suggestions Needed

Posted on 2013-12-11
6
158 Views
Last Modified: 2014-02-07
I need a remote access solution so we can perform technical assistance on remote computers and for our customers to access their network resources.   We support Windows based networks.

(I have heard grumblings that Terminal Services is problematic because hackers can port scan and then hammer the connection for the correct login credentials. - Do you agree?)
0
Comment
Question by:howmad2
  • 3
  • 2
6 Comments
 
LVL 20

Expert Comment

by:n2fc
ID: 39711407
1) Remote support via TeamViewer...
See: http://www.teamviewer.com/en/index.aspx

Easy to install; easy to use; free option as well as tech support licensed version

2) Use VPN: via Hamachi...
See: https://secure.logmein.com/products/hamachi/

A little more work to setup & install; free option; allows network access for shared resources without necessarily logging on to a particular computer.
0
 
LVL 9

Expert Comment

by:stu29
ID: 39712160
What kind of Firewall are you running?  Does it have built in VPN capabilities?  If so this would be the most secure option for remote access to the network, and for your remote support of workstations, once your users are connected up to the VPN they will available to your support staff.
0
 

Author Comment

by:howmad2
ID: 39712645
Sonicwall.  Would you suggest VPN connection and RDP within the VPN tunnel?
0
Enterprise Mobility and BYOD For Dummies

Like “For Dummies” books, you can read this in whatever order you choose and learn about mobility and BYOD; and how to put a competitive mobile infrastructure in place. Developed for SMBs and large enterprises alike, you will find helpful use cases, planning, and implementation.

 
LVL 9

Accepted Solution

by:
stu29 earned 500 total points
ID: 39714062
Defiantly.  You already have the tools needed.  Depending on your box you can either do client VPN's (company laptops etc) or SSL VPN (Non Domain Computers).  Once connected you have the ability to fully manage your systems and keep visibility.

Configure your tunnels to be 2 way for your Helpdesk computers so your support staff can go out over them for remote assistance).

Nice and secure, and you keep control over your "allowed" products installed on company computers.
0
 

Author Comment

by:howmad2
ID: 39714100
Are VPN connection vulnerable if the client computer has malware or viruses.  Is there a was to not allow the connection if the client is infected, doesn't have virus protection, etc?
0
 
LVL 9

Expert Comment

by:stu29
ID: 39714141
I will answer in two parts.

"Are VPN connection vulnerable if the client computer has malware or viruses" .... this fully depends on how you configure your access rules.  A common fault it to allow "ALL" communication over VPN's.  This should not be the case.  You should only explicitly allow what they need and deny all others.

Is there a was to not allow the connection if the client is infected, doesn't have virus protection, etc? ......
Sonicwall does an EndPoint Interegation on their SSL VPN appliances.  Not sure about their client ones.  But all mainstream VPN providers provide some sort of rules based system that can check the endpoint for Windows Versions, Installed security software etc .. then each ofter this level will vary on level of detail.  I usually restrict to only supported Windows Versions, Virus DAT's no older than 7 days and scanned within the last 30 days.
0

Featured Post

Best Practices: Disaster Recovery Testing

Besides backup, any IT division should have a disaster recovery plan. You will find a few tips below relating to the development of such a plan and to what issues one should pay special attention in the course of backup planning.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Like many organizations, your foray into cloud computing may have started with an ancillary or security service, like email spam and virus protection. For some, the first or second step into the cloud was moving email off-premise. For others, a clou…
Ever notice how you can't use a new drive in Windows without having Windows assigning a Disk Signature?  Ever have a signature collision problem (especially with Virtual Machines?)  This article is intended to help you understand what's going on and…
This video Micro Tutorial explains how to clone a hard drive using a commercial software product for Windows systems called Casper from Future Systems Solutions (FSS). Cloning makes an exact, complete copy of one hard disk drive (HDD) onto another d…
Windows 8 comes with a dramatically different user interface known as Metro. Notably missing from the new interface is a Start button and Start Menu. Many users do not like it, much preferring the interface of earlier versions — Windows 7, Windows X…

911 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now