J
Jake
I have read that RDP is considered secure without a VPN since RDP
traffic is encrypted by default.
I work for a small co. and am considering allowing some users to log
in to TS from their home computers (probably with tsweb). Server is
W2K3.
The relevant port(s) would be opened on the LAN firewall.
I have cannot police the client machines with regard to patches,
firewalls, viruses, malware etc. However, it seems to me the risks can
be minimised by using 2 factor authentication using a physical token
device issuing one-time passwords, since this would make it virtually
impossible for a malicious user or program to authenticate. There
appear to be one or two reasonably priced solutions available for
doing this.
This solution is simple, flexible and inexpensive compared to issuing
locked-down company-owned laptops with a VPN client.
Anyone have any comments for or against this strategy?
Thanks,
Jake
traffic is encrypted by default.
I work for a small co. and am considering allowing some users to log
in to TS from their home computers (probably with tsweb). Server is
W2K3.
The relevant port(s) would be opened on the LAN firewall.
I have cannot police the client machines with regard to patches,
firewalls, viruses, malware etc. However, it seems to me the risks can
be minimised by using 2 factor authentication using a physical token
device issuing one-time passwords, since this would make it virtually
impossible for a malicious user or program to authenticate. There
appear to be one or two reasonably priced solutions available for
doing this.
This solution is simple, flexible and inexpensive compared to issuing
locked-down company-owned laptops with a VPN client.
Anyone have any comments for or against this strategy?
Thanks,
Jake