Hi Bob.
That is something to be very concerned with. Ideally the users would be using
company supplied computers logging on as regular usurers in which case you could
control what is installed on them including virus protection [all emails must be
scanned also], critical updates, and a personal firewall. If they are going to
use their personal home computers the risk rises quite a bit do to the fact that
risk of infection will be much higher. That does not mean that it can not be
done. The usual precautions such as quality virus protection, prompt patch
management, minimum needed share permissions, firewall logging/alerts, and
effective passwords will go a long ways to protect your network. You also will
want to use your vpn device or server to manage where vpn users can go. In W2K
rras for instance you can edit the profile for remote access policy to filter
packets for the vpn connection to manage traffic to and from your lan. It may
also make sense to create user accounts for just using the vpn if they are using
domain accounts where remote access can be controlled via account properties.
You could then create a group for the vnp users and give that group the explicit
user right for deny access to this computer from the network to computers you do
not want them to access as an extra precaution. Password policy for your lan
computers is very important - particularly any administrator accounts domain or
local. Trojans often run a short dictionary attack against administrator
accounts to take advantage of built in administrative shares. --- Steve