cmeagan656
Technical User
Hi all,
I'm wondering if any of you have a set policy which your users have to agree to before being permitted to use the VPN? I.E. remote computer to have latest patches and up-to-date antivirus, any antivirus pop-up message to be communicated to tech support (me) immediately, etc.
The issue is that we use terminal services but because the users need to have mapped local printers they don't log directly onto the terminal server. They come through the RRAS to authenitcate to the domain and then log on to the terminal server thereby bypassing our firewall.
I know the policy will be ineffective without physically inspecting each remote computer but if we do get an infection at least I'll be able to pull the plug on the remote access user.
Our system is W2K3 DC which is also the file/print server; NT4, SP6a for archived files (older than 3 years) / RRAS server; NT4, SP6a dedicated exchange server running Exchange 5.5 SP6; and two NT4, SP6 terminal servers.
Our antivirus is InoculateIT 6.0 and our firewall is an SMC barricade with minimal ports open. Our system is fully patched including the latest service packs on all software with the exception of OL2K which is at SR1. We can't patch beyond that level because of issues with our telephone messaging system.
All suggestions would be welcome since I just found one user with an UNPATCHED W2K Pro remote computer running an IE 5.5 with only SP1 and no patches. The reason it came to light is the user brought it in so that I could look at it since she was having major problems with it (I wonder why?).
Thanks in advance.
I'm wondering if any of you have a set policy which your users have to agree to before being permitted to use the VPN? I.E. remote computer to have latest patches and up-to-date antivirus, any antivirus pop-up message to be communicated to tech support (me) immediately, etc.
The issue is that we use terminal services but because the users need to have mapped local printers they don't log directly onto the terminal server. They come through the RRAS to authenitcate to the domain and then log on to the terminal server thereby bypassing our firewall.
I know the policy will be ineffective without physically inspecting each remote computer but if we do get an infection at least I'll be able to pull the plug on the remote access user.
Our system is W2K3 DC which is also the file/print server; NT4, SP6a for archived files (older than 3 years) / RRAS server; NT4, SP6a dedicated exchange server running Exchange 5.5 SP6; and two NT4, SP6 terminal servers.
Our antivirus is InoculateIT 6.0 and our firewall is an SMC barricade with minimal ports open. Our system is fully patched including the latest service packs on all software with the exception of OL2K which is at SR1. We can't patch beyond that level because of issues with our telephone messaging system.
All suggestions would be welcome since I just found one user with an UNPATCHED W2K Pro remote computer running an IE 5.5 with only SP1 and no patches. The reason it came to light is the user brought it in so that I could look at it since she was having major problems with it (I wonder why?).
Thanks in advance.