Hello folks,<\/p>\n
I’m looking for a bit of a sanity check here.<\/p>\n
My background is more of a DBA/Hosting position with only minor IT/Sysadmin stuff - software houses and the like in which my users were savvy programmers. As a result I never really had to worry about user education too much (oxymoron in the IT world perhaps) until now.<\/p>\n
In my current role, I look after IT for a main office of about 100 users and two satellite offices - one of which is not logically connected to the main site in any way.<\/p>\n
One common request I have had lately is users asking for paths to their home folders as well as shared folders, so that they can access files from home via Mac OS and Windows - from their home PCs rather than laptops which they had been allocated by the company. These users, despite having company laptops, refuse to bring them home and instead want to use their home computers for remote working.<\/p>\n
Now, my opinion here is basically that giving users unc paths so that they can remote work from home PCs is a considerable security concern. I would rather they use VPN and RDP to their computers in the office, that way the files are more likely to remain inside the company LAN.<\/p>\n
Who knows - a user’s home PC could be a Win XP machine with IE6, crawling with viruses like the monkeys from the movie ‘outbreak’.<\/p>\n
What are your thoughts? How do you deal with requests like this?<\/p>\n
Thanks,<\/p>\n
Peter<\/p>","upvoteCount":12,"answerCount":24,"datePublished":"2012-12-14T12:05:44.000Z","author":{"@type":"Person","name":"peter2750","url":"https://community.spiceworks.com/u/peter2750"},"acceptedAnswer":{"@type":"Answer","text":"
You have two things going on here. The first is a technical/policy issue: remote access to the network. The second is an HR issue: whiny users allowed to behave like Honey Boo Boo. (If you don’t already know who that is, for the love of all that’s good and right, don’t Google it. You will, of course, but don’t say I didn’t warn you.)<\/p>\n
For the first, engage your leadership on a coherent set of policies to address the business need. “Business need” is the key here. Make sure your policies include proper request procedures and what positions (not people - never specify people in a policy!) have authority to authorize various permissions. Once you start pulling the policy thread, odds are you’ll find you need to redo to the entire suite of IT-related policies. This is not a bad thing.<\/p>\n
One you have policies in place, configure your technical solutions. Only offer solutions to management that you are more than happy to support. NEVER - under any circumstances - offer a solution you don’t like. That will invariably be the one management selects. Make sure your solution covers security and data integrity.<\/p>\n
From there, simply point people to the policies. If the HMFIC constantly overrides the policy in favor of the prima donna(s), express your concerns for business integrity and security in writing. If it doesn’t get better, walk. It’s your reputation and personal integrity on the line. You will have nothing to gain by continuing to poke holes in best practices to accommodate the whims of a few people with political clout. You do, however, have everything to lose. You’ve already indicated that A_Problem_User001 likes to blame IT for their inability to meet project deadlines. If the boss is listening to them, it’s only a matter of time before you’re out.<\/p>","upvoteCount":3,"datePublished":"2012-12-14T13:33:49.000Z","url":"https://community.spiceworks.com/t/security-concerns-for-remote-workers/182330/19","author":{"@type":"Person","name":"brycekatz","url":"https://community.spiceworks.com/u/brycekatz"}},"suggestedAnswer":[{"@type":"Answer","text":"
Hello folks,<\/p>\n
I’m looking for a bit of a sanity check here.<\/p>\n
My background is more of a DBA/Hosting position with only minor IT/Sysadmin stuff - software houses and the like in which my users were savvy programmers. As a result I never really had to worry about user education too much (oxymoron in the IT world perhaps) until now.<\/p>\n
In my current role, I look after IT for a main office of about 100 users and two satellite offices - one of which is not logically connected to the main site in any way.<\/p>\n
One common request I have had lately is users asking for paths to their home folders as well as shared folders, so that they can access files from home via Mac OS and Windows - from their home PCs rather than laptops which they had been allocated by the company. These users, despite having company laptops, refuse to bring them home and instead want to use their home computers for remote working.<\/p>\n
Now, my opinion here is basically that giving users unc paths so that they can remote work from home PCs is a considerable security concern. I would rather they use VPN and RDP to their computers in the office, that way the files are more likely to remain inside the company LAN.<\/p>\n
Who knows - a user’s home PC could be a Win XP machine with IE6, crawling with viruses like the monkeys from the movie ‘outbreak’.<\/p>\n
What are your thoughts? How do you deal with requests like this?<\/p>\n
Thanks,<\/p>\n
Peter<\/p>","upvoteCount":12,"datePublished":"2012-12-14T12:05:44.000Z","url":"https://community.spiceworks.com/t/security-concerns-for-remote-workers/182330/1","author":{"@type":"Person","name":"peter2750","url":"https://community.spiceworks.com/u/peter2750"}},{"@type":"Answer","text":"
The short answer is I say “no”.<\/p>\n
I would never give someone direct UNC level access from a personal computer, with or without a VPN since you can’t legislate for the security state of that computer.<\/p>\n
As you’ve said, VPN + RDP is as good as we’ll give to non-company machines.<\/p>\n
If they have a corporate laptop but refuse to use it they need to be told to do so, involve management if necessary.<\/p>","upvoteCount":11,"datePublished":"2012-12-14T12:19:10.000Z","url":"https://community.spiceworks.com/t/security-concerns-for-remote-workers/182330/2","author":{"@type":"Person","name":"servermonkey8064","url":"https://community.spiceworks.com/u/servermonkey8064"}},{"@type":"Answer","text":"
Tell them “VPN or RDP or nothing”. All of our users are cloud based anyway, but even if they weren’t it would be ridiculous to allow them direct access to the company network from an unsecured computer. Also, tell them to start using their freaking laptops issued by the company. IT shouldn’t be bending over backwards to accommodate the low-end complaints users have about wanting to work from home their own way.<\/p>\n
If they want to work from home, they need to comply by company rules and use a VPN or RDP or their work laptops. Plenty of options there. Some users are just spoiled.<\/p>","upvoteCount":5,"datePublished":"2012-12-14T12:20:39.000Z","url":"https://community.spiceworks.com/t/security-concerns-for-remote-workers/182330/3","author":{"@type":"Person","name":"emilyf","url":"https://community.spiceworks.com/u/emilyf"}},{"@type":"Answer","text":"
In a word: no.<\/p>\n
Two words: hell, no!<\/p>\n
As the device isn’t controlled by any kind of coherent IT policy, no one knows if the pc has decent AV, if it is current on patches and updates, or even if it is password protected. How many regular people don’t even bother to encrypt their wi-fi?<\/p>\n
“Trust me, IT person, I know what I’m doing!”<\/p>","upvoteCount":5,"datePublished":"2012-12-14T12:24:01.000Z","url":"https://community.spiceworks.com/t/security-concerns-for-remote-workers/182330/4","author":{"@type":"Person","name":"neilhauser3772","url":"https://community.spiceworks.com/u/neilhauser3772"}},{"@type":"Answer","text":"
No home computer can have vpn access to your network.<\/p>\n
Yu can setup a terminal server with a secure connection, or a vpn solution where you can publish each user his own pc to connect to remotely, but “public” computer cannot have network access.<\/p>\n
If your users refuse to carry out their laptops home, buy them desktops, save the money and invest it in a good VPN solution (Juniper SSL VPN is my personal recommendation).<\/p>","upvoteCount":5,"datePublished":"2012-12-14T12:24:44.000Z","url":"https://community.spiceworks.com/t/security-concerns-for-remote-workers/182330/5","author":{"@type":"Person","name":"yasaf","url":"https://community.spiceworks.com/u/yasaf"}},{"@type":"Answer","text":"
Chaps - thanks for getting back to me.<\/p>\n
I completely agree in particular with the comment ‘Some users are just spoiled’. The users who are stamping their feet in this area are the same one’s that management has bent over backwards for, i.e.: They dont just have company phones, they have iPhone 4s. They don’t just have a laptop, they have brand new Sony Vaios, and in a few cases a second laptop (not worth explaining why here). When they have a deadline they can’t meet because they leave things to the last minute, they find some way of blaming their failures on one IT issue or another (though I have ironed most of these out since I started last year).<\/p>\n
Spoiled is right.<\/p>","upvoteCount":1,"datePublished":"2012-12-14T12:30:48.000Z","url":"https://community.spiceworks.com/t/security-concerns-for-remote-workers/182330/6","author":{"@type":"Person","name":"peter2750","url":"https://community.spiceworks.com/u/peter2750"}},{"@type":"Answer","text":"
Remote controlling their office machines is a great idea. However depending upon the capabilities of your VPN, you are also granting them access to your entire network.<\/p>\n
I would recommend a using Citrix XenApp/MS Terminal Services/MS Remote Desktop Services that would allow them access your corporate resources using a web browser. The interface presented would then offer them the Remote Desktop Client which they use to connect to their own computer.s. The advantage of this approach over a full VPN is that you can control remote drive mapping and remote printing among others. The Citrix/MS gateway isolates internal and external traffic and prevents direct access to your resources. And it you go this route, you need to be conscious of the need for additional authentication security over username and password. Token systems such as RSA Secure ID/SafeWord/McAfee OTP address this. You also need to consider that with this type of capability, your people may be more inclined to access your resources from public terminal and locations.<\/p>\n