Securing remote access service

Securing remote access service
Adesh Rampat

Every organization that grants remote access privilege to its users should have provisions made to include this service in its security policy. Remote access can be a very useful service, but if certain security procedures are not properly implemented the organization can be at risk. The following are points to consider when implementing remote access:

  1. A group account for remote access should be created in the NT domain. The user names included this group should be different from the network user names. An example is that the network administrator may want to prohibit network browsing for remote users. You can effectively create and implement a security policy by setting up a group account for remote access.

  2. Dial-up passwords should be different from the network log-on passwords.

  3. Selecting the callback radio button and including a telephone number can ensure authenticity for that user.

  4. Users with dial-in permission should be given only certain hours to access the network if possible. This can reduce network bandwidth.

  5. There should be multiple access lines for users who will be using remote access service. One of the telephone lines should be made available for network-administration purposes only. This can allow the network administrator to dial in periodically and monitor audit and security logs.

  6. You should make sure that

    Requires Free Membership to View

  1. all users who are granted dial-in permission have updated antivirus scan engines installed.

  2. Make sure you install the latest service pack update for Windows NT/2000.

    About the author:
    Adesh Rampat has 10 years experience with network and IT administration. He is a member of the Association of Internet Professionals, the Institute for Network Professionals and the International Webmasters Association. He has also lectured extensively on a variety of topics.

Did you like this tip? If so, (or if not) why not let us know. Send an e-mail to us and sound off. Or visit our tips page to rate this tip, or submit one of your own.

Related Book

Secrets and Lies: Digital Security in a Networked World
Author : Bruce Schneier
Publisher : John Wiley & Sons
ISBN/CODE : 0471253111
Cover Type : Hard Cover
Pages : 432
Published : Aug 2000
Summary :
Internationally recognized computer security expert Bruce Schneier offers a practical, straightforward guide to achieving security throughout computer networks. Schneier uses his extensive field experience with his own clients to dispel the myths that often mislead IT managers as they try to build secure systems. This practical guide provides readers with a better understanding of why protecting information is harder in the digital world, what they need to know to protect digital information, how to assess business and corporate security needs, and much more.

This was first published in March 2001

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

Disclaimer: Our Tips Exchange is a forum for you to share technical advice and expertise with your peers and to learn from other enterprise IT professionals. TechTarget provides the infrastructure to facilitate this sharing of information. However, we cannot guarantee the accuracy or validity of the material submitted. You agree that your use of the Ask The Expert services and your reliance on any questions, answers, information or other materials received through this Web site is at your own risk.