Securing remote access service
Every organization that grants remote access privilege to its users should have provisions made to include this service in its security policy. Remote access can be a very useful service, but if certain security procedures are not properly implemented the organization can be at risk. The following are points to consider when implementing remote access:
A group account for remote access should be created in the NT domain. The user names included this group should be different from the network user names. An example is that the network administrator may want to prohibit network browsing for remote users. You can effectively create and implement a security policy by setting up a group account for remote access.
Dial-up passwords should be different from the network log-on passwords.
Selecting the callback radio button and including a telephone number can ensure authenticity for that user.
Users with dial-in permission should be given only certain hours to access the network if possible. This can reduce network bandwidth.
There should be multiple access lines for users who will be using remote access service. One of the telephone lines should be made available for network-administration purposes only. This can allow the network administrator to dial in periodically and monitor audit and security logs.
You should make sure that
- all users who are granted dial-in permission have updated antivirus scan engines installed.
Make sure you install the latest service pack update for Windows NT/2000.
About the author:
Adesh Rampat has 10 years experience with network and IT administration. He is a member of the Association of Internet Professionals, the Institute for Network Professionals and the International Webmasters Association. He has also lectured extensively on a variety of topics.
Did you like this tip? If so, (or if not) why not let us know. Send an e-mail to us and sound off. Or visit our tips page to rate this tip, or submit one of your own.
Secrets and Lies: Digital Security in a Networked World
Author : Bruce Schneier
Publisher : John Wiley & Sons
ISBN/CODE : 0471253111
Cover Type : Hard Cover
Pages : 432
Published : Aug 2000
Internationally recognized computer security expert Bruce Schneier offers a practical, straightforward guide to achieving security throughout computer networks. Schneier uses his extensive field experience with his own clients to dispel the myths that often mislead IT managers as they try to build secure systems. This practical guide provides readers with a better understanding of why protecting information is harder in the digital world, what they need to know to protect digital information, how to assess business and corporate security needs, and much more.
This was first published in March 2001