D-Link DFL-2500 User Guide - Page 228

End Point Security for Company-owned Computers

Page 228 highlights

21.1. VPN Design Considerations 209 End Point Security for Company-owned Computers Important points that are often included in remote access policies include: • Anti-virus software is needed to be installed and updated through the remote connection. • Choose a multi-user operating system where the end user's capabilities may be restricted. • Do NOT set the VPN/dialup client to automatically remember shared secrets, dialup passwords, or certificates, unless access to such data is password protected using strong encryption. Any vendor claiming to be capable of securing such data without the user entering a password, using a smart card, or supplying any sort of information, is not telling the truth. • If the VPN client offers a method for remembering all passwords without having the user supply any information, disable that feature. If not, sooner or later, someone will check that checkbox, and if/when the portable computer is stolen, the thief has an open access route to the corporate network. • Apply and enforce the same policies as the in-house computers. Such policies usually include: - No software downloads from the Internet - No games - No lending the computer to friends and others • Schedule inspections of all portable/home computers to verify compliance with all of the above. This process can usually be automated to great extent and even carried out across the remote connection. A few simple script files will usually do to see that no additional software is installed and that registry keys containing values for remembering passwords etc have not been changed. • Keep data stored locally on portable computers to a minimum to reduce the impact of theft. This includes e-mail cache folders. Actually, it may be best if mail is read through a web gateway, since that leaves the least amount of files in local storage. D-Link Firewalls User's Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365

21.1. VPN Design Considerations
209
End Point Security for Company-owned Computers
Important points that are often included in remote access policies include:
Anti-virus software is needed to be installed and updated through the
remote connection.
Choose a multi-user operating system where the end user’s
capabilities may be restricted.
Do NOT set the VPN/dialup client to automatically remember
shared secrets, dialup passwords, or certificates, unless access to such
data is password protected using strong encryption.
Any vendor claiming to be capable of securing such data without the
user entering a password, using a smart card, or supplying any sort of
information, is not telling the truth.
If the VPN client offers a method for remembering all passwords
without having the user supply any information, disable that feature.
If not, sooner or later, someone will check that checkbox, and if/when
the portable computer is stolen, the thief has an open access route to
the corporate network.
Apply and enforce the same policies as the in-house computers. Such
policies usually include:
- No software downloads from the Internet
- No games
- No lending the computer to friends and others
Schedule inspections of all portable/home computers to verify
compliance with all of the above. This process can usually be
automated to great extent and even carried out across the remote
connection. A few simple script files will usually do to see that no
additional software is installed and that registry keys containing
values for remembering passwords etc have not been changed.
Keep data stored locally on portable computers to a minimum to
reduce the impact of theft. This includes e-mail cache folders.
Actually, it may be best if mail is read through a web gateway, since
that leaves the least amount of files in local storage.
D-Link Firewalls User’s Guide