For the most part we have addresses the needs of our sales force on a case by case basis but going forward we really need to ensure we have a defined policy to streamline remote access. To accomplish this there are a few benchmarks we need to achieve. First of all the network has to be reliable or in more technical terms it needs to have high availability. Most importantly we need to make sure that the network is secure as much as it is possible with all the different types of users asking for access. Lastly, we need to address how we handle employees using personal or non-company issued computers and how we ensure that those machines meet of other remote access policies.
Network Policy Server (NPS)
Windows Server 2012 is designed to seamlessly manage remote network access and has a few services to help us better manage the process. The first service to become familiar with is the Network Policy Server of NPS. NPS in its most basic function is the series of permissions the servers use to grant access or authentication. Once configured these access policies or groups can be pushed out to our users.
There are three main policies that NPS deals with. The first is connection request polices. This policy “establishes a set of conditions settings used for authentication, authorization, and accounting” (Regan, 2013). The connection request determin...
... middle of paper ...
...e that may not meet the health quality standards of network access. This will also alleviate the needs for those employees to bring the physical devices into the office or the need for it to travel to their locations.
Remote access is a tricky concept to comprehend mostly due to the complexity of all of the different steps and process that all have to work together to ensure secure connections. The number one priority for any company is to make sure networks are secured. With a good portion of our workforce working remotely it can make that task even more difficult. To make sure that our employees devices whether company issued or personal are healthy enough to make those connections we use the NAP functionality of Windows Server 2012 to ensure compliance.
Regan, Patrick. (2013). Administering Windows Server 2012. Hoboken, NJ:
John Wiley & Sons, Inc.
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- Introduction Micro Widgets, Incorporated is a dynamic organization constantly looking to expand its customer base. To do so, the company utilizes the skills of a mobile sales force. Being mobile, the sales force requires access to the corporate network from time to time while on the road. The Chief Information Officer (CIO) issued a mandate that all employees of the organization have remote access to the corporate network. This enables the sales force to do their job. It also affords the company the ability to offer the benefit of working from home to the employees of the organization.... [tags: micro widgets, access from a distance]
1289 words (3.7 pages)
- Introduction Remote access can be clearly defined as one’s ability to gain computer or network access from a remote location. Today many business people who travel often need to have remote access to their corporation's network. There is however vulnerabilities that all types of remote access have common, and it doesn’t matter what method used, the endpoint machine is vulnerable like all other systems that have access to the Internet. Whenever a system is accessible via the internet, that system is exposed to danger.... [tags: Computer, Network Access, Remote Location]
1331 words (3.8 pages)
- Introduction According to Dubrawsky and Faircloth, remote access denotes to the ability to access a computer, for instance, an office network computer or home computer, from a remote location. This permits personnel to work offsite, for example at home, or any other location, while employees still have to a distant network or computer. Remote access can be implemented by use of wide area network (WAN), local area network (LAN) or virtual private network (VPN). Either of these implementations allows access of systems and resources (Dubrawsky & Faircloth, 2007).... [tags: Virtual private network, Computer network, Wi-Fi]
1010 words (2.9 pages)
- Remote Access Solutions Remote access Remote access is defined as the ability of a user to log onto a network from a distant location. This is accomplished with a remote computer connected to the distant network. Whereas remote control refers to taking control of another computer, remote access means that the remote computer becomes a work station on the network. Communication between the network facility equipment and the remote computer is accomplished through a data link. The only difference between a remote user and workstations connected directly to the network is slower data transfer speeds.... [tags: Networks Telecommunications]
1444 words (4.1 pages)
- Remote Control Software Used in a Local Area Network Introduction Remote control software can solve many of the problems that an administrator or user can encounter on a local area network. Using a remote-control program, one can access a PC remotely to exchange files between systems, run applications, take control of a client PC or server in order to troubleshoot a problem, and much more. Remote-control software is an application that you install on two PCs that permits one system (the guest) to connect with and control another (the host).... [tags: Remote Control Software Technology Essays]
8706 words (24.9 pages)
- Starting from left to right on the diagram, I will discuss the security policies related to the Data Center/Server Farm/Network Security and assuring information confidentiality, integrity and authorized accessibility, followed by the mechanisms necessary to implement the aforementioned policies. Secure remote access must be implemented; no remote access for administrators. Authorized Users shall protect their login and password, even from family members. It is the responsibility of employees with VPN privileges to ensure that unauthorized users are not allowed access to our internal networks.... [tags: Security, Computer security, Access control]
1061 words (3 pages)
- ... Challenges One issue that was of particular importance to the bank was ensuring that files on its internal network could only be accessed by authorized employees. Another focal point for enhancing access security was providing employees remote access to the network nationwide. The Key challenges were: • Secure remote access for all employees • Convenient Solution for End-users • Centralize solution • Enable Mobility (Globalization and mobility of the workforce) Besides above in the previous setup NiB was running remote access VPN through ISA server which is resided in the inside network (Enterprise LAN) and with Windows based authentication through username and password.... [tags: NIB bank, infrastructure, remote access]
622 words (1.8 pages)
- Remote Network Administration for the Home and Small Office User Remote network administration is a fast growing and widely used technology in the IT field today. It gives system and network administrators as well as home users the ability to fix problems, allow or deny access to websites, download information directly from another computer, and give program permissions for different users from the office that they are at or from anywhere in the world that has an internet connection. With this very powerful technology, come some very significant problems such as securing remote access sessions via data encryption, the use of Virtual Private Networks (VPN’s) and a vast amount of networking a... [tags: Design and Technology]
1162 words (3.3 pages)
- Network Design Network Design is very important when it comes to implementing a connection between a computer and a server. According to Network world Websites, Network is defined as a “connected collection or devices and end systems, such as computers and servers, that can communicate with each other”(McQuerry). Network carry data in many types of environment, such as homes, small businesses, and large enterprises. Network Locations Is one of the major factors. There are different types and locations of network exist, including network in a home or home office to communicate through the Internet, to locate information, to place orders for merchandise, and to send message to frie... [tags: connection, computer, server]
1270 words (3.6 pages)
- An Introduction Until recently, reliable communication has meant the use of leased lines to maintain a Wide Area Network (WAN). Leased lines, ranging from Integrated Services Digital Network (ISDN, which runs at 144 Kbps) to Optical Carrier-3 (OC3, which runs at 155 Mbps) fiber, provide a company with a way to expand their private network beyond their immediate geographic area. A WAN has obvious advantages over a public network like the Internet when it comes to reliability, performance, and security, but maintaining a WAN, particularly when using leased lines, can become quite expensive (it often rises in cost as the distance between the offices increases).... [tags: Computer Network Technology]
1443 words (4.1 pages)