ComputerWeekly.com

https://www.computerweekly.com/feature/Network-access-control-learning-guide

Network access control learning guide

By null

From PDAs and laptops to insecure wireless modems, Windows users have options for connecting to and infecting networks. Created in partnership with our sister site SearchSecurity.com, this network access control guide offers tips and expert advice on how to run a properly secured Windows network. Learn how to mitigate who can and cannot enter your network, how unauthorized users gain network access, how to block and secure untrusted endpoints as well as Windows-specific and universal access control policies and procedures.

Controlling network access

Securing remote access points

Remote access and security for remote users has become a hot topic for security professionals as telecommuting has grown in popularity. A horde of remote users adds a number of new security problems for Windows security admins, including endpoint security, VPN security and remote user education.

This growing list of security concerns is a treasure chest for potential hackers, as they can steal a user's notebook computer, hack into an insecure VPN or take advantage of uneducated users. In this section, pick up a few tips on how to ensure that your remote access security is as tight as possible.

Remote access security tips

Endpoint security tactics

Endpoint security is the security of physical devices which may literally fall into the hands of malicious users. Given the rapid growth of employees who use laptop computers, securing network endpoints has become of paramount concern for security administrators.

Traditional means of securing the endpoint are going by the wayside. A firewall alone is no longer enough to defend your network from the myriad threats that remote users, malicious hackers and the age of easy-access information have wrought. In the summer of 2006, a laptop containing personal data on nearly 30 million military veterans and active duty personnel was stolen from an employee of the U.S. Department of Veterans' Affairs. In April of 2007, a laptop containing information on 160,000 employees of Neiman Marcus was stolen. Follow the tips below to learn how to prevent such a disaster from befalling yourself and your users.

Endpoint security tips

Windows Firewall

Windows Firewall is Microsoft's overhaul of their previous firewall, Internet Connection Firewall (ICF). In general, according to Windows security expert Mark Minasi, a "firewall refers to any of a number of ways to shield a computer network from other networks." When one of the "other networks" includes the vast space of the internet, it becomes clear that a firewall is a necessary security tool for any Windows network.

Excerpts from Mark Minasi's book, "Mastering Windows Server 2003 Upgrade Edition for SP1 and R2" can be found in the tips below, along with a short series of tips and advice from our Windows security experts. Learn how to set up IPsec bypass, permit Ping, make server applications work with Windows Firewall and more.

Windows Firewall tips

VPNs

Virtual private networks (VPNs) allow remote employees to access their company's respective network. Of course, when a number of VPNs are run through the internet, several security questions are raised. Do my users need extra security? Does my network need extra security precautions? How easily can a hacker access my network through my employee's VPN connection?

While a VPN traditionally comes with its own extra precautionary security measures, that does not mean that a VPN does not create extra risk. Check out the tips below to learn how to give your VPN a penetration test and read a series of VPN quick tips.

VPN security tips

24 May 2007

All Rights Reserved, Copyright 2000 - 2026, TechTarget | Read our Privacy Statement