Remote access security in Windows 10

Introduction

One of the most ubiquitous forms of technology in the business world today is remote access technology. Just like other areas of IT, security for remote access technology is essential to keep attackers at bay and to protect sensitive information and organization network resources. Thankfully, the founding engineers of remote access wove security into this technology as a matter of course. 

This article will provide a high-level look at remote access security in Windows 10 environments. We will specifically address how to configure VPN in Windows 10, using secure protocols in Windows 10 and how to use Microsoft DirectAccess. 

What is remote access?

Remote access refers to the ability to remotely access a computer or network through a network connection remotely. A quick Google search will show you that there are countless proprietary solutions for remote access, but you should know that Windows 10 offers some in-built remote access solutions that are worth knowing about. 

Windows 10 features three remote access solutions: Virtual Private Network (VPN), Remote Desktop Protocol (RDP) and Microsoft DirectAccess. 

How to configure VPN

VPNs are near essential in many organizations. They allow users to connect to a private network from outside of the network. VPNs are used for different reasons, including allowing employees to connect to their organizations network from home and hiding internet activity, just to name a few. One of the best things about a VPN is they can turn an insecure connection into a secure one. 

Rumors have circulated for years about VPNs being hard to use — this is false. Premier VPN services make using their service easy, often with just one click (including configuration). Those who want to DIY with a VPN they get from either work, school or a friend will have to manually (Read more...)

*** This is a Security Bloggers Network syndicated blog from Infosec Resources authored by Greg Belding. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/8gz6kis18R4/