thecomputerguy
Well-Known Member
- Reaction score
- 1,437
I have a Server 2012r2 DC setup with VPN connectivity and I'm just looking for best practice to get a user who connects locally onsite with a laptop then takes that laptop offsite to connect through the VPN.
1.) Should I use the same user account they logon locally with for also the VPN connection and just give that account dial-in access, and up the password complexity?
They will complain about having to type in a very complex password just to logon at work because I want high complexity for the VPN. Or should I make a separate user account call it... "jdoevpn", "jsmithvpn" etc, and use that account with a complex password for VPN for each user?
2.) Is it safe to allow the user to use their mapped drives through the VPN connection or should I remove mapped drives for remote users and just use UNC paths so that if they are hit with ransomware offsite they don't infect the mapped drive via the VPN?
1.) Should I use the same user account they logon locally with for also the VPN connection and just give that account dial-in access, and up the password complexity?
They will complain about having to type in a very complex password just to logon at work because I want high complexity for the VPN. Or should I make a separate user account call it... "jdoevpn", "jsmithvpn" etc, and use that account with a complex password for VPN for each user?
2.) Is it safe to allow the user to use their mapped drives through the VPN connection or should I remove mapped drives for remote users and just use UNC paths so that if they are hit with ransomware offsite they don't infect the mapped drive via the VPN?