Solutions

Secure Remote Management

Insecure or insecurely used remote access technology – mechanisms that most security teams assume pose little risk in reality offer an abundance of options for attackers to infiltrate enterprises. Once the system administrator has assigned who can remote control the clients using Active Directory or basic NT authentication, every time a remote connection is attempted, the Control logging in can be identified by their Active Directory account. Another useful feature of a Remote Control Client is event logging. Every Client should have the ability to log to the Windows Event Log or a network location any activity done to the Client machine during a remote session, in the event of an intrusion by a hacker, or just for general auditing purposes, it is important that these logs be accurate and easy to understand. If an unrecognized or outside Control attempts to make a connection to a Client machine, the Client will automatically prevent them from establishing a connection and log the event accordingly.