Information Technology Reference
In-Depth Information
FIGURE 3-66 The Remote Access Setup Select A Certificate dialog box
Thought experiment
Configuring two-factor authentication
In this thought experiment, apply what you've learned about this objective. You can
find answers to these questions in the “Answers” section at the end of this chapter.
You are the network administrator for TreyResearch.net. You're migrating from
purely VPN remote access to primarily DirectAccess for remote access, with VPN for
fallback only.
The sensitive nature of much of the research data that users work with is a com-
pelling driver in the move to DirectAccess. You want to be sure that you can
remotely manage the computers that are connecting to your network and that
those computers are meeting all company policies.
1. You want to include two-factor authentication in your rollout of DirectAccess. What
are the choices available, and what are the factors favoring each? What hardware or
software considerations does your choice of two-factor authentication entail?
2. Because you intend to keep VPN available as a fallback option, what changes can
you make to ensure that VPN also works with two-factor authentication? What
other suggestions do you have for improving the security of the VPN fallback?
 
Search WWH ::




Custom Search