6/11/2023 0 Comments Advantages of using teamviewer vpnWith VPN you're putting a machine outside the network on your network over a secure tunnel so that machine can access resources as if they were on the inside. If you think about it, what are you doing with TeamViewer that is different than VPN? You're allowing someone to jump into a machine already on your network, fully connected to everything there, so they can use that machine as if they were sitting at the console. You can choose to allow Windows authentication when connecting with TeamViewer as well. And they'd have to know the TeamViewer id of the pc to which they are needing to connect. This requires the unattended access password be installed when TeamViewer is setup and installed. The options are still there to register the client to your TeamViewer corporate account, allow the option for QuickSupport if you want to use it, etc.īut if you want users to be able to connect to a pc on your network running TeamViewer, that would mean you would have to setup unattended access. With a custom host module, the meeting functionality is stripped out, and the contacts and computers menu is no longer available. With TeamViewer, one thing you can do for your endpoints is deploy a customized host module to which you can then apply policies (like don't show the password on screen that an external party could use to connect, etc.). Sure not all firewalls are great in this role, but some are really doing a pretty good job. employees may access the mail server, while partners can not).īut when you want to control it, know from one central point, who was when connected and what resources he has accessed, than Teamviewer and SSH simply don't give you the same insight as you have on a modern firewall, acting as a VPN gateway. Also you wouldn't give access to the same resources to all of your VPN users, but limit them by users and groups (e.g. If you don't trust them for a VPN connection, than you probably wouldn't trust them for any other kind of remote connectivity as well. However, isn't that just a firewall issue? I've heard the argument against so many times I started wondering if there was some security vulnerability that I wasn't aware of.It depends who is 'them' - it is supposed to be a list of your own employees and certain trusted partners, you have allowed VPN access rights. The big argument I keep hearing that VPN exposes "you to them and them to you".
0 Comments
Leave a Reply. |