Hi,

The consensus view of this list seems to be that relying on the encryption
built into Terminal Services connections is not good enough and that SSH or
VPN should be deployed to wrap such connections.

In the absence of this additional measure, the things a hacker would need to
obtain or circumvent to gain access to a practice datafile are:

1. The practice routers external IP
2. The port of the Terminal Services service on the router
3. The Windows user password
4. The practice software database password

Of these, (3) is likely to be the strongest roadblock for a determined
hacker.  

My question is, does Terminal Services have any provision for more beefed up
security natively e.g. Certificates, dongles, MAC address restriction, IP
restrictions etc?

In other words, are there any measures that can be deployed other than VPN
and SSH that can beef up the Windows/Terminal Services security.

Cheers,
Simon


_______________________________________________
Gpcg_talk mailing list
[email protected]
http://ozdocit.org/cgi-bin/mailman/listinfo/gpcg_talk

Reply via email to