Chapter 5. Configure remote access and mobility

More people are working away from their offices than ever before. They work from home, from hotel rooms, from airplanes, and from company branch sites. Those users need to be able to connect to their own desktop and the company network through secure virtual private networks (VPNs), and they need to be reconnected if the connection is lost. They need to connect using their own broadband connection, too, no matter the carrier or connection type. Finally, they need to work in various ways over the Internet, including from airplanes and via hotel Wi-Fi.

Beyond this, though, their mobile devices need to be protected in case of theft or sabotage. You need to be able to configure BitLocker and BitLocker To Go and configure the appropriate startup and recovery keys to do this. Those users will also need you to set group policies for using offline files and syncing and teach them how to best configure their machines with the most applicable power policies for any situation. There’s more, though, including understanding Windows To Go and offering it as an option when applicable.

Objectives in this chapter:

Objective 5.1: Configure remote connections

There are two remote connection options that we have already discussed in this book: Remote Assistance and Remote Desktop. To review those, refer to Chapter 3, and specifically Objective 3.4: Configure remote management. We’ll revisit some of that here, but not too heavily. Most of this objective focuses on remote authentication in various scenarios, Remote Desktop technologies, and the types of connections you can use, including VPNs and broadband.

Once users are connected to the network and authenticated on it (using any protocol or connection method you choose), the tasks required of you, the network administrator, shift. Now you must make sure that users are able to work effectively, both when they are connected to the network and when they aren’t. This involves configuring sync folders, work folders, offline file policies, power policies, and more. When users can’t or don’t want to carry a mobile device with them, you can also opt for Windows To Go. Windows To Go is basically Windows on a USB stick, with some limitations. You’ll learn about this and more in this section.

You can prevent data from being accessed when mobile devices (or hard drives) are lost or stolen. You can use the same technologies to protect against boot attacks, too, like rootkits. There are other ways to secure devices, though, by using group policies, preventing apps from obtaining a user’s location, encrypting data, using VPNs, and more. Here, you’ll learn only about BitLocker and BitLocker To Go and how to manage startup keys.

This section contains the solutions to the thought experiments and answers to the objective review questions in this chapter.

  1. Correct Answer: C

  2. Correct Answers: A, B, and C

  3. Correct Answer: D

  4. Correct Answer: C

  5. Correct Answer: B

  1. Correct Answer: B

  2. Correct Answers: A and B

  3. Correct Answer: D

  4. Correct Answer: A

  5. Correct Answer: D