Best Practice Guide CLEO Remote Access Services



Similar documents
CLEO Remote Access Services CLEO Remote Desktop Access User Guide v1.3

Default Domain Policy Data collected on: 10/12/2012 5:28:08 PM General

Remote Access Technical Guide To Setting up RADIUS

MN-700 Base Station Configuration Guide

A Guide to New Features in Propalms OneGate 4.0

Kerio Control. Step-by-Step Guide. Kerio Technologies

Using a Firewall General Configuration Guide

Windows Operating Systems. Basic Security

Guideline for setting up a functional VPN

Chapter 15: Advanced Networks

Remote Application Server Version 14. Last updated:

Citrix Access on SonicWALL SSL VPN

Chapter 8 Router and Network Management

Remote Application Server Version 14. Last updated:

Configuring SSL VPN on the Cisco ISA500 Security Appliance

Quick Installation Guide

Agency Pre Migration Tasks

Configuring Routers and Their Settings

MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features

University of Hawaii at Manoa Professor: Kazuo Sugihara

7 6.2 Windows Vista / Windows IP Address Syntax Mobile Port Windows Vista / Windows Apply Rules To Your Device

Remote Desktop How-To. How to log into your computer remotely using Windows XP, etc.

Building Networks For People. DIR-100 Ethernet Broadband Router User Manual

Domain 3.0 Networking... 1

FileMaker Server 15. Getting Started Guide

ACP ThinManager Tech Notes Troubleshooting Guide

SSL-VPN 200 Getting Started Guide

Sophos Enterprise Console policy setup guide. Product version: 5.2

Active Directory Group Policy. Administrator Reference

INSTALLATION AND CONFIGURATION GUIDE (THIS DOCUMENT RELATES TO MDAEMON v ONWARDS)

Small Business Server Part 2

The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client.

Section 12 MUST BE COMPLETED BY: 4/22

Step-by-Step Configuration

UIP1868P User Interface Guide

Wireless G Broadband quick install

Essentials of PC Security: Central Library Tech Center Evansville Vanderburgh Public Library

Canon WFT-E1 (A) Wireless File Transmitter. Network Support Guide

Security. TestOut Modules

Astaro Security Gateway V8. Remote Access via L2TP over IPSec Configuring ASG and Client

Chapter 3 LAN Configuration

DSL-2600U. User Manual V 1.0

Policy on Connection to the University Network

Barracuda Link Balancer Administrator s Guide

Chapter 4 Customizing Your Network Settings

DameWare Server. Administrator Guide

BT Business Total Broadband Fibre User Guide

Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses

How to Configure a DIR-120 Broadband Router

Kerio VPN Client. User Guide. Kerio Technologies

SATO Network Interface Card Configuration Instructions

Student Halls Network. Connection Guide

Configuration Manual English version

Using a VPN with Niagara Systems. v0.3 6, July 2013

Firewall VPN Router. Quick Installation Guide M73-APO09-380

Client Server Networks

Chapter 6 Using Network Monitoring Tools

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

Net Protector Admin Console

Dell SonicWALL SRA 7.5 Citrix Access

HP ProLiant DL320 Firewall/VPN/Cache Server User Guide

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure

E2BN Direct - Network Services for Schools and Academies

Freshservice Discovery Probe User Guide

Multi-Homing Dual WAN Firewall Router

How To Connect To Bloomerg.Com With A Network Card From A Powerline To A Powerpoint Terminal On A Microsoft Powerbook (Powerline) On A Blackberry Or Ipnet (Powerbook) On An Ipnet Box On

74% 96 Action Items. Compliance

SonicWALL PCI 1.1 Implementation Guide

Chapter 1 Configuring Internet Connectivity

Steltronic Focus. Main Desk Internet connection

Multifunctional Broadband Router User Guide. Copyright Statement

Windows 7, Enterprise Desktop Support Technician

Broadband Phone Gateway BPG510 Technical Users Guide

UCLH VPN User Guide. January VPN User Guide v

Connecting to the Internet. LAN Hardware Requirements. Computer Requirements. LAN Configuration Requirements

Quick Installation Guide

Chapter 6 Using Network Monitoring Tools

Quick Setup Guide. 2 System requirements and licensing Kerio Technologies s.r.o. All rights reserved.

Static Business Class HSI Basic Installation NETGEAR 7550

SMALL BUSINESS EDITION. Sophos Control Center startup guide

Getting Started. Symantec Client Security. About Symantec Client Security. How to get started

Catapult PCI Compliance

70-685: Enterprise Desktop Support Technician

Multi-Homing Security Gateway

Lab Configuring Access Policies and DMZ Settings

Wireless Broadband Router. Manual

Locking down a Hitachi ID Suite server

M86 Web Filter USER GUIDE for M86 Mobile Security Client. Software Version: Document Version:

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

Lab Configuring Access Policies and DMZ Settings

Quick Start Guide. WRV210 Wireless-G VPN Router with RangeBooster. Cisco Small Business

HomeNet. Gateway User Guide

How To Check If Your Router Is Working Properly

Chapter 4 Firewall Protection and Content Filtering

Konica Minolta s Optimised Print Services (OPS)

DEPLOYMENT OF I M INTOUCH (IIT) IN TYPICAL NETWORK ENVIRONMENTS. Single Computer running I m InTouch with a DSL or Cable Modem Internet Connection

Proof of Concept Guide

Chapter 7 Troubleshooting

FileMaker Server 13. Getting Started Guide

Windows Server 2008 R2 Initial Configuration Tasks

Transcription:

Best Practice Guide CLEO Remote Access Services A Guide to Preparing Your School Network & Remote Users PCs V 5.0 Published: October 2007 Please refer to www.cleo.net.uk for the most recently published version www.cleo.net.uk Page 1 of 21

1 Index 1 Index...2 1.1 Other Relevant Documents...2 2 Introduction - Managing the Technical Challenges & Risks...3 2.1 Development of this Best Practice Guide...3 3 Recommended Specification for School Servers and Remote PCs...5 3.1 School Server Minimum Specification...5 3.2 Remote PCs Minimum Specification...5 4 Recommended Configuration for School Network...7 4.1 DNS and DHCP Recommendations...8 4.2 Securing Wireless LANs...8 4.3 Network Administrator Passwords...8 5 Monitoring usage & performance...9 6 Best Practice Guide to up User groups...9 7 Preparing a client PC...9 7.1 Recommended PC/OS Specs... 10 7.2 Client Configurations... 10 7.2.1 Operating system updates... 10 7.2.2 Anti-virus software (installed and updated)... 10 7.2.3 Personal Firewall (installed and active)... 11 8 Remote Users Group Policies... 12 8.1 Remote Access VPN + RDP users policies... 12 9 Where to Seek Further Advice... 21 1.1 Other Relevant Documents The following list includes all documents and forms required for the CLEO remote access services. Please ensure you have read all documents relevant to the service you require: Documents relevant to all services: Introduction to CLEO Remote Access Services A Short Guide for Headteachers and Senior Managers Introduction to CLEO Remote Access Services A Detailed Guide to the Benefits and Risks for Headteachers and Senior Managers Best Practice Guide to Preparing Your School Network and Remote Users PCs CLEO Remote Access Services Terms & Conditions, and Acceptable Use Initial Enquiry Form Documents specific to individual services: Technical Guide Up RADIUS Technical Guide up CLEO VPN Technical Guide up CLEO Web Gateway Installation and User Guide WebDAV User Guide CLEO Remote Desktop Access (SGD) Technical Details Submission Form available online for each service www.cleo.net.uk Page 2 of 21

2 Introduction - Managing the Technical Challenges & Risks One of the strengths of the CLEO network is the protection it provides all schools connected to it, as they are part of a private network with strict security in place to protect all schools from viruses, trojans and security breaches wherever possible. However by opening the network to remote users, to meet the needs of schools in the region, instantly increases the risks to individual schools and their PC networks. With this in mind CLEO offers its remote access services to schools on an annual renewable basis and after schools have worked with their respective LA ICT Support services to ensure their schools networks are prepared for remote access. All initial applications are made through the LAs so they can discuss the issues with your school s ICT staff at an early stage. We strongly recommend that you implement the guidelines contained in this document, in particular with reference to the network diagrams and information described in section 4. These setups have been successfully demonstrated as good examples of structuring your network for use with CLEO remote access services. It is important to recognise the risks by enabling remote access to your school network and from an early stage. Key risk areas include: Risk / Issue Difficulty in ensuring that remote users apply security advice and take appropriate measures to protect the schools network while working remotely Network security risk of unauthorised access by users unknown to CLEO network or schools Probability of Management of risk occurrence High Specifically, CLEO Remote Management Service using VPN should only be used on remote users PCs that are owned and/or managed by the school. CLEO VPN should not be installed on personal home PCs High All school networks to employ best practice in security, defining remote user group access rights separately, ensuring all servers and remote PCs are up to date with system upgrades, fixes and patches. CLEO core systems will log access by remote users for security purposes. Logs will only be analysed by site for statistical purposes, but records of access by individuals e.g. date, time, site, IP address will be stored for recall for security breach purposes only (see privacy statement in Terms & Conditions ). Remote PCs using thevpn service to have personal firewall enabled also recommended for CLEO Web Gateway. CLEO reserves right at all times to suspend remote access services. Viruses attack network High All servers and PCs to have anti-virus software installed and systems put in place to ensure all software is up to date and that fixes are applied Best practice recommendations not followed by schools Medium Schools must work with LA ICT support services at an early stage and ensure they adhere to guidelines service only offered on school year cycle, before school has to reapply. Schools must ensure that their IT staff are confident in implementing the service as defined by CLEO. Software Licensing Medium Additional software licences may be required for remote PCs. Schools must check licensing www.cleo.net.uk Page 3 of 21

arrangements for any software used from home. Management of remote users Medium Who and when? Use of timed access periods to prevent issues such as interference with network backups etc Improperly secured wireless networks, either in school or at home Medium High We strongly recommend that CLEO remote access services are NOT used with wireless networks unless appropriate authentication and encryption are in place, especially when used in conjunction to access sensitive data such as admin networks. Schools must ensure appropriate measures are implemented. 2.1 Development of this Best Practice Guide This guide addresses some of the practical and technical issues that were identified during the pilot of the VPN solution. It describes: The recommended approaches to preparing your school network Required policies and optional policies Recommendation for setting and managing remote users PCs Common problems and their solutions It is not a detailed How to Set Up Remote Access please refer to the relevant technical guide for each service. www.cleo.net.uk Page 4 of 21

3 Recommended Specification for School Servers and Remote PCs The following lists the minimum specifications that CLEO know will work effectively for enabling remote access via each service to your school network. CLEO and both Lancashire ICT support and Cumbria CC ICT Support should be able to provide advice and support for schools wishing to implement remote access based on these minimum specifications (see also configuration section). For all other specifications both CLEO, its network providers and the LA ICT Support Services are only able to offer support based on best endeavours and cannot guarantee to help your school establish a remote access service. If this applies to your school, please consider whether the chosen service is essential to your requirements. You may be able to meet the requirements of your school using an alternative approach e.g. deploying the CLEO Web Gateway solution or for website hosting, by using the website hosting services offered by each Local Authority. 3.1 School Server Minimum Specification The minimum recommended specification for school servers to operate each service across CLEO is: For the CLEO Remote Management solution: For the CLEO Web Gateway and CLEO Remote Folder Access solution: Uses VPN connection. Windows 2003 or greater, either with or without ISA server Any currently supported Microsoft operating system, providing automatic updates are available. (When in Internet Explorer, go to Tools/Windows Updates and install the Critical Updates feature. Linux or similar, providing they are regularly updated For the CLEO Remote Desktop Access solution Windows 2000 or greater All servers must have a firewall in place. 3.2 Remote PCs Minimum Specification The minimum recommended specification for remote users PCs is: For the CLEO Remote Management solution: For the CLEO Web Gateway and CLEO Remote Folder Access solution: For the CLEO Remote Desktop Access Solution Minimum Windows 2000Pro, MS Windows XP Home or Pro operating systems Any recent browser Web browsers operating under Windows XP, Windows Vista, Red Hat Linux 3, 4 www.cleo.net.uk Page 5 of 21

Fedora Linux 5 or Mac OS 10.4. The browser will need to have Java Technology enabled and support HTTP, HTTPS and SSH version 2 or later www.cleo.net.uk Page 6 of 21

4 Recommended Configuration for School Network Many of the challenges in successfully establishing a remote access service to your school network across the CLEO network relate to ensuring the school network is designed and configured correctly. As a result of the trials carried out with the original pilot the following configuration is provided as an example of good practice when setting up the school network. This configuration should ensure that the remote access service will work and that it is setup securely: Network s, Network Attached to CLEO CLEO Switch. Port 1 connection to School switches. Port 10 Connected to Proxy Server. Port 24 Uplink to CLEO. Curriculum IP Address 10.x.y.1 Admin ip Address 10.v.w.1 Server 1. (Domain Controller 1). Statically assigned IP Address: 10.x.y.2 DNS Server: 10.x.y.2 DNS Forwarders: 10.64.0.2 10.96.0.2 Default Gateway 10.x.y.1 Domain: schoolname.lea.local Cachepilot Proxy Server. IP Address: 10.x.y.250 DNS Server 10.64.0.2, 10.96.0.2, Default Gateway 10.100.1.1 School Based Workstation. s Dynamically Assigned by DHCP. Dynamically Assigned IP Address 10.x.y.10 DNS Server: 10.x.y.2 (&10.x.y.3 if fitted) Default Gateway: 10.x.y.1 Domain: schoolname.lea.local Proxy Server set by autoconfiguration script http://wwwcache.cleo.net.uk/ School Based Workstation. s Dynamically Assigned by DHCP. Dynamically Assigned IP Address 10.x.y.10 DNS Server: 10.x.y.2 (&10.x.y.3 if fitted) Default Gateway: 10.x.y.2 Domain: schoolname.lea.local Proxy Server set by autoconfiguration script http://wwwcache.cleo.net.uk/ School Switches (at least 100Mbps) School Switch in second building Can be connected via fibre, radio, laserlink etc. DHCP Options: Address Range 10.x.y.10-10.x.y.199 DNS Server 10.x.y.2 Default Gateway 10.x.y.1 Domain: schoolname.lea.local Server2 (If Fitted). (Domain Controller 2). Statically Assigned IP Address: 10.x.y.3 If this server is fitted, it should also be running DHCP & DNS Servers, and the DNS Server setting on Server 1 should be configured as below: DNS Server 10.x.y.2, 10.x.y.3 DNS Forwarders 10.64.0.2, 10.96.0.2 Default Gateway: 10.x.y.1 Domain schoolname.lea.local DHCP Options Address Range 10.x.y.10-10.x.y.199 (Shared with server 1, Conflict avoidance enabled) DNS Servers: 10.x.y.2,10.x.y.3 Default Gateway: 10.x.y.1 Domain: schoolname.lea.local Wireless Access Point (If Fitted) IP Address 10.x.y.200 DNS Server 10.x.y.2 Default Gateway 10.x.y.1 See CLEO guidance on wireless security Network Printer (If Fitted) Ip Address 10.100.1.220 DNS Server 10.100.1.2 Default Gateway 10.100.1.1 www.cleo.net.uk Page 7 of 21

4.1 DNS and DHCP Recommendations These are a few pointers on setting up a Windows 2000 or 2003 domain at a CLEO connected site. Windows Active Directory is not entirely reliant on DNS for its correct operation: if you get you DNS configuration wrong on either of your servers or client PCs a range of very strange faults can occur. For extra fun these can be intermittent and transitory. 1. Have two domain servers acting as Domain Controllers and also have DNS installed. 2. Do NOT use your Internet domain name as your windows domain name. This will cause headaches if you ever want to do remote access. e.g. use <schoolname>.<lea>.local in place of <schoolname>.<lea>.sch.uk 3. The DNS service should be configured for Cumbria schools to forward all other enquires to the CLEO DNS servers 10.96.0.2 & 10.64.0.2. For Lancashire schools the settings are as follows: DNS 212.219.82.4 and secondary DNS 212.219.83.4 4. DHCP is a good idea for client PCs but ensure at the DHCP DNS settings are for your internal Windows DNS servers only. 5. Static Addresses are a good idea for servers - make sure your static DNS settings are for your internal Windows DNS servers only. These points are particularly important if your are running a firewall like MS ISA or Censor- Net box. 4.2 Securing Wireless LANs As part of the process of setting up your school network you should also take into account security of wireless LANs. Whether or not you are enabling remote access at your school it is essential that wireless LANs are properly secured. Please ensure you adhere to the security recommendations and instructions provided by the manufacturer of the equipment. You may also wish to refer to the BECTA website and the JANET website for helpful guidance and a range of useful reference documents: http://www.becta.org.uk/corporate/corporate.cfm?section=8&id=146 http://www.ja.net/development/wireless/nw-admin.html Please remember that it is essential that you provide advice to staff to help them secure home wireless access points before enabling CLEO VPN remote access. If you have any doubts about how to set up your wireless network securely please contact your Local Authority Schools ICT Support Service for advice. 4.3 Network Administrator Passwords Security of passwords is absolutely essential in designing a network to follow best practice principles. The following guidance should always be adhered to: Network administrators must never login in over remote access links using the administrator password, including from another PC within the school. www.cleo.net.uk Page 8 of 21

High level users usernames must never identify themselves as high level users e.g. bob-admin Network administrator passwords and other essential passwords should be stored securely, preferably in the school safe. Passwords should follow guidelines for creating strong passwords. See the Microsoft website for more information: http://www.microsoft.com/athome/security/privacy/password.mspx 5 Monitoring usage & performance An important part of the pilot was to evaluate the level of use, periods of high demand, how the service was used, etc Use of the service will continue to be monitored by CLEO for security and performance purposes. The level of monitoring will be as follows: Recorded Purpose Stats Successful authentications Determine usage Unsuccessful authentications Aid support groups, security Client information (OS, etc ) Aid support groups Duration, start, end of connection Determine usage Key: recorded not recorded Statistical information developed from monitoring will not identify individuals, and may be made available from the CLEO web site. 6 Best Practice Guide to up User groups Careful consideration should be made of which users are provided with remote access and when. For ease of support both within individual institutions, it is recommended that access is provided in a staged fashion. This sort of rollout should allow any issues to be resolved with end users, by providing them with support in a controlled way. A typical rollout might be as follows: a. School ICT Technicians and Network/System Administrators b. ICT Coordinators, IT motivated and experienced users c. Staff issued with machines maintained/managed by school 6.1 Essential Recommendations for Remote Users Remote access using the VPN solution MUST NOT be set up on remote users personal PC equipment please restrict use to school owned PCs or Laptops for Teachers PCs. Please ensure you include the following advice for remote access within your schools ICT acceptable use policy: www.cleo.net.uk Page 9 of 21

For security reasons, staff must not access any of the remote access services from a publicly accessible PC such as a library or internet café based machines. In addition the pilot demonstrated that the VPN solution is generally considered unsuitable for pupils and therefore it is also strongly recommended that pupils are not given VPN access. A new web interface solution is currently being developed to specifically address the requirement for pupil access to school networks. If your pupils will only need access to a school hosted VLE we recommend the CLEO Web Gateway solution instead. For more information on recommended user groups, please refer to the Technical Guide to Up RADIUS 7 Preparing a Client PC Having prepared the servers within your institution to support remote access, then remote client PCs also need to be prepared. The following are some best practice guidelines. 7.1 Recommended PC/OS Specs It is recommended for each remote access service that a remote PC should be home broadband connected (minimum 512K ADSL broadband) and be running Windows XP SP2. To protect your institutions network and that of CLEO any PC being used for remote access must have comply with the following: 7.2 Client Configurations The following requirements are also defined within the CLEO Remote Access Services Terms & Conditions and Acceptable Use. Enforcing such requirements when the PC is not on the premises of an institution requires careful consideration. Schools should develop suitable administration and management procedures to ensure that staff, teachers and/or pupils accessing facilities in the school using remote access are adequately supported and have sufficient information to minimise the risks involved. All remote users must agree to follow the acceptable use policy and security guidelines. 7.2.1 Operating system updates The operating system of all remote PCs must be kept patched and updated (Windows Update and Windows Software Update Service), to ensure it is protected against known exploits and ensure the most stable platform possible. See Windows Software Update Service guide. 7.2.2 Anti-virus software (installed and updated) Both Local Authorities have licensing deals with Sophos that allow teachers and support staff to install Sophos Anti-virus on school PCs and Laptop for Teachers PCs at no additional cost. An install package configured to automatically update from outside of the CLEO network will be made available. See the Installing Sophos Anti-virus on a Standalone PC guide available from your Local Authority ICT Support service. www.cleo.net.uk Page 10 of 21

7.2.3 Personal Firewall (installed and active) It is recommended that all PCs connecting to the internet through an ISP have a personal firewall installed. For Windows XP users this can be easily be achieved by apply Service Pack 2 and configuring the Windows Firewall. However the Windows Firewall is quite basic, it only inspects inbound packets to determine whether they are solicited or unsolicited. Solicited packets are allowed through, unsolicited are dropped. This is adequate protection for a clean system, but if a Trojan or virus has already established itself on the system then it will still allow the virus to broadcast itself. There are many other firewall solutions available, with much more sophisticated features. Often these are available from Anti-virus vendors such as Symantec. 7.2.4 Spam filtering Use spam filtering services. Most Internet Service Providers (ISP) offer the option of spam filtering, Whilst this will probably not stop all the spam coming through, it will greatly reduce it and lessen the risk of your PC being infected by a virus. 7.2.5 Wireless Network Encryption Wireless connections must be encrypted and should be set to use WPA2 encryption rather than the older WEP standard. If you are unsure of what level of encryption is being used please use a cable. 7.2.6 Phishing Filters Turn on phishing filters on the web browser to reduce the risk of phishing attacks 7.2.7 Anti-Spyware installed Use an anti-spyware program to detect spyware, Windows Defender from Microsoft is available as a free download and is built in to Windows Vista. www.cleo.net.uk Page 11 of 21

8 Remote Users Group Policies The following grids illustrate recommendations for remote users and remote computers policies: 8.1 Remote Access VPN + RDP users policies If you are enabling either remote desktop or terminal services with your school domain, the following policies will help reduce risks associated with these services: DOMAIN hide all Computer Configuration ()hide Windows shide Security shide Account Policies/Password hide Enforce password history 6 passwords remembered Minimum password length 8 characters Password must meet complexity requirements Store passwords using reversible encryption Disabled Account Policies/Account Lockout hide Account lockout duration 30 minutes Account lockout threshold 10 invalid logon attempts Reset account lockout counter after 30 minutes Local Policies/Audit hide Audit logon events Success, Failure Administrative Templateshide Network/Network Connections/Windows Firewall/Domain Profilehide www.cleo.net.uk Page 12 of 21

Windows Firewall: Allow ICMP exceptions Allow outbound destination unreachable Allow outbound source quench Allow redirect Allow inbound echo request Allow inbound router request Allow outbound time exceeded Allow outbound parameter problem Allow inbound timestamp request Allow inbound mask request Allow outbound packet too big Windows Firewall: Allow local program exceptions Windows Firewall: Allow remote administration exception Allow unsolicited incoming messages from: [domain controllers] Syntax: Type "*" to allow messages from any network, or else type a comma-separated list that contains any number or combination of these: IP addresses, such as 10.0.0.1 Subnet descriptions, such as 10.2.3.0/24 The string "localsubnet" Example: to allow messages from 10.0.0.1, www.cleo.net.uk Page 13 of 21

local subnet or on the 10.3.4.x subnet, type the following: System/Group hide Internet Explorer Maintenance policy processing User Group loopback processing mode Mode: Disabled Merge System/Remote Assistancehide Offer Remote Assistance Permit remote control of this computer: Allow helpers to remotely control the computer Helpers: administrators Solicited Remote Assistance Permit remote control of this computer: Allow helpers to remotely control the computer Maximum ticket time (value): 1 Maximum ticket time (units): Hours Method for sending e-mail invitations: Mailto Windows Components/Windows Messengerhide Do not allow Windows Messenger to be run www.cleo.net.uk Page 14 of 21

Do not automatically start Windows Messenger initially Windows Components/Windows Updatehide Allow Automatic Updates immediate installation Configure Automatic Updates Configure automatic updating: 4 - Auto download and schedule the install The following settings are only required and applicable if 4 is selected. Scheduled install day: 0 - Every day Scheduled install time: 09:00 No auto-restart for scheduled Automatic Updates installations Specify intranet Microsoft update service location Set the intranet update service for detecting updates: http://sus0.cleo.net.uk Set the intranet statistics server: http://sus0.cleo.net.uk (example: http://intranetupd01) User Configuration (Disabled)hide Windows shide Internet Explorer Maintenancehide Connection/Automatic Browser Configurationhide Automatically detect configuration settings Disabled Automatic Browser Configuration www.cleo.net.uk Page 15 of 21

Interval Every 10 minutes Auto-config URL (.INS file) Auto-proxy URL (.JS,.JVS, or.pac file) http://wwwcache.cleo.net.uk/ URLs/Important URLshide Name URL Home page URL http://www.cleo.net.uk/ Search bar URL Not configured Online support page URL Not configured RDP hide all Computer Configuration ()hide Administrative Templateshide Network/Network Connections/Windows Firewall/Domain Profilehide Windows Firewall: Allow local port exceptions Windows Firewall: Allow Remote Desktop exception Allow unsolicited incoming messages from: [Curric 10.x.y.0/z],[Admin 10.x.y.0/z],[remote 10.x.y.0/z] Syntax: Type "*" to allow messages from any network, or else type a comma-separated list that contains any number or combination of these: IP addresses, such as 10.0.0.1 Subnet descriptions, such as 10.2.3.0/24 www.cleo.net.uk Page 16 of 21

Example: to allow messages from 10.0.0.1, 10.0.0.2, and from any system on the local subnet or on the 10.3.4.x subnet, type the following: Windows Firewall: Protect all network connections System/Group hide User Group loopback processing mode Mode: Merge Windows Components/Terminal Serviceshide Allow users to connect remotely using Terminal Services Always show desktop on connection Disabled Deny log off of an administrator logged in to the console session Do not allow local administrators to customize permissions Remove Disconnect option from Shut Down dialog Restrict Terminal Services users to a single remote session www.cleo.net.uk Page 17 of 21

Sets rules for remote control of Terminal Services user sessions Options: No remote control allowed Start a program on connection Program path and file name http://www.cleo.net.uk/remoteaccess/tcs.html Working Directory Windows Components/Terminal Services/Clienthide Do not allow passwords to be saved Windows Components/Terminal Services/Client/Server data redirectionhide Allow audio redirection Allow Time Zone Redirection Disabled Do not allow client printer redirection Do not allow clipboard redirection Do not allow COM port redirection Disabled Do not allow drive redirection Do not allow LPT port redirection Do not allow smart card device redirection Do not set default client printer to be default printer in a session Terminal Server Fallback Printer Driver Behavior When Attempting to Find a Suitable Driver: Do nothing if one is not found. www.cleo.net.uk Page 18 of 21

Windows Components/Terminal Services/Sessionshide Set time limit for disconnected sessions End a disconnected session 5 minutes Sets a time limit for active but idle Terminal Services sessions Idle session limit: 30 minutes Sets a time limit for active Terminal Services sessions Active session limit : 2 hours Terminate session when time limits are reached User Configuration ()hide Administrative Templateshide Windows Components/Terminal Serviceshide Sets rules for remote control of Terminal Services user sessions Options: No remote control allowed Start a program on connection www.cleo.net.uk Page 19 of 21

Program path and file name http://www.cleo.net.uk/remoteaccess/tcs.html Working Directory Windows Components/Terminal Services/Clienthide Do not allow passwords to be saved Windows Components/Terminal Services/Sessionshide Allow reconnection from original client only Set time limit for disconnected sessions Disabled End a disconnected session 5 minutes Sets a time limit for active but idle Terminal Services sessions Idle session limit: 30 minutes Sets a time limit for active Terminal Services sessions Active session limit : 2 hours Terminate session when time limits are reached www.cleo.net.uk Page 20 of 21

9 Where to Seek Further Advice Technical support for the CLEO remote access services is provided by each of the Local Authority ICT School Support Services. All requests for CLEO remote access services are coordinated through these services if you have any queries during the setup process and preparation of your network they will be able to provide advice. Please note that, although the CLEO remote access services are free and the LA Schools ICT Support Services will advise you on the settings required they may charge for any additional work requested to assist you in preparing your network. Cumbria Schools Jeff Haslam Tel: 07967-050356 Email: jeff@cict.org.uk Lancashire Schools The Westfield Centre Tel: 01772-623222 Fax: 01772 621209 Email: call.centre@westfield.lancsngfl.ac.uk www.cleo.net.uk Page 21 of 21