Look, we all knew it was coming, but now it’s official. Microsoft just handed middle managers the ultimate weapon. Their new update for Microsoft 365 allows companies to track exactly where you are, and the days of pretending to be at your desk are over.

    • thejml@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      23
      ·
      15 hours ago

      This is literally how our corporate network is setup. You MUST be on vpn or you cant get to anything. Makes the access permissions super simple. Prior to this setup there were authorization settings that differed between on-prem/off, on vpn or off, which office you were in, etc. now they just deny all unless you vpn in and then it uses your vpn account to validate access there, in one place. Saved a lot of headaches.

      • TipRing@lemmy.world
        link
        fedilink
        English
        arrow-up
        3
        ·
        15 hours ago

        That is certainly a direction. I hope you have robust redunacies on the concentrator.

        • rainwall@piefed.social
          link
          fedilink
          English
          arrow-up
          1
          ·
          edit-2
          6 hours ago

          The above is just modern network security. The model is called zero trust.

          Zero trust assumes there is no implicit trust granted to assets or user accounts based solely on their physical or network location (i.e., local area networks versus the internet) or based on asset ownership (enterprise or personally owned). Authentication and authorization (both subject and device) are discrete functions performed before a session to an enterprise resource is established. Zero trust is a response to enterprise network trends that include remote users, bring your own device (BYOD), and cloud- based assets that are not located within an enterprise-owned network boundary. Zero trust focus on protecting resources (assets, services, workflows, network accounts, etc.), not network segments, as the network location is no longer seen as the prime component to the security posture of the resource.

          Google pionerred it in the 2000s I believe, but its very normal now. A commom deployment will have an always on vpn agent on each device, which will then use mesh vpn tech like wireguard to do peer to peer connections between the client and server. There is no need for a central vpn controller. At most their is a dns-ish directory service that runs to let each agent queiry to get public keys for the other agents. Access is gated with RBAC and ACLs.

          Tailscale is well known name that provodes this model. Netbird is a FOSS example.

    • Creat@discuss.tchncs.de
      link
      fedilink
      English
      arrow-up
      2
      ·
      edit-2
      14 hours ago

      That really depends on how the VPN is setup and configured on the company side. And possibly how the applications it their servers are configured as well. In our case, absolutely nothing breaks and it just works.