3

We're looking for something to monitor around 30 remote laptops that are constantly out on the road, never returning to base except for when there are serious hardware faults that need repairing. These laptops won't always be connected to the internet, they'll have mobile broadband and may work offline most of the time. They will be running a mixture of Windows XP, Vista and 7 and there is currently no server setup.

We're primarily interested in making sure that Windows Updates and antivirus updates are happening, and I guess we should also be monitoring remaining disk space, what software is installed and ideally hardware health. It might also be nice if we could gain remote access to perform work on them.

My main reason for wanting to monitor them is that it's going to be a real pain to get them back to base if anything goes wrong, so I want to be proactive in ensuring they last as long as possible.

Can you recommend what I should be monitoring to ensure a long life? What tools would you use to monitor and maintain these computers?

WheresAlice
  • 5,530
  • 2
  • 24
  • 20

5 Answers5

2

No servers? Sounds like a perfect case for Microsoft Intune, if it was available.

A Direct Access solution so they're always connected to the corporate network whenever they have internet access could be a nice alternative, but it will require a few servers and some infrastructure setup - and it only supports Windows 7.

Oskar Duveborn
  • 10,760
  • 3
  • 33
  • 48
  • That sounds absolutely perfect, however the beta status and the fact that we've quite a number of legacy XP machines is a big stumbling block. Might try it out though and see what I think longer-term. – WheresAlice Apr 20 '10 at 16:03
1

You're going to have to make compromises. You could enforce policy by having the users connect via VPN and then to the domain on the road.

This is unlikely to be infallible, as you will either prevent access to the device or be unable to enforce policy. It cannot be assumed that an Internet connection will always be available or have enough bandwidth available, which will be requisite to connect to your network. This is fine for policy enforcement but if updates are downloaded from servers on your network it could delay their installation.

For remote users on company equipment, we often join to the domain and have them connect to the VPN or plug in locally. These users are more often on site than not, however, which makes logistics less difficult.

Based on your requirements, the best approach will likely be to setup group policies that enforce your update policies and then have them get updates from Microsoft or the antivirus vendor, as it will be more flexible.

For remote access, you could use Remote Assistance.

I'd strongly encourage full disk encryption as well. True Crypt is a fantastic Open Source solution.

Warner
  • 23,756
  • 2
  • 59
  • 69
1

When it comes to remote support I would check out TeamViewer. It's free, and a bit ugly on the user-side but works great. I use it for a random hodgepodge of computers at my church. It works through NAT so you can always connect as long as the computer has internet. I just install TeamViewer Host on any computers I'll need access to.

Jason Taylor
  • 575
  • 1
  • 4
  • 13
1

Implement WSUS and set them to receive their updates from your WSUS server. The server can generate reports on who needs what update and who hasn't asked for updates recently.

As far as remote access goes, you can enable remote assistance and just use that over the internet. You can also use something like Crossloop or Teamviewer as a backup remote solution.

All of this can be done via group policy.

DrZaiusApeLord
  • 1,174
  • 2
  • 9
  • 18
  • I hadn't considered using our own WSUS server as a way of monitoring their updates, I was planning on using just Microsoft Update as a way of keeping our infrastructure pretty minimal. But you're right, it would be a good way of monitoring their updates. – WheresAlice Apr 20 '10 at 16:01
  • It doesn't seem wise to run WSUS over the Internet. – Warner Apr 20 '10 at 17:20
1

I'd just consider a machine that's out there "tainted", and not allow it to come back to the LAN without a cleanup (aka, reimage). Don't allow it direct access to work stuff, instead using remote desktop or similar. Give them a good way to keep data to be scanned and introduced back into the environment.

Why? This way you can let them do whatever they want with the laptops and don't have to worry about enforcement on them. The cost of reimaging will be painful if you aren't automating it, but you will :)

Bill Weiss
  • 10,979
  • 3
  • 38
  • 66
  • In this instance there is no home LAN as such, the only network they'd be connecting to is the office where they'll be fixed. And yes, we're careful with any machine coming in and assume it'll try infecting other machines. – WheresAlice Apr 20 '10 at 16:00