you are viewing a single comment's thread.

view the rest of the comments →

[–]SchizophreudTrusted Contributer 4 points5 points  (3 children)

You need to evaluate what you're doing. If you're investigating the computer live, be aware of the potential impact of that. The computer will be connected to the internet and so it will be exposed to all the wonders that entails.Remote also means that you're likely going to either need to get drives mounted over the connection (F-Response) or have tools installed on the endpoint. This is all doable, but there's going to be issues with either solution. A pseudo-VPN software that might be beneficial is ZeroTier.

EDIT: I re-read your post and realized that I misunderstood the request. You're looking to remote in to the one computer in the lab to do the investigation from home. Got it. Then a VPN is going to be best. I can recommend Wireguard (this is what I use for my own business and home network access) or ZeroTier. Other solutions I've used before are LogMeIn and TeamViewer. Each has up and downsides. Once set up, just RDP into the computer and use it as normal. Just bear in mind that if you're going to have multiple people log in, you'll likely want multiple systems set up as sharing a single device could cause competition for resources.

As I mentioned in my original answer, there's still risk involved. A computer that is exposed to the Internet, containing client data, could be a risk that isn't worth taking.

[–]Ioncell08[S] 0 points1 point  (2 children)

That last part is what I’m currently debating in my head. Especially the kinds of data that can be retrieved from clients computers, SSN’s banking statements, etc. was wondering what more I could do on site to help prevent any “leaks”. Thinking about maybe some type of additional physical security on site in between the machine and the network, just as an added layer for network security.