F5F Stay Refreshed Power Users Networks No, Admin cannot see your identity while using a VPN.

No, Admin cannot see your identity while using a VPN.

No, Admin cannot see your identity while using a VPN.

Pages (3): Previous 1 2 3
D
DarckMoule
Member
160
04-14-2023, 03:32 PM
#21
Most organizations using Windows networks connected to a domain can distribute CA certificates. This enables them to manage their firewall certificates and perform SSL interception. It’s common that you received an agreement or a logon message indicating no privacy concerns. In addition to simplifying traffic decryption, administrators must oversee DNS settings. You can utilize services such as Blue Coat or OpenDNS to handle DNS and IP routing for a significant share of VPN/proxy activity. Endpoint protection solutions typically include monitoring tools to track employee usage. It’s also important to restrict foreign software installations. Relying on VPNs and proxies is not ideal for hiding traffic. Years ago, the primary method for inspecting internet traffic was using Squid with a basic interface. I noticed that most traffic from a single IP raised suspicion. I recorded workstation details and regularly added suspicious IP addresses to a blacklist. If the issue continued, I would escalate it to their supervisor. Their DNS queries still passed through our servers, and certain sites were accessed frequently. Also, browser caches didn’t help much. Therefore, I maintained a log of all intriguing DNS requests and scanned for large files (over 1mb) in cache. The safest approach to browsing without detection is using a mobile device—if it’s too small, bring along a tablet or laptop and share your connection from there. As an administrator, my main concern was excessive bandwidth usage, especially when our company relied on a limited T1 line. The only other concern was being monitored and having reports generated about computer activity.
D
DarckMoule
04-14-2023, 03:32 PM #21

Most organizations using Windows networks connected to a domain can distribute CA certificates. This enables them to manage their firewall certificates and perform SSL interception. It’s common that you received an agreement or a logon message indicating no privacy concerns. In addition to simplifying traffic decryption, administrators must oversee DNS settings. You can utilize services such as Blue Coat or OpenDNS to handle DNS and IP routing for a significant share of VPN/proxy activity. Endpoint protection solutions typically include monitoring tools to track employee usage. It’s also important to restrict foreign software installations. Relying on VPNs and proxies is not ideal for hiding traffic. Years ago, the primary method for inspecting internet traffic was using Squid with a basic interface. I noticed that most traffic from a single IP raised suspicion. I recorded workstation details and regularly added suspicious IP addresses to a blacklist. If the issue continued, I would escalate it to their supervisor. Their DNS queries still passed through our servers, and certain sites were accessed frequently. Also, browser caches didn’t help much. Therefore, I maintained a log of all intriguing DNS requests and scanned for large files (over 1mb) in cache. The safest approach to browsing without detection is using a mobile device—if it’s too small, bring along a tablet or laptop and share your connection from there. As an administrator, my main concern was excessive bandwidth usage, especially when our company relied on a limited T1 line. The only other concern was being monitored and having reports generated about computer activity.

X
xEIgoldo
Member
219
04-15-2023, 12:14 AM
#22
Mikesan is accurate. VPN data isn't concealed when an appliance breaks SSL with various cipher suites. Just take it for granted they can monitor your actions.
X
xEIgoldo
04-15-2023, 12:14 AM #22

Mikesan is accurate. VPN data isn't concealed when an appliance breaks SSL with various cipher suites. Just take it for granted they can monitor your actions.

Pages (3): Previous 1 2 3