Getting a handle on remote users

13.04.2006

First, you need to know what's out there. You can do this in two ways: manually or with automation. I recommend a combination of the two.

In the manual approach, you reach out to remote employees and ask them what they have on their systems. Do this in the form of a survey. Gather up your entire team and brainstorm what information you need, then turn that into a questionnaire. For instance, ask about software, hardware, memory, wireless networking, mobile devices and cell phone plans. Also make sure you ask users details about what security programs they have running on their machines. Do they have instant messaging installed? Finally, ask them what they download onto their computers: music, software, files? You can get more detailed and talk about firewalls or routers or other networking terms, but don't expect everyone to respond. They might not know what is in their network on that level. Keep your survey user-friendly so you can get the best possible view of the remote environment.

With the automated approach, you use discovery software that sits at the enterprise gateway to inventory computers as they try to come onto the network. These tools -- from BMC Software Inc., Consul, LANDesk Software Inc. and others -- are fantastic at quickly checking configurations, software versions, security status and other information about devices. They can tell you if a computer is lacking the appropriate security patches, etc., and keep that device from logging on until it gets updated. They can also assimilate information into reports so that you can see what software versions are up to date and what hardware needs to be retired.

However, there are often devices that never make it onto the network that you still need to know about. For instance, it's important to know if users have BlackBerries or other handhelds that access e-mail. There are security and compliance issues surrounding unprotected corporate data. You'll also want to know the effect on your mail server or other network devices from forwarding all those messages to the device (if it's not done through the Exchange Server or other centralized mode).

While cell phones may seem like they don't fall under the network team's purview, think again. More and more cell phones are also becoming vessels to send and receive data. This means that you need to know which users are employing their cell phones in this way. Also, if there are a bunch of remote users that have inflated rates for voice/data usage with the same carrier, and they are expensing those rates to the company, you might want to renegotiate a volume-discount plan.