none
How do I stop users from using the standard inbuilt VPN connection in Windows

    Question

  • We have a UAG Portal setup to check the security of users computers etc then if it is all correct they are presented with the log in and once logged in the are connected to the corpirate network via a SSTP connection.  The all works fine but the issue I have is users can bypass all the checking but just going into network connections on their local computer and creating a SSTP VPN connection, like on this webpage http://blogs.technet.com/b/tugait/archive/2011/10/12/how-to-publish-a-vpn-sstp-using-your-uag-in-a-https-trunk.aspx  

    Any idea how to stop users being able to do this and forcing them to use Internet Explorer?

    Monday, April 14, 2014 12:08 AM

Answers

  • Found my answer on this page  http://technet.microsoft.com/en-us/library/ee809077.aspx 

    "To enforce Forefront UAG portal authentication, do not set users dial-in properties to Allow access."

    • Marked as answer by Johnward Monday, April 14, 2014 6:27 AM
    Monday, April 14, 2014 6:26 AM