@deepthoughts10 I can’t see the original post anymore. I was probably too harsh and got blocked… happy to have this discussion but I’ll probably stop tagging @chrismerkel after this one.
So basically IIRC the original post was something along the lines that it’s hard to distinguish legitimate users from attackers because everyone’s using VPNs, so ban access from consumer #VPN.
Which to me is basically the same as saying you should ban #encryption because bad guys use encryption.
As to your question, #remoteaccess to the business network and services should only be done through the corporate VPN (or other authenticated access). You shouldn’t have corporate services (other than VPN/remote access) accessible from *anywhere* outside of the corporate network. So I assumed the OP was referring to customers or users.
Banning VPN access is not an effective way to prevent attacks because attackers can use many other techniques to obscure their IP address not just VPNs. For example using a VPS or other cloud service. There are even ways to get legitimate residential IP addresses.
Preventing attacks is pretty complex and it really depends what sort of attack you’re trying to block, but in general attackers behave differently from users. Detecting and blocking those behaviours is more effective than trying to block tools like VPNs.
What are your thoughts?