I assume we will receive an amount that is less than the cost of a good laptop.
What happens it the user's host system is compromised? Can't this in turn have deleterious effects on the virtual machine as well? Sensitive data will still need to be transmitted through a shared NIC.
I'd assume that the VM establishes an encrypted link (VPN?) with the server independent of the host, and maintains its own AV and the like. Not completely secure, but neither is anything else given to a user.
I assume you guys are using the Mandatory Access Protection feature that's baked in to Windows Server 2008 to do that stuff, in which case end users can get access to a provisional network with internet access to have updates and virus definitions loaded even if your VM is judged unfit for full intranet access.
That's one of the niftier things they put in Server 2008, but it still seems like a huge administrative headache to me.
Server 2008 manages that for Windows client systems, Handy.
I assume you guys are using the Mandatory Access Protection feature that's baked in to Windows Server 2008 to do that stuff, in which case end users can get access to a provisional network with internet access to have updates and virus definitions loaded even if your VM is judged unfit for full intranet access.
That's one of the niftier things they put in Server 2008, but it still seems like a huge administrative headache to me.
A VM is how I do remote work with my company. I install a corporate windows 7 image with all their security, VPN, patches, AV, etc and then just run it as a VM on my personal machine. It runs better/faster then any of the equipment provided to me for desktop or laptop usage. I'd rather my company give an allowance to build my own system. They are otherwise migrating people to a VDI solution for reduced cost and administration. The problem is, this doesn't work well for engineering.
I don't know what you mean. What does it manage?