bitlocker encryption when joining the domain but doesn’t ask for any sort of pin on start-up.
This is the worst possible combination ever. Not only the decryption key can be dumped from the memory by freezing the RAM with some canned air, once the TPM goes bad one can usually say goodbye to all the data on the laptop too. That’s how they did it in the corporation I used to work at and I hate Bitlocker from the bottom of my heart ever since.
I login/RDP to a server that needs MFA, RSA, and uses a rotating password. I put in the password/passcode 3 times to login. Then the screen locks after 5 mins of no activity and I have to repeat. I try not to use it, so dont be so secure that users find other ways to do things.
Security has to push security for the business, who else will.
My suggestion is to do a trial of some non-IT users and see how it goes.
It doesn’t, this is a case of knowing what OP needs vs what OP wants. Let’s go back to the text:
I’m considering rolling out 2FA to login to company laptops when outside of the office network and then again if the user wishes to VPN / Remote Desktop into the network.
What I read here is that there’s a question behind “is it acceptable for my users to authenticate multiple times?”. In general that problem is addressed by SSO - authenticate once (say, during login with MFA), and become authorized everywhere (domain, email, instant messaging, VPN, etc).
However, say one is left at an office where there are some negations on “business” taking place.
The user leaves their password on a sticky note attached to the screen (I’ve seen it, truly). Its not a huge stretch for someone there to login and look at emails or OneDrive files/folders. Or even if someone just wanted to be malicious.
Or someone at home, leaves the password around and the kids think it might be fun to login and have a look.
Sorry it was a really busy day today so my answer was pretty unhelpful. The other two guys that responded to you explained it in better detail and I concur.
Well the idea behind always on VPN is that the user doesn’t need to authenticate since it is certificate based, and their local computer that otherwise would not be off the network can function normally at startup and login.
Yea, and this is in environments where you’re lucky to have a managed switch AT ALL, let alone one that would support RADIUS or TACACS(+) that would support MFA.