• Recent
  • Unsolved
  • Tags
  • Popular
  • Users
  • Groups
  • Search
  • Register
  • Login
  • Recent
  • Unsolved
  • Tags
  • Popular
  • Users
  • Groups
  • Search
  • Register
  • Login

Abusing FOG as RMM (with public access)?

Scheduled Pinned Locked Moved
General
2
2
258
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • S
    Suzabi
    last edited by Apr 23, 2022, 8:05 AM

    Hello,

    we are using FOG for normal deployments right now (for a few days), but since the agent is able to deploy software and run scripts on the machines, we also abuse it as a RMM for software deployment and script executions.

    Since some machines are going in home offices, or used in public networks, or get stolen, we think about, making the FOG Server accessible from external, so that these machines also can connect to the Server, and get software, or a remote wipe.

    But the question is, is FOG safe to use, with an external connection?
    Is it built for scenarios like this, or is it better to use it only with an active VPN? But in this case, remote wipe would be impossible.

    I’m sorry if there is already a thread like this, I wasn’t able to find it, also the wiki wasn’t a 100% answer for me.

    Thank you!

    1 Reply Last reply Reply Quote 0
    • S
      Sebastian Roth Moderator
      last edited by Apr 23, 2022, 8:24 AM

      @suzabi said in Abusing FOG as RMM (with public access)?:

      Is it built for scenarios like this, or is it better to use it only with an active VPN? But in this case, remote wipe would be impossible.

      FOG was not designed with that scenario in mind. I would not suggest to run a FOG server facing the internet unless you know what you do - being able to secure the whole setup.

      I don’t think remote wipe will work because it needs PXE boot to start into such a task and it’s very unlikely someone sets things up in their own network after stealing a device.

      Using FOG behind a VPN is good practice if you have different locations. But you might think about using separate FOG servers as well because imaging across the internet can be a pain if connection speed is limited.

      Web GUI issue? Please check apache error (debian/ubuntu: /var/log/apache2/error.log, centos/fedora/rhel: /var/log/httpd/error_log) and php-fpm log (/var/log/php*-fpm.log)

      Please support FOG if you like it: https://wiki.fogproject.org/wiki/index.php/Support_FOG

      1 Reply Last reply Reply Quote 0
      • 1 / 1
      1 / 1
      • First post
        1/2
        Last post

      211

      Online

      12.0k

      Users

      17.3k

      Topics

      155.2k

      Posts
      Copyright © 2012-2024 FOG Project