Unattend !link! Today

The Double-Edged Sword of "Unattend": Convenience vs. Risk

Most unattended remote tools require you to store a password (or a hash) on the local machine so the agent can "wake up" and accept a connection. If a bad guy gets local admin rights on that PC, they can often extract that password and use it to pivot into your entire network. unattend

Do you use unattended remote access in your business? Have you ever had a "scare" where you couldn't remember if you closed a session? Let me know in the comments below. The Double-Edged Sword of "Unattend": Convenience vs