0121 222 5630

Email Aristi Ltd Follow Aristi Ltd on Facebook Follow Aristi Ltd on Twitter Follow Aristi Ltd on LinkedIn

Insights and Updates.
Made for you.

You are here:
Posted on Friday, 24 April 2015

Microsoft DirectAccess – Secure Remote Access Solution.

Written by

Microsoft DirectAccess in Windows 7 and 8.1 have both been certified as meeting the equivalent of Foundation Grade requirements, as described in the IPsec Client SC CESG document.

With many organisations moving towards a mobile and flexible working strategy, the need for secure remote access is ever increasing. Implementing a secure solution that is not only certified by CESG for PSN, convenient and easy to use for businesses, is a cost effective solution, and at the same time upholds confidentiality, Integrity and availability is always going to be a challenge.

Welcome DirectAccess.

Microsoft DirectAccess in Windows 7 and 8.1 have both been certified as meeting the equivalent of Foundation Grade requirements, as described in the IPsec Client SC CESG document, when using DirectAccess to connect to Windows Server 2012 R2. This means that DirectAccess can be used by government office’s for OFFICIAL and OFFICIAL-SENSITIVE business.

Microsoft’s DirectAccess remote access technology allows for a secure seamless and transparent always on network connection back to the corporate environment. It uses a collection of widely deployed industry standard protocols for its connection. Authentication occurs at several stages of the multi-tunnel IPSec connection and uses a combination of digital certificates, NTLM and Kerberos. Clients are configured through group policy. A specific set of CPA customisations are needed to configure DirectAccess in order to be compliant in CESG assured manner.

DirectAccess commonly already falls under many organisations ‘Microsoft Premier Agreement’ making it a cost effective viable solution to deliver. However you should always check with your Technical Account Manager that this is the case for your organisation.

Here at Aristi our cyber security consultants can review your Remote Access Architectural Design of DirectAccess and verify that its configuration falls in line with CESG PSN coco framework to keep your information secure.

If you have any queries regarding its implementation or security implications for your organisation we can offer advice.

To discuss your requirements in more detail please contact Martyn on 0121 222 5630 or email martyn.butcher@aristi.co.uk.


Please contact Aristi to discuss your requirements. Filling in the form below is the quickest way to get in touch with the relevant person at Aristi.


Keep up-to-date with insights and info on all areas of Information Assurance, Information Security, Penetration Testing & Data Sharing from the award-winning consultants Aristi.

Latest Tweets

Would your business survive a cyber attack? Have you rehearsed your response processes? https://t.co/LeV1YQIBFo https://t.co/DWNx0XLkWr
If you haven't registered for our cloud security event on 4th July, there are still a few places left. https://t.co/fBrohkOTJL
'Aristi Raiders' ready for battle on the high seas (well, the canals of Birmingham)...https://t.co/tVaWn0zIYZ

Subscribe to our Newsletter

Latest Blog Posts

  • Would your business survive a cyber attack?

    Share the post “Would your business survive a cyber attack?” FacebookLinkedInTwitter A cyber-attack can have a huge impact on your organisation in terms of cost, productivity and reputational damage. Being prepared to detect and quickly respond to incidents will help to reduce the business impact and prevent the attacker from inflicting further damage. If the […]

    Written on Monday, 16 September 2019
  • Cyber Resilience for Charities

    Share the post “Cyber Resilience for Charities” FacebookLinkedInTwitter A Round Table Event for Charities Charities are increasingly reliant on IT and technology and are falling victim to a range of malicious cyber activity. The recent government Charity Sector Threat Assessment indicates that losing access to this technology, having funds stolen or suffering a data breach through […]

    Written on Thursday, 07 March 2019
  • 10 years of Aristi by its founder, Harj Singh

    What’s in a name? The word Aristi has three meanings – security, excellence and calm. Find out where we started and where we believe cyber security to be headed.

    Written on Thursday, 24 January 2019