@Pete-S said in Unattended remote access utility/ computer:
If you are hell bent on the idea of bypassing perimeter security, why not use something like an edgerouter? Set it up as a router on a stick and have it dial out.
That's better but, what benefit does that bring? More complexity, making them potentially change their router strategy, more effort, much much much much more difficult to keep secure. Anything that uses "use a VPN" as an option, even one that is "reach out" requires a ton of work (and trust) to ensure it is not creating extra exposure. VPNs are SO dangerous under normal conditions and usages.
The reason to do the RP method is security and good practice. All other things like following process, having permission, telling IT, etc. should be treated the same across the board. And both can have MFA and all that. And yes, in theory, you can make a VPN locked down to do nothing but allow an RDP connection to a single host and ... and ... and... if you do it all well enough, all you've done, is basically rebuilt the RP/MeshCentral solution. At no point do you gain an advantage, you only carry the risk that you won't totally recreate the solution, in the hopes of a break even.
Why NOT do the better, more secure, best practice method that's nearly zero effort right from the beginning. Why start with something complex, probably expensive, and risky only to hope you don't get anything wrong for no advantage?