Remote Applications to be blocked at the Border/Edge firewalls on Tuesday March 25th, 2025
Wednesday, March 19th, 2025
During the March 25th change window, we will add the applications below to the list of remote applications to be blocked by default. Currently only a few of the most popular remote access applications (ssh, TeamViewer, AnyDesk, Microsoft Remote Desktop, VNC, ARD) are blocked by default. This updated policy will expand that list to include the following remote applications:
- foldera
- x11
- bomgar
- crossloop
- deeplink-cloud
- glide
- gotohttp
- logmein
- radmin
- remoteview
- screenconnect
- showmypc
- techinline
- txp
- webot
- yoics
These applications will still be accessible from off campus by connecting to vpn.bu.edu first, which has the added benefit of being protected by multi-factor authentication. Where there is a teaching, research, or other business need to reach your system via one of these applications directly from the Internet, you may apply for an exception using our online firewall request form.
As with other remote access applications such as Microsoft Remote Desktop, AnyDesk, SSH, SCP, TeamViewer, VNC, and Apple Remote Desktop that are already blocked by default, you will be required to meet the minimum-security requirements as part of your application for an exception all remote applications going forward.
Security is at the forefront of all that we do to ensure a safe environment for Boston University assets. If you have not already deployed CrowdStrike, especially for the critical assets you manage, please do so as soon as possible. If you require assistance with deployment scripts to your communities, please submit the request through ithelp@bu.edu.