• Flatfire@lemmy.ca
      link
      fedilink
      English
      arrow-up
      7
      arrow-down
      1
      ·
      12 hours ago

      Generally speaking, most VPNs used for business are a split tunnel, and aren’t forwarding all of your traffic, just the traffic relevant to your company resources that would otherwise be inaccessible unless you were on-site. So your internet traffic and regular browsing are still sent as if you had no VPN connection at all.

      • Aceticon@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        4
        ·
        5 hours ago

        They can do that, but in my experience they do not, if only because it would be a vector for external attackers (who could control that machine via those connections routed directly to the Internet) to get into the company’s intranet without actually having to go through the company’s firewalls.

        • Flatfire@lemmy.ca
          link
          fedilink
          English
          arrow-up
          1
          ·
          4 hours ago

          This is what strong endpoint security is for. EDR software is also common. Routing everyone’s internet traffic is pretty strenuous.

      • neclimdul@lemmy.world
        link
        fedilink
        English
        arrow-up
        20
        arrow-down
        1
        ·
        10 hours ago

        I don’t think that’s actually true. Most route traffic through malware/protection software which would be bypassed by split vpns.

        There are also a number of attacks that target this sort of VPN setup so it’s my understanding it’s generally not a good idea.

      • cmhe@lemmy.world
        link
        fedilink
        English
        arrow-up
        7
        ·
        edit-2
        11 hours ago

        Routing is something you can control client-side. Well at least you can configure that all traffic should be routed over the VPN. If your company provides an exit to the internet over VPN is another issue, but I suppose most do.