Security Review of Microsoft DirectAccess Implementation

This article presents the key risks with DirectAccess and how[...]