you’re gonna need to just use a KVM. If the company has policies on RDP and VNC, and you’re attempting to breach those, you’re opening a door for issues under the tech policies you likely signed or agreed to when you started.
I’ll be the first to tell you, as someone in cybersec, that while we aren’t exactly always proactively looking to bust up employees about conduct, when its clear someone repeatedly attempts bypass, we eventually send it off to managers for review. Some of them wind up in worse situations, with confidential management-lead investigations into them, email interception, desktop monitoring, etc… It’s a lot of bullshit for a workaround…
you’re gonna need to just use a KVM. If the company has policies on RDP and VNC, and you’re attempting to breach those, you’re opening a door for issues under the tech policies you likely signed or agreed to when you started.
I’ll be the first to tell you, as someone in cybersec, that while we aren’t exactly always proactively looking to bust up employees about conduct, when its clear someone repeatedly attempts bypass, we eventually send it off to managers for review. Some of them wind up in worse situations, with confidential management-lead investigations into them, email interception, desktop monitoring, etc… It’s a lot of bullshit for a workaround…