Not sure if other districts are using OpenDns as part of their content filtering and security platform, but we found a hole last week that was brought to us by a student. Students were able to install a Chrome Extension for a VPN/proxy program that allowed them to bypass the DNS filters. We used Group Policy to lock down the ability for users to install or use Chrome Extensions and created a whitelist of approved extensions/apps. Just wanted to pass this info on. Contact me if you want more details.
Are there any other "holes" OpenDns users have discovered in your district?
[log in to unmask]
Washington South Supervisory Union
37 Cross Street, Unit 1
Northfield, Vermont 05663
Telephone: (802) 485-5467 (Techology Team Office), (802) 485-5812 (My Direct Line)
Fax: (802) 485-3348