For the most part, I concentrate on three aspects when looking to set up a barrier to unauthorized access. The first is where a user would come into the system via the RAS connection. I also look to the way an account has its privileges set up and a third way is using the File Manager and directly setting up security at the individual file or directory level.