The primary step in embracing work from home (WFH) is to identify all the endpoints used by employees for remote work. An unmanaged remote endpoint is the last thing every IT administrator would want, because an unpatched system opens your network to a plethora of cyberattacks, and provides the leeway for users to install malicious applications or uninstall business-critical applications.
Besides the local office, most enterprises will have one or more remote offices to manage as well. With the current WFH situation, it is important to make Endpoint Central server and distribution server accessible to all the remote endpoints, wherever it’s applicable.
Depending on the category you fall under, proceed with the steps provided in that particular category:
The public IP address will be available for all the remote endpoints, and the agents can communicate with the server seamlessly for hassle-free management. (Note: This public IP address of SGS will be mapped to the private IP address of Endpoint Central server).
If the remote office agents communicate with Endpoint Central server directly, agent - server communication will not be an issue. However, if the agents communicate with the central server through distribution server (DS), there might be a hindrance to the communication as the DS will not be configured as an edge device (also, it is not recommended to configure DS as an edge device).
Note: By doing so, all the remote office endpoints will start contacting the Endpoint Central server directly instead of communicating through the DS. This will increase the load on the central server and cause bandwidth bottleneck issues. However, you can follow the guidance below to reduce bandwidth overload issues.
Best practices to break the bandwidth bottleneck
In order to avoid the exposure of Endpoint Central server to the internet directly, all the communication from the roaming agents to Endpoint Central server will be routed through the secure gateway server.
After installation and configuration of SGS, if the same public IP address (as that of Endpoint Central’s) is provided for SGS, there’d be no issues in the agent - server communication. However, if you choose to provide a different IP address, ensure that all the agents communicate with the Endpoint Central server for fetching the new IP address, until which Endpoint Central server should be configured as the edge device. (Note: All the active agents will contact the Endpoint Central server within the 90-minute refresh policy).
If the agents cannot contact the Endpoint Central server to fetch the IP address, here’s what you need to do:
Based on your operating system, download and execute the following script: [Important: In the downloaded script, replace the sample IP address with the new public IP address of SGS]
Windows
Linux
Mac
Windows
Linux
Mac
If the remote office agents communicate with Endpoint Central directly, follow the steps mentioned below:
Note: By doing so, all the remote office endpoints will start contacting the Endpoint Central server directly instead of communicating through the DS. This will increase the load on the central server and cause bandwidth bottleneck issues. However, you can follow the guidance below to reduce bandwidth overload issues.
Best practices to break the bandwidth bottleneck
After ensuring that all your local office endpoints and remote office endpoints can contact Endpoint Central server, identify WFH endpoints for easier management.
Since it is not recommended to configure your distribution server as an edge device, DS might not be accessible by all the remote endpoints. However, it's possible for the endpoints to contact Endpoint Central server, and not DS. That said, depending on when the Endpoint Central server and the DS were contacted, you can identify the WFH endpoints.
For example, if you think an endpoint should have contacted DS within two days, and Endpoint Central server within a day, then the query should be as follows: AgentContact.LAST_DS_CONTACT_TIME< CurrentTime in millisecond - 172800000 and AgentContact.LAST_CONTACT_TIME >CurrentTime in millisecond - 86400000.
For example, if an endpoint has last contacted DS two days earlier, but has contacted Endpoint Central server 24 hours earlier, this endpoint is a WFH endpoint.
If the endpoints communicate with Endpoint Central server, a custom script needs to be executed to find if the remote endpoint has communicated with the public IP address of Endpoint Central, or the private IP address. You can determine from this, if the endpoint has communicated with the public IP address of Endpoint Central, that it is a WFH endpoint.
Windows
Linux
Mac
Note: In the place of “configName”, provide the name of the custom script configuration that was created.
Managing work-from-home (WFH) endpoints is crucial to maintain security, productivity, and compliance across a distributed workforce. Remote devices often connect through unsecured networks, increasing the risk of data breaches and malware attacks. ManageEngine Endpoint Central helps IT teams secure, monitor, and control these endpoints by enforcing policies, deploying patches, and ensuring consistent configurations—protecting both corporate data and user productivity outside the office network.
Read moreEffective WFH endpoint management starts with centralized visibility, automated patching, and secure remote access. Endpoint Central enables IT admins to manage endpoints over the internet using a lightweight agent that communicates securely with the server. It supports remote troubleshooting, software deployment, and configuration management, ensuring devices remain compliant and updated even when employees work from home or on the move.
Read moreTo reduce bandwidth congestion, Endpoint Central uses a Distribution Server model that intelligently offloads data transfer. Instead of every remote device connecting to the central server, local distribution points deliver patches, software, and updates efficiently to nearby endpoints. IT teams can also schedule deployments during off-peak hours and use peer-to-peer (P2P) distribution to optimize bandwidth utilization across remote networks.
Read moreEndpoint Central offers a library of predefined scripts and queries to identify and manage remote endpoints across Windows, macOS, and Linux systems. These include scripts to track devices connected via public IPs, VPNs, or external networks, as well as queries that identify inactive agents, unpatched systems, or unauthorized software. Admins can execute custom scripts remotely from the console to audit and enforce security across all remote endpoints.
Read moreEndpoint Central is purpose-built for remote and hybrid workforce management. It provides full endpoint visibility, internet-based management without VPN dependency, and integrated tools for patching, remote control, and configuration. Its scalable architecture supports global device fleets, while strong security measures—like encryption, role-based access, and compliance reports—make it an ideal choice for enterprises managing WFH endpoints securely and efficiently.
Read more