I had to go around and allow remote access and add allowed people, which is not a big deal, because for administrative purposes, most of the machines are administered by admin/password. We only put fictional users on with varying privilege for test purposes.

I can VPN in from home and still get to the lab through my usual proxies so that is pretty good.

The interesting thing is that when I log on remotely, it closes an open console session until I log off. VNC would allow somebody sitting at the console to steal the mouse back or change focus to a different window. It was a standard game when there wasn't enough to be irritated about.

It turns out that the virus only targets RealVNC 4.1.1 and they have a 4.1.2 version out that deals with the vulnerability so some people are going with that. There is also other VNC products from other companies that are not effected as well. So now we have competing remote access methods. Interesting times.

Thanks for the suggestion.
Hugh