All of you defending against split-tunneling are conveniently side-stepping the fact that when a machine is *not* connected to the VPN it is vulnerable to all the threats you're saying full tunneling protects against. Which then when that machine does connect to the VPN then the corporate network is just as exposed (if not moreso).
The *only* thing not allowing split tunneling protects against are very specific threats that are able to exploit a peer computer *when* it's connected to the VPN and bridge the connection. If this is a possible attack vector, then it's completely assinine to presume that 1) a machine vulnerable to this kind of attack isn't also (even more) vulnerable to outright infection and 2) the malware capable of performing this kind of attack isn't also (even more) capable of outright infecting the target computer.
It's a sham, there's no way around it.
It's not a sham. You're just not an information security professional, so you're not properly educated to understand the big picture of security policies. Disallowing split tunneling is a way to mitigate specific risks to the network. That is a fact, and you cannot deny it. When you're the person who has the responsibility to define security policies for an organization, you can perform your own assessment and determine if mitigating those specific risks is an important part of your strategy. If you decide not to take that precaution, and your network suffers a breach because of it, then it's your head that's going to roll for it.
Information Security professionals don't just make this shit up as they go along to make life difficult for you.
