Securing Remote Desktop (RDP) for System Administrators (2024)

How secure is Windows Remote Desktop?

Remote Desktop sessions operate over an encrypted channel, preventing anyone from viewing your session by listening on the network. However, there is a vulnerability in the method used to encrypt sessions in earlier versions of RDP. This vulnerability can allow unauthorized access to your session using a man-in-the-middle attack.

Remote Desktop can be secured using SSL/TLS in Windows Vista, Windows 7, Windows 8, Windows 10 and Windows Server 2003/2008/2012/2016. *Some systems listed are no longer supported by Microsoft and therefore do not meet Campus security standards. If unsupported systems are still in use, a security exception is required.

While Remote Desktop is more secure than remote administration tools such as VNC that do not encrypt the entire session, any time Administrator access to a system is granted remotely there are risks. The following tips will help to secure Remote Desktop access to both desktops and servers that you support.

collapse all expand all

Basic Security Tips for Remote Desktop

1. Use strong passwords

Strong passwords on any accounts with access to Remote Desktop should be considered a required step before enabling Remote Desktop. Refer to the campus password complexity guidelines for tips.

2. Use Two-factor authentication

Departments should consider using a two-factor authentication approach. This topic is beyond the scope of this article, but RD Gateways can be configured to integrate with the Campus instance of DUO. Other unsupported by campus options available would be a simple mechanism for controlling authentication via two-factor certificate based smartcards. This approach utilizes the Remote Desktop host itself, in conjunction with YubiKey and RSA as examples.

3. Update your software

One advantage of using Remote Desktop rather than 3rd party remote admin tools is that components are updated automatically with the latest security fixes in the standard Microsoft patch cycle. Make sure you are running the latest versions of both the client and server software by enabling and auditing automatic Microsoft Updates. If you are using Remote Desktop clients on other platforms, make sure they are still supported and that you have the latest versions. Older versions may not support high encryption and may have other security flaws.

4. Restrict access using firewalls

Use firewalls (both software and hardware where available) to restrict access to remote desktop listening ports (default is TCP 3389). Using an RDP Gateway is highly recommended for restricting RDP access to desktops and servers (see discussion below). As an alternative to support off-campus connectivity, you can use the campus VPN software to get a campus IP address and add the campus VPN network address pool to your RDP firewall exception rule. Visit our pagefor more information on the campus VPN service.

5. Enable Network Level Authentication

Windows 10, Windows Server 2012 R2/2016/2019 also provide Network Level Authentication (NLA) by default. It is best to leave this in place, as NLA provides an extra level of authentication before a connection is established. You should only configure Remote Desktop servers to allow connections without NLA if you use Remote Desktop clients on other platforms that don't support it.

6. Limit users who can log in using Remote Desktop

By default, all Administrators can log in to Remote Desktop. If you have multiple Administrator accounts on your computer, you should limit remote access only to those accounts that need it. If Remote Desktop is not used for system administration, remove all administrative access via RDP, and only allow user accounts requiring RDP service. For Departments that manage many machines remotely remove the local Administrator account from RDP access at and add a technical group instead.

  1. Click Start-->Programs-->Administrative Tools-->Local Security Policy

  2. Under Local Policies-->User Rights Assignment, go to "Allow logon through Terminal Services." Or “Allow logon through Remote Desktop Services”

  3. Remove the Administrators group and leave the Remote Desktop Users group.

  4. Use the System control panel to add users to the Remote Desktop Users group.

A typical MS operating system will have the following setting by default as seen in the Local Security Policy:

Securing Remote Desktop (RDP) for System Administrators (1)

The problem is that “Administrators” is here by default, and your “Local Admin” account is in administrators. Although a password convention to avoid identical local admin passwords on the local machine and tightly controlling access to these passwords or conventions is recommended, using a local admin account to work on a machine remotely does not properly log and identify the user using the system. It is best to override the local security policy with a Group Policy Setting.

Securing Remote Desktop (RDP) for System Administrators (2)

To control access to the systems, even more, using “Restricted Groups” via Group Policy is also helpful.

If you use a “Restricted Group” setting to place your group, e.g., “CAMPUS\LAW-TECHIES” into “Administrators” and “Remote Desktop Users,” your techies will still have administrative access remotely, but using the steps above, you have removed the problematic “local administrator account” having RDP access. Going forward, whenever new machines are added in the OU under the GPO, your settings will be correct.

Securing Remote Desktop (RDP) for System Administrators (3)

7. Set an account lockout policy

By setting your computer to lock an account for a set number of incorrect guesses, you will help prevent hackers from using automated password guessing tools from gaining access to your system (this is known as a "brute-force" attack). To set an account lockout policy:

  1. Go to Start-->Programs--> Administrative Tools--> Local Security Policy
  2. Under Account Policies--> Account Lockout Policies, set values for all three options. Three invalid attempts with 3-minute lockout durations are reasonable choices.

Best Practices for Additional Security

1. Do not allow direct RDP access to clients or servers from off campus.

Having RDP (port 3389) open to off campus networks is highly discouraged and is a known vector for many attacks. The options below list ways of improving security while still allowing RDP access to system.

Once an RDP gateway has been set up, hosts should be configured to only allow RDP connections from the Gateway host or campus subnets where needed.

2. Use RDP Gateways (Best Option)

Using an RDP Gateway is strongly recommended. It provides a way to tightly restrict access to Remote Desktop ports while supporting remote connections through a single "Gateway" server. When using an RD Gateway server, all Remote Desktop services on your desktop and workstations should be restricted to only allow access only from the RD Gateway. The RD Gateway server listens for Remote Desktop requests over HTTPS (port 443) and connects the client to the Remote Desktop service on the target machine.

  1. Utilize Campus RDP Gateway Service.This is the best option to allow RDP access to system categorized as UC P2 and lower. Includes DUO integration.RDP Gateway Service is provided by the Windows Team. Documentation is available here: https://berkeley.sharepoint.com/sites/calnetad/gateway.

    The RDP Gateway Service also supports the new Remote Access Services requirement of the draft MSSND update (requirement 8), which requires the use of an approved service (i.e., RDP gateway, dedicated gateway, or bSecure VPN) for access to the UC Berkeley network from the public Internet.

  2. Dedicated Gateway Service (Managed). Needed for rdp access to systems that are UC P4 or higher. Must also be configured for DUOSome campus units use an IST managed VPS as an RD Gateway. A rough estimate might be that 30-100 concurrent users can use one RD Gateway. The HA at the virtual layer provides enough fault-tolerant and reliable access; however a slightly more sophisticated RD gateway implementation can be done with network load balancing.

  3. Dedicated Gateway Service (Unmanaged). Installing and configuring RD Gateway on department run hardware.

    There are many online documents for configuring this embedded Windows 2016/2019 component. The official documentation is here: https://docs.microsoft.com/en-us/windows-server/remote/remote-desktop-se...

    Installing the configuring, the role service is mostly as described; however, using a Calnet issued trusted Comodo certificate is recommended. Using a self-signed cert is ok for testing, and using a CalnetPKI cert can work if all clients have trusted the UCB root. The Comodo cert is usually better accepted so that your end users do not receive certificate warnings.

    Configuring your client to use your RD Gateway is simple.The official documentation for the MS Client is here: http://technet.microsoft.com/en-us/library/cc770601.aspx

In essence, a simple change on the advanced tab of your RDP client is all that is necessary:

3.Change the listening port for Remote Desktop

Changing the listening port will help to "hide" Remote Desktop from hackers who are scanning the network for computers listening on the default Remote Desktop port (TCP 3389). This offers effective protection against the latest RDP worms such, as Morto. To do this, edit the following registry key (WARNING: do not try this unless you are familiar with the Windows Registry and TCP/IP): HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp. Change the listening port from 3389 to something else and remember to update any firewall rules with the new port. Although this approach is helpful, it is security by obscurity, which is not the most reliable security approach. You should ensure that you are also using other methods to tighten down access as described in this article.

4. Tunnel Remote Desktop connections through IPSec or SSH

If using an RD Gateway is not feasible, you can add an extra layer of authentication and encryption by tunneling your Remote Desktop sessions through IPSec or SSH. IPSec is built-in to all Windows operating systems since Windows 2000, but use and management are greatly improved in Windows 10 (see: http://technet.microsoft.com/en-us/network/bb531150). If an SSH server is available, you can use SSH tunneling for Remote Desktop connections.

5. Use existing management tools for RDP logging and configuration

Using other components like VNC or PCAnywhere is not recommended because they may not log in a fashion that is auditable or protected. With RDP, logins are audited to the local security log, and often to the domain controller auditing system. When monitoring local security logs, look for anomalies in RDP sessions such as login attempts from the local Administrator account. RDP also has the benefit of a central management approach via GPO as described above. Whenever possible, use GPOs or other Windows configuration management tools to ensure a consistent and secure RDP configuration across all your servers and desktops.

By enforcing the use of an RDP gateway, you also get a third level of auditing that is easier to read than combing through the domain controller logins and is separate from the target machine so it is not subject to tampering. This type of log can make it much easier to monitor how and when RDP is being used across all the devices in your environment.

Restrict Access to RDP with Windows Firewall

If you have a campus-managed computer:

If you have a personally-managed computer and Administrator access:

  • Follow the instructions in this article to update your Windows Firewall so that only authorized hosts and networks can access your system via Remote Desktop (RDP).

Settings > Update and Security > Windows Security > Firewall and Network Protection > Advanced Settings > Inbound Rules > Remote Desktop - User Mode (TCP-In) > Properties > Scope > Remote IP address > Add > This IP address or subnet

  1. Settings > Update and Security

Securing Remote Desktop (RDP) for System Administrators (4)

  1. Windows Security > Firewall and Network Protection

Securing Remote Desktop (RDP) for System Administrators (5)

  1. Advanced Settings

Securing Remote Desktop (RDP) for System Administrators (6)

  1. Inbound Rules > Remote Desktop - User Mode (TCP-In) > Properties

Securing Remote Desktop (RDP) for System Administrators (7)

  1. Scope > Remote IP address > Add

Securing Remote Desktop (RDP) for System Administrators (8)

  1. UnderThis IP address or subnet, only add IP addresses and network subnets that should be authorized to connect to your computer’s Remote Desktop (RDP) service. Some common examples of campus IP addresses and subnets are listed in the section below.

Securing Remote Desktop (RDP) for System Administrators (9)

Campus IP addresses and subnets

Based on your needs, choose only authorized campus IP addresses and subnets to connect to your computer’s RDP service. Network Operations & Services maintains thesource list of UC Berkeley Campus Networks, but some common examples are included below for reference.

IST RD Gateway
To access your system via RDP directly from the Internet, utilize the Campus Remote Desktop Gateway. The RD Gateway will allow you to use your CalNet ID with Duo push notifications to connect. You can authorize the RD Gateway by adding the following subnet to your firewall rule:

  • 169.229.164.0/24

Campus Remote Access VPN Networks (bSecure Remote Access Services with GlobalProtect)
To access your system via RDP via the campus VPN, add one or more, as appropriate, of the following VPN networks to your firewall rule:

  • Split Tunnel Client Networks
    • 10.136.128.0/18
  • Split Tunnel Client Networks
    • 136.152.16.0/20
  • Restricted Tunnel Networks
    • 136.152.210.0/23

Campus Networks (onsite)

To access your system via RDP while on campus, add the appropriate campus wireless or wired networks to your firewall rule:

  • AirBears2 and eduroam Wireless Networks
    • 10.142.0.0/16, 136.152.28.0/22, 136.152.36.0/22, 136.152.142.0/24, 136.152.145.0/24, 136.152.148.0/22, 2607:f140:400::/48
  • Berkeley Campus Wired Networks
    • 128.32.0.0/16, 136.152.0.0/16, 136.152.0.0/16, 192.31.105.0/24

Securing Remote Desktop (RDP) for System Administrators (10)
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.

Securing Remote Desktop (RDP) for System Administrators (2024)

FAQs

Do you think that RDP is secure to use explain your answer? ›

Remote Desktop Protocol is designed to enable authorized users to access data and remote systems. However, RDP security is not infallible. There are certain vulnerabilities inherent to using RDP that threat actors can potentially exploit to gain unauthorized access.

How do I deny remote desktop for administrator? ›

Computer Configuration | Windows Settings | Security Settings | Local Policies | User Rights Assignment. Find and double-click "Deny logon through Remote Desktop Services". Add the user and / or the group that you would like to deny access. Select ok.

How do I make sure my remote desktop is secure? ›

Basic Security Tips for Remote Desktop
  1. Use strong passwords. ...
  2. Use Two-factor authentication. ...
  3. Update your software. ...
  4. Restrict access using firewalls. ...
  5. Enable Network Level Authentication. ...
  6. Limit users who can log in using Remote Desktop. ...
  7. Set an account lockout policy.

What are some benefits of using the remote desktop Connection as an administration access? ›

The ten benefits of using Remote Desktop Services (RDS)
  • Leverage legacy devices. ...
  • Enable workers. ...
  • Remote work. ...
  • Central storage of data. ...
  • The currency of technology is guaranteed. ...
  • Security is guaranteed too. ...
  • Easy scalability. ...
  • It is cheaper.

What is the vulnerability of RDP client? ›

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack, because of insufficient validation of user-supplied input in Windows Remote Desktop Gateway (RD Gateway). A remote attacker can send specially crafted request to the affected RDP server and perform a denial of service attack.

How do I ignore certificate warning? ›

Chrome
  1. Right-click the Google Chrome shortcut on your desktop and select Properties.
  2. In the Target field simple append the following parameter after the quoted string: --ignore-certificate-errors.

How do I disable certificate verification in Windows? ›

Windows 10/11
  1. Navigate to Control Panel > Network and Sharing Center > Change adapter settings. ...
  2. Double-click the interface/network in question and choose Properties.
  3. On the Authentication tab, click Settings.
  4. Along the top, uncheck the box for Verify the server's identity by validating the certificate.
Nov 21, 2022

How to fix Windows does not have enough information to verify this certificate? ›

Try resetting the TCP IP settings and see if that works.
  1. Press Windows + S key together to open Search.
  2. Now type CMD and select Run as administrator.
  3. Accept the UAC prompts.
  4. Type in the following commands one by one and hit Enter: netsh winsock reset. netsh int ip reset. ipconfig /release. ipconfig /renew. ...
  5. Restart the PC.
Aug 30, 2020

How do I know if someone is remotely accessing my computer? ›

On a Windows computer, go to the Control Panel > System and Security > Administrative Tool > Event Viewer. Then, on the left side, select Security and review all login events. On a Mac, you need third-party software to review login attempts or remote sessions.

How to establish remote desktop connection without asking user permission? ›

Under the Remote Desktop Session Host > Connections, right-click Sets rules for remote control of Remote Desktops Services user sessions and click Edit. Select Enabled. Under Options, select Full Control without the user's permission.

Do administrators have remote desktop access? ›

Administrators have access via RDP enabled by default. However you may need to restrict remote access for a specific administrator: if you want to be sure that every task (backups for example), services or other operations that may launch using his credentials won't stop working.

Why is RDP not secure? ›

The problem is that the same password is often used for RDP remote logins as well. Companies do not typically manage these passwords to ensure their strength, and they often leave these remote connections open to brute force or credential stuffing attacks. Unrestricted port access.

How do I check my RDP encryption level? ›

How do I check my RDP Encryption Level? To check what encryption level is being set for a session, open a Terminal Service (TS) Manager and verify the status of the RDP connection where the level of encryption will be mentioned.

How can you tell if secure desktop is activated? ›

To check the status of Secure Boot on your PC:
  1. Go to Start.
  2. In the search bar, type msinfo32 and press enter.
  3. System Information opens. Select System Summary.
  4. On the right-side of the screen, look at BIOS Mode and Secure Boot State. If Bios Mode shows UEFI, and Secure Boot State shows Off, then Secure Boot is disabled.
Jul 24, 2023

What is safe RDP? ›

SAFE RDP App

SAFE RDP provides another way for people to contact security and access relevant resources in an accessible format. SAFE RDP is available for free. To download on an Apple device, type SAFE RDP in the app store.

What is RDP in security? ›

Remote Desktop Protocol (RDP) is a protocol that enables users anywhere in the world to access and control a computer through a secure, reliable channel. RDP is a safe, useful tool for increasing productivity in your business and giving your employees the flexibility to accomplish tasks in a changing world.

Should RDP be allowed? ›

Foremost, you should never allow RDP connections over the open internet. Hackers use tools that continuously scan the internet for open RDP ports like port 3389, and even with a strict password policy and multi-factor authentication you're vulnerable to cyber attacks if your RDP is open to the internet.

Top Articles
Latest Posts
Article information

Author: Twana Towne Ret

Last Updated:

Views: 5847

Rating: 4.3 / 5 (64 voted)

Reviews: 87% of readers found this page helpful

Author information

Name: Twana Towne Ret

Birthday: 1994-03-19

Address: Apt. 990 97439 Corwin Motorway, Port Eliseoburgh, NM 99144-2618

Phone: +5958753152963

Job: National Specialist

Hobby: Kayaking, Photography, Skydiving, Embroidery, Leather crafting, Orienteering, Cooking

Introduction: My name is Twana Towne Ret, I am a famous, talented, joyous, perfect, powerful, inquisitive, lovely person who loves writing and wants to share my knowledge and understanding with you.