{"id":18977,"date":"2017-08-24T18:54:56","date_gmt":"2017-08-24T14:54:56","guid":{"rendered":"https:\/\/www.msp360.com\/resources\/?p=18977"},"modified":"2024-01-05T14:17:23","modified_gmt":"2024-01-05T10:17:23","slug":"safe-remote-desktop-with-remote-desktop","status":"publish","type":"post","link":"https:\/\/www.msp360.com\/resources\/blog\/safe-remote-desktop-with-remote-desktop\/","title":{"rendered":"Secure Remote Desktop with MSP360 Connect"},"content":{"rendered":"<p><a href=\"https:\/\/www.msp360.com\/connect\/\">MSP360 Connect<\/a> is a handy tool for establishing <a href=\"https:\/\/www.msp360.com\/resources\/blog\/4-ways-to-improve-your-remote-desktop-security\/\">secure remote desktop<\/a> connections between two computers. Naturally, the contents of the traffic interchanged may very well contain sensitive data that under no circumstances should be intercepted by malefactors. In this short post, we succinctly explain how to set up a secure RDP (Remote Desktop Protocol) connection with the help of MSP360 Connect.<\/p>\n<p><!--more--><\/p>\n<div class=\"table-of-content \">\n\t\t\t\t<p>Table of Contents<\/p>\n\t\t\t\t<ul><\/ul>\n\t\t\t\t<\/div>\n<h2>Secure Remote Access with MSP360 Connect<\/h2>\n<p>Remote Desktop is an essential part of modern IT. It is widely used by users, IT administrators, and support engineers. Needless to say, Remote Desktop connection should be as safe as possible to preserve the integrity of transferred data. It is a well-known fact that various malware can breach through the exploits of unsafe remote desktop connection.<\/p>\n<p>The world of cybersecurity has in recent years <a href=\"https:\/\/community.spiceworks.com\/topic\/1251058-ransomware-spreads-using-remote-desktop-and-terminal-services-attacks\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">witnessed<\/a> numerous cases of various RDP exploits being utilized by culprits to attack users with ransomware. This is irrefutably inadmissible, as critical IT infrastructure might be locked or even destroyed. Paying ransom is almost never the option; besides, taking preventive measures is usually less costly and obviously preferable. Monitoring your ports, utilizing firewall are among the obvious ways of dealing with the issues. Yet the best way to ensure the <a href=\"https:\/\/www.msp360.com\/resources\/blog\/4-ways-to-improve-your-remote-desktop-security\/\">secure remote desktop connection<\/a> is to use software that offers robust encryption algorithms coupled with secure data transfer protocols.<\/p>\n<p>MSP360 Connect\u00a0employs a combination of RSA and AES encryption to secure all incoming and outgoing connections. RSA encryption is utilized in the very beginning for generation of a unique pair of cryptographic keys \u2014 public and private key \u2014 that is then used to establish the connection between the two computers. All further data transfer, including video, voice chat, and other information is being exclusively interchanged via the AES encryption. This is a somewhat simplified explanation of the underlying processes; let us, therefore, break it down a little further for all of you tech-heads out there.<\/p>\n<h2>Key Generation for RDP Connection<\/h2>\n<p>To avoid any further confusion, let\u2019s designate the user sharing their computer\u2019s screen as <em>the Host<\/em>, and the person receiving the data as <em>the Client<\/em>. Now just to clarify, when you first launch MSP360 Connect on the Host\u2019s computer, encryption is by default turned off.<\/p>\n<p id=\"last\">You can enable encryption in the app's settings by clicking <strong>Options<\/strong>, <strong>Security <\/strong>on the main screen and selecting the appropriate checkbox.<\/p>\n<div id=\"slidebox\"><a class=\"close\">\u00a0<\/a><!--HubSpot Call-to-Action Code --><span class=\"hs-cta-wrapper hs-cta-deferred\" id=\"hs-cta-wrapper-79b6ff0d-42a9-4545-b559-d70d2e8731f2\" data-portal=\"5442029\" data-id=\"79b6ff0d-42a9-4545-b559-d70d2e8731f2\"><span class=\"hs-cta-node hs-cta-79b6ff0d-42a9-4545-b559-d70d2e8731f2\" id=\"hs-cta-79b6ff0d-42a9-4545-b559-d70d2e8731f2\"><!--[if lte IE 8]><div id=\"hs-cta-ie-element\"><\/div><![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5442029\/79b6ff0d-42a9-4545-b559-d70d2e8731f2\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-79b6ff0d-42a9-4545-b559-d70d2e8731f2\" style=\"border-width:0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5442029\/79b6ff0d-42a9-4545-b559-d70d2e8731f2.png\" alt=\"CTA\"><\/a><\/span><\/span><!-- end HubSpot Call-to-Action Code --><\/div>\n<div><\/div>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-53854\" src=\"\/wp-content\/uploads\/2017\/08\/Screenshot_26.png\" alt=\"\" width=\"839\" height=\"579\" srcset=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2017\/08\/Screenshot_26.png 839w, https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2017\/08\/Screenshot_26-300x207.png 300w, https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2017\/08\/Screenshot_26-768x530.png 768w, https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2017\/08\/Screenshot_26-624x431.png 624w\" sizes=\"auto, (max-width: 839px) 100vw, 839px\" \/><\/p>\n<h3>How Does Encryption Work In MSP360 Connect<\/h3>\n<p>Now let's see how exactly the encryption itself occurs, from A to Z.<\/p>\n<p>Once you\u2019ve enabled encryption, the app generates two keys: one <strong>public<\/strong> and one <strong>private.<\/strong> The public key is the lengthy text you copy from the app\u2019s UI and then manually provide to the Client, preferably via a secure channel (Telegram\u2019s secret chat, for instance).<\/p>\n<p>Next, the Client generates a preliminary session key and encrypts it using the said public key using the RSA algorithm. The freshly encrypted session key is then transferred to the Host.<\/p>\n<p>Immediately upon receiving the session key, the Host decrypts it using the private key. Then the Host updates the session key and encrypts it using the preliminary session key using the 256-bit AES algorithm. The host then finally sends the updated session key to the Client, thereby rendering the connection established and ready for data exchange. The same session key is stored in memory on both computers and is never stored on any server. It makes little difference as to how robust your encryption is; what does matter, however, is who stores the keys and who has access to them.<\/p>\n<p>Then the action begins \u2014 the remote desktop session is up and running, the Host and the Client exchange data and interact using the mouse, keyboard, voice, and text chat. All that data is transferred is encrypted using the said 256-bit AES algorithm, ensuring that malefactors will fail to extract any sensitive data from the data stream.<\/p>\n<h2>Conclusion<\/h2>\n<p>Ensuring the secure transfer of your data on the Web is unquestionably a matter of utmost importance for any organization. That's why MSP360 Connect strives to be the go-to solution for users who need <a href=\"https:\/\/www.msp360.com\/solutions\/remote-access\/\">simple-to-use remote access software<\/a> that provides stability, encryption, and robustness. The combination of RSA &amp; AES encryption allows for secure connection and swift data transfer. Feel free to try out MSP360 Connect for yourself and let us know about your experience in the comment section below.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>MSP360 Connect is a handy tool for establishing secure remote desktop connections between two computers. Naturally, the contents of the traffic interchanged may very well contain sensitive data that under no circumstances should be intercepted by malefactors. In this short post, we succinctly explain how to set up a secure RDP (Remote Desktop Protocol) connection [&hellip;]<\/p>\n","protected":false},"author":69,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[877,896,882],"tags":[],"class_list":["post-18977","post","type-post","status-publish","format-standard","hentry","category-blog-articles","category-msp360-ra","category-msp360-news"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/18977","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/users\/69"}],"replies":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/comments?post=18977"}],"version-history":[{"count":6,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/18977\/revisions"}],"predecessor-version":[{"id":57241,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/18977\/revisions\/57241"}],"wp:attachment":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/media?parent=18977"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/categories?post=18977"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/tags?post=18977"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}