{"id":34872,"date":"2019-09-24T16:52:43","date_gmt":"2019-09-24T12:52:43","guid":{"rendered":"https:\/\/www.msp360.com\/resources\/?p=34872"},"modified":"2022-07-06T12:59:46","modified_gmt":"2022-07-06T08:59:46","slug":"4-ways-to-improve-your-remote-desktop-security","status":"publish","type":"post","link":"https:\/\/www.msp360.com\/resources\/blog\/4-ways-to-improve-your-remote-desktop-security\/","title":{"rendered":"4 Ways To Improve Your Remote Desktop Security"},"content":{"rendered":"<p>Working via a remote desktop is more popular than ever. Unfortunately, that also means that remote desktop connections are a major target for hackers looking to intercept and steal commercially sensitive information.\u00a0<!--more--><\/p>\n<p>Generally, remote desktop hacks all operate in a similar way. A malicious user will first compromise a computer on your network, and attempt to connect to your remote desktop system using your standard remote desktop protocol. They will then attempt to elevate their privileges on this network in order to gain administrative power. Even if they are not successful in gaining this level of access, the flood of incoming connections can paralyze your network, and make it impossible for legitimate users to connect.<\/p>\n<div class=\"table-of-content \">\n\t\t\t\t<p>Table of Contents<\/p>\n\t\t\t\t<ul><\/ul>\n\t\t\t\t<\/div>\n<p>This type of attack is particularly common for users using the Windows default Remote Desktop Protocol (RDP), only because this is the most commonly used system. Before implementing a remote desktop system, therefore, you should take a look at a <a href=\"https:\/\/www.msp360.com\/connect\/windows\/\" target=\"_blank\" rel=\"noopener noreferrer\">guide to the top remote desktop software<\/a>, and also make sure that your <a href=\"https:\/\/www.msp360.com\/connect\/\" target=\"_blank\" rel=\"noopener noreferrer\">remote assistance software<\/a> is hardened against cyberattack.<br \/>\nBeyond these basic steps, there are a few more you can take to improve the security of your remote desktop system.<\/p>\n<h2>Use a VPN<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-34874 size-thumbnail\" src=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2019\/09\/Group-2-21-150x150.png\" alt=\"Use a VPN\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2019\/09\/Group-2-21-150x150.png 150w, https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2019\/09\/Group-2-21-250x250.png 250w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/>Using a Virtual Private Network (VPN) is one of the best ways to stay safe when working remotely. When using a VPN, your machine will first make an encrypted connection to your private network, and only then will it attempt to sign in to your remote desktop system.<\/p>\n<p>Since your private network is encrypted and hosted outside of your server, this tool doesn't require any additional server resources. A VPN will also assign a dedicated IP address to every machine connected to the network, and will only allow trusted IP addresses to connect to the network.<\/p>\n<p>This makes it extremely difficult for hackers to make illegitimate requests from your remote desktop environment. It also ensures that \u2013 even if someone gets into your network \u2013 they will not be able to read the information that you are sharing across it.<\/p>\n<h2>Network Firewalls<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-34861 size-thumbnail\" src=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2019\/09\/Create-a-Customer-Profile-3-150x150.png\" alt=\"Network Firewalls\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2019\/09\/Create-a-Customer-Profile-3-150x150.png 150w, https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2019\/09\/Create-a-Customer-Profile-3-250x250.png 250w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/>Firewalls are another extremely effective way of reducing the risk associated with remote desktop environments. If you take security seriously, you are likely already using a firewall to protect and monitor your website. If you are not, do that immediately.<\/p>\n<p id=\"last\">A firewall will also protect your remote desktop system. The best firewalls will allow you to configure which IP addresses and which computers can connect to your servers. Using this tool, you can automatically shut out anyone who tries to connect from an untrusted location.<\/p>\n<div id=\"slidebox\"><a class=\"close\">\u00a0<\/a><!--HubSpot Call-to-Action Code --><span class=\"hs-cta-wrapper hs-cta-deferred\" id=\"hs-cta-wrapper-18f62c64-7b6f-413e-aef5-a7bb6cf7696e\" data-portal=\"5442029\" data-id=\"18f62c64-7b6f-413e-aef5-a7bb6cf7696e\"><span class=\"hs-cta-node hs-cta-18f62c64-7b6f-413e-aef5-a7bb6cf7696e\" id=\"hs-cta-18f62c64-7b6f-413e-aef5-a7bb6cf7696e\"><!--[if lte IE 8]><div id=\"hs-cta-ie-element\"><\/div><![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5442029\/18f62c64-7b6f-413e-aef5-a7bb6cf7696e\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-18f62c64-7b6f-413e-aef5-a7bb6cf7696e\" style=\"border-width:0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5442029\/18f62c64-7b6f-413e-aef5-a7bb6cf7696e.png\" alt=\"CTA\"><\/a><\/span><\/span><!-- end HubSpot Call-to-Action Code --><\/div>\n<p>In addition to installing a firewall on the server that handles your remote desktop software, it\u2019s also important to install uptime monitoring services that will be connecting to the remote desktop. Most network and website monitoring tools today have APIs that connect with firewall software, alerting it if one connected machine is compromised and nipping it in the bud so that it doesn\u2019t infect other computers in the network.<\/p>\n<h2>Restricting the RDP Port<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-34875 size-thumbnail\" src=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2019\/09\/Create-a-Customer-Profile-4-150x150.png\" alt=\"Restricting the RDP Port\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2019\/09\/Create-a-Customer-Profile-4-150x150.png 150w, https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2019\/09\/Create-a-Customer-Profile-4-250x250.png 250w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/>By default, remote desktop connections are handled by one port: 3389. Restricting access to this port on your server firewall is a good way of limiting the scope for malicious connections. You can restrict access to this port to a specific set of IP addresses so that no-one else can connect to it.<\/p>\n<p>This process is known as 'scoping' the port and is actually really easy to do using the default Windows firewall. Log into your server, go to your firewall settings, and you'll see an option for 'inbound rules'. In that menu, there is another option for 'RDP', where you can specify which IP addresses are allowed to connect to your server in this way.<\/p>\n<p>Implementing this security measure requires, of course, that you know the IP addresses from where your staff will be accessing your remote desktop environment, and that these IPs stay static. The best way of ensuring that is using a VPN (see above), which will automatically assign a dedicated IP address to each machine.<\/p>\n<h2>Changing The RDP Port<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-34862 size-thumbnail\" src=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2019\/09\/Create-a-Customer-Profile-2-150x150.png\" alt=\"Changing The RDP Port\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2019\/09\/Create-a-Customer-Profile-2-150x150.png 150w, https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2019\/09\/Create-a-Customer-Profile-2-250x250.png 250w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/>Going further, you can even change the default RDP port to another one. Because hackers know the default RDP port, most brute-force attacks are designed to target this port. By changing the default port, you can avoid this type of attack.<\/p>\n<p>Changing the default RDP port on your server is a slightly more technical process, but there are plenty of <a href=\"https:\/\/www.liquidweb.com\/kb\/improving-security-for-your-remote-desktop-connection\/\" target=\"_blank\" rel=\"noopener noreferrer\">guides on how to do this<\/a>. It can also be a good solution if your staff are unable to use static IP addresses when working remotely because in that case scoping the port is impossible.<\/p>\n<p>Whilst I'm on the subject, it's also worth noting that this same technique \u2013 changing the default ports for particular types of connection \u2013 is a relatively easy and effective way of limiting DDoS attacks. Changing the ports for your cloud storage file sharing, for instance, <a href=\"https:\/\/www.infoq.com\/articles\/improving-cloud-security\" target=\"_blank\" rel=\"noopener noreferrer\">will improve your cloud security<\/a>, and you can even change the ports you use for VOIP if you want to harden that system as well.<\/p>\n<h2>The Bottom Line<\/h2>\n<p>Security is as important when using remote desktop software as when using any other connected system. And as remote working is becoming more popular, so attacks on these systems are becoming more popular as well.<\/p>\n<p>Taking the basic steps above to protect your remote desktop environment is a great start to hardening your system against the most common forms of cyberattack. By using a VPN, a firewall, and limiting access to this system, you can significantly reduce the vulnerability of it.<\/p>\n<p>Since remote desktop environments typically give users access to all of the information stored on a particular server, securing them should be one of the top priorities when it comes to network security. The consequences of someone gaining access to your remote desktop system with malicious intent can be severe, so make sure you protect yourself immediately.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Working via a remote desktop is more popular than ever. Unfortunately, that also means that remote desktop connections are a major target for hackers looking to intercept and steal commercially sensitive information.\u00a0<\/p>\n","protected":false},"author":66,"featured_media":35398,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[877,884],"tags":[],"class_list":["post-34872","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-articles","category-msp-business-articles"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/34872","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/users\/66"}],"replies":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/comments?post=34872"}],"version-history":[{"count":6,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/34872\/revisions"}],"predecessor-version":[{"id":54333,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/34872\/revisions\/54333"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/media\/35398"}],"wp:attachment":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/media?parent=34872"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/categories?post=34872"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/tags?post=34872"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}