{"id":46649,"date":"2018-08-14T18:23:13","date_gmt":"2018-08-14T14:23:13","guid":{"rendered":"https:\/\/www.msp360.com\/resources\/?p=46649"},"modified":"2025-06-24T17:55:11","modified_gmt":"2025-06-24T13:55:11","slug":"security-considerations-and-best-practices","status":"publish","type":"post","link":"https:\/\/www.msp360.com\/resources\/blog\/security-considerations-and-best-practices\/","title":{"rendered":"Security Considerations and Best Practices"},"content":{"rendered":"<p>It is sometimes thought that only big companies are affected by cyberattacks because their data might be worth a fortune. In fact, intruders may prefer smaller ones, since it is easier to compromise their security. When you\u2019re working remotely with a company of any size, it is necessary to keep everything protected. Safety is our first priority, and we do our best for your data to be secure.<!--more--><\/p>\n<p><a href=\"https:\/\/youtu.be\/ZSXzHd9Ch6Q\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-51123\" src=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2018\/08\/Group-120.png\" alt=\"\" width=\"560\" height=\"340\" srcset=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2018\/08\/Group-120.png 560w, https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2018\/08\/Group-120-300x182.png 300w\" sizes=\"auto, (max-width: 560px) 100vw, 560px\" \/><\/a><\/p>\n<p><a href=\"https:\/\/www.msp360.com\/connect\/\">MSP360 Connect<\/a> uses ports 80 and 443. Our servers are located in AWS, which is well known for its reliability and physical security. All the channels are encrypted and all the connections are secured by SSL. Additionally, we have developed our own security features. Below, we\u2019ll describe how to set them up in the solution and also explain some practices that might be useful in our experience.<\/p>\n<div class=\"call-to-action\">\n<div class=\"call-to-action__left\" style=\"width: 45%;\">\n<p><img decoding=\"async\" src=\"https:\/\/www.msp360.com\/wp-content\/uploads\/2022\/04\/Connect-CTA-1.png\" alt=\"Connect icon\" \/><\/p>\n<\/div>\n<div class=\"call-to-action__right\" style=\"width: 55%;\">\n<div class=\"call-to-action__title\">MSP360 Connect.<br \/>\nSimple. Reliable<\/div>\n<div class=\"call-to-action__text\">\n<p>Securely connect and control remote devices and servers to resolve issues faster. Take advantage of high-speed stable connections regardless of the computer\u2019s global location.<\/p>\n<\/div>\n<!--HubSpot Call-to-Action Code --><span class=\"hs-cta-wrapper hs-cta-deferred\" id=\"hs-cta-wrapper-325bf518-e428-4b62-895a-4189e7f74314\" data-portal=\"5442029\" data-id=\"325bf518-e428-4b62-895a-4189e7f74314\"><span class=\"hs-cta-node hs-cta-325bf518-e428-4b62-895a-4189e7f74314\" id=\"hs-cta-325bf518-e428-4b62-895a-4189e7f74314\"><!--[if lte IE 8]><div id=\"hs-cta-ie-element\"><\/div><![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5442029\/325bf518-e428-4b62-895a-4189e7f74314\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-325bf518-e428-4b62-895a-4189e7f74314\" style=\"border-width:0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5442029\/325bf518-e428-4b62-895a-4189e7f74314.png\" alt=\"CTA\"><\/a><\/span><\/span><!-- end HubSpot Call-to-Action Code -->\n<\/div>\n<\/div>\n<h2>How to Set Up MSP360 Connect Security Features<\/h2>\n<p>When you create a custom build for a company, checking security options is a must. This helps you to protect your <a href=\"https:\/\/www.msp360.com\/solutions\/remote-access\/\">remote access<\/a>, making it inaccessible to intruders. You can find these options in <b>Downloads<\/b>; click <b>Download Build <\/b>near <b>Remote Desktop<\/b>, in the <b>Remote Computers Installation Package<\/b> hit <b>Remote Computers Installation<\/b>, and proceed to the <b>Security <\/b>tab.<\/p>\n<p id=\"last\">Here, you can see various PIN parameters, such as length or reset interval, so that it will be more difficult to find a match for those who don't know the PIN. But the main option here is the password. Click the <b>Allow unattended access only with Custom Password<\/b> checkbox and think up a password. This is strong protection because you have to enter the password every time you access the remote computer, which means it\u2019s an additional layer of security. The permitted number of incorrect inputs is three; when an intruder exceeds this, the connection drops.<\/p>\n<div id=\"slidebox\"><a class=\"close\">\u00a0<\/a><!--HubSpot Call-to-Action Code --><span class=\"hs-cta-wrapper hs-cta-deferred\" id=\"hs-cta-wrapper-79b6ff0d-42a9-4545-b559-d70d2e8731f2\" data-portal=\"5442029\" data-id=\"79b6ff0d-42a9-4545-b559-d70d2e8731f2\"><span class=\"hs-cta-node hs-cta-79b6ff0d-42a9-4545-b559-d70d2e8731f2\" id=\"hs-cta-79b6ff0d-42a9-4545-b559-d70d2e8731f2\"><!--[if lte IE 8]><div id=\"hs-cta-ie-element\"><\/div><![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5442029\/79b6ff0d-42a9-4545-b559-d70d2e8731f2\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-79b6ff0d-42a9-4545-b559-d70d2e8731f2\" style=\"border-width:0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5442029\/79b6ff0d-42a9-4545-b559-d70d2e8731f2.png\" alt=\"CTA\"><\/a><\/span><\/span><!-- end HubSpot Call-to-Action Code --><\/div>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-46654\" src=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2020\/12\/image4-1.png\" alt=\"Managed Remote Desktop Security Features\" width=\"414\" height=\"310\" srcset=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2020\/12\/image4-1.png 414w, https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2020\/12\/image4-1-300x225.png 300w\" sizes=\"auto, (max-width: 414px) 100vw, 414px\" \/><\/p>\n<p>The PIN and password options allow you to protect data from your side. From the user's side, you can also set some restrictions. Go to the <b>Limitations <\/b>tab and sort out the options; you can limit access to configuration or GUI, so that no one will be able to change anything, intentionally or unintentionally.<\/p>\n<h2>MSP360 Connect Security Best Practices<\/h2>\n<p>There are several practices that it is worth implementing to keep your and your users\u2019 data safe.<\/p>\n<p>When you create a build, you can change the time it expires. We recommend using the default option \u2013 a week. If you choose a month or a year, it will be easier to compromise the safety of the build. Additionally, the passwords should be changed regularly, and after each change, you\u2019ll need to generate a new build.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-46652\" src=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2020\/12\/image2-2.png\" alt=\"Managed Remote Desktop: Build Existence\" width=\"678\" height=\"341\" srcset=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2020\/12\/image2-2.png 678w, https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2020\/12\/image2-2-300x151.png 300w, https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2020\/12\/image2-2-624x314.png 624w\" sizes=\"auto, (max-width: 678px) 100vw, 678px\" \/><\/p>\n<p>When you set up a password, make it strong. Use different capitalization, special symbols, letters, and digits.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-46655\" src=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2020\/12\/image5-1.png\" alt=\"Managed Remote Desktop: Strong Password\" width=\"401\" height=\"103\" srcset=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2020\/12\/image5-1.png 401w, https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2020\/12\/image5-1-300x77.png 300w\" sizes=\"auto, (max-width: 401px) 100vw, 401px\" \/><\/p>\n<p>To protect the endpoints \u2013 your users\u2019 computers \u2013 remove all the marks in the <b>Limitations <\/b>tab, so no one except you will be able to access the configuration and GUI on these PCs. The outgoing connections are also unnecessary for users, and these connections could be dangerous if an intruder were able to access them.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-46651\" src=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2020\/12\/image1-2.png\" alt=\"Setting Up Limitations in Managed Remote Desktop\" width=\"490\" height=\"316\" srcset=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2020\/12\/image1-2.png 490w, https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2020\/12\/image1-2-300x193.png 300w\" sizes=\"auto, (max-width: 490px) 100vw, 490px\" \/><\/p>\n<p>When you\u2019re enabling remote access for users\u2019 computers, remember that the data that is located there might be compromised via the Internet. To reduce the risks, use strong passwords and be sure that they are inaccessible to intruders.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-46653\" src=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2020\/12\/image3-1.png\" alt=\"Managed Remote Desktop Security\" width=\"719\" height=\"324\" srcset=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2020\/12\/image3-1.png 719w, https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2020\/12\/image3-1-300x135.png 300w, https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2020\/12\/image3-1-624x281.png 624w\" sizes=\"auto, (max-width: 719px) 100vw, 719px\" \/><\/p>\n<p>We value the safety of our solution above all. With Managed Connect, all your data is protected. If you have any remaining questions, please contact our pre-sales team.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It is sometimes thought that only big companies are affected by cyberattacks because their data might be worth a fortune. In fact, intruders may prefer smaller ones, since it is easier to compromise their security. When you\u2019re working remotely with a company of any size, it is necessary to keep everything protected. Safety is our [&hellip;]<\/p>\n","protected":false},"author":89,"featured_media":53720,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[878,931],"tags":[1012],"class_list":["post-46649","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-msp-university","category-msp360-product-guides","tag-getting-started-with-msp360-connect-managed-console"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/46649","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/users\/89"}],"replies":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/comments?post=46649"}],"version-history":[{"count":8,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/46649\/revisions"}],"predecessor-version":[{"id":56613,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/46649\/revisions\/56613"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/media\/53720"}],"wp:attachment":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/media?parent=46649"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/categories?post=46649"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/tags?post=46649"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}