Blog

Remote Desktop Protocol Security

Written by Waits Sharpe | May 17, 2023 2:29:19 PM

What is Remote Desktop Protocol?

Remote Desktop Protocol or "RDP" is a networking protocol created by Microsoft to allow a computer to remotely access and configure another computer from a distance. RDP allows a client to access a virtual desktop and application on another server or computer from anywhere, making administration and configuration for remote workers incredibly easy. RDP is an extremely common protocol because of the flexibility it provides for remote workers as well as the security that comes with the service. RDP creates a secure channel that protects the traffic being transmitted between the two computers.

The main goal of RDP is to aid in remote administration. IT technicians or support desk workers can easily establish a remote desktop connection to another computer that either needs to be configured or troubleshooted. Techs no longer have to travel to fix computers or address IT issues, they can access and figure out the problem from anywhere. This allowance for remote work has led to an increase in "bring your own device" workplaces. Users can bring their own personal devices into the office or access their work materials from the comfort of their own home or while they are traveling. This can lead to increased productivity as well as saving money on physical infrastructure.

Benefits of RDP

No matter the size of the business, implementing RDP comes with a host of benefits. As previously mentioned BYOD policies have allowed businesses to save on hardware costs and the licensing fees for certain applications and software. Workers can get their job done from home while using the technology they are comfortable with. RDP can also be used to create a mobile support desk, with technicians able to troubleshoot issues from anywhere.

For many SMB's without an IT support staff they can now outsource their IT to a managed service provider who can protect and manage their systems remotely. Remote desktop protocol can also be used to provide remote printing services, multiple displays, and administration of what are known as "headless computers", servers that are built without a monitor or GUI readily accessible.

Is RDP Secure?

Remote Desktop Protocol was created with security in mind. When utilized, RDP creates a secure channel that secures traffic between the two devices. This ensures that the only people in on the conversation are the client and the destination server/device. RDP uses TCP/IP for its transport protocol and is established using port 3389. When a connection is initiated, a security handshake occurs that encrypts and secures the channel that is about to used for communication. However, RDP is only as secure as you let it be. There are ways cyber criminals can exploit it if you don't utilize or implement it correctly.

For starters, RDP usually requires a login for users to to access the protocol. A user enters their username and password and are then authenticated against the RDP server. Once they are deemed trustworthy they are given access to the virtual computer. This is why password security is important. If an attacker is able to guess your password, or brute force it then they will have the exact same access to your organizations network as you do. This is why practices good password hygiene and implementing MFA is important.

Another way cyber criminals can crack your RDP is through public facing ports. As previously mentioned, RDP connections are typical established through the default port 3389. If you've left this port open to the internet then cyber criminals can connect to your network and establish a remote connection. You can curb this tactic by locking down the port, or changing RDP from its default port to something else.

If your organization is looking to implement an RDP policy and needs help, contact CorpInfoTech today to see how our managed services can secure and maintain your entire IT infrastructure!

 

CorpInfoTech (Corporate Information Technologies) provides small to mid-market organizations with expert I.T. services including compliance assessment, cybersecurity penetration tests, and comprehensive business continuity planning services. CorpInfoTech can help organizations, quantify, create, refine, and mitigate the risks presented by business threatening disasters in whatever form they may be disguised.