Remote Desktop Protocol
This is quite old technology but yes, it’s very useful now a days. What we know about RDP in generic that, a computer technical support staff can view and control a remote site PC or system through using this technology through internet by sharing the input and display unit and gives the support person the capacity to diagnose and resolve problems remotely.
So here, Remote Desktop Protocol (RDP) is used for communication between the Terminal Server and the Terminal (RDP) Client. RDP is a multichannel capable protocol that allows for distinct virtual channels for carrying the information such as encrypted data, presentation data, license information, device activity, etc. RDP is encapsulated and encrypted within TCP. RDP is designed to support many LAN protocols, such as IPX, NetBIOS, TCP/IP, network topologies like ISDN. It provides remote display and input abilities over network connections for Windows-based applications running on a server.
Cloud computing technology enables its users to work remotely, but that is where the similarities with RDP end. With cloud computing, users can access applications and files located in the cloud and on cloud servers. But RDP allows them to access files on their computer from a separate location. Both tools are beneficial for remote working but work in very different ways.
Ideally RDP provides 64,000 separate channels for data transmission. The RDP protocol opens a dedicated network channel for communicating data back and forth between the connected machines. It always uses network port 3389 for this purpose.
RDP Client
You can also use a Remote Desktop client to access your remote PC from almost any device. It applies to Windows 7 Professional, Enterprise edition, Windows 8, Windows 8.1, Windows Server 2008, Windows Server 2012 R2, etc.
Advantages
One advantage is that it does not require a VPN. It also keeps data stored securely on the user's desktop, instead of storing it on cloud servers or on the user's unsecured personal devices. Furthermore, RDP enables companies to allow their employees to work from home. This has been helped millions of employees to work during the COVID pandemic situation.
Cons
Remote Desktop Protocol (RDP) has been known since 2016 as a way to attack some computers and networks. Hackers, Malicious cyber attacker, have developed methods of identifying and exploiting vulnerable RDP sessions via the Internet to steal identities, login credentials and install and launch ransomware attacks.
- One little mis-configuration like exposing RDP to the internet can lead to a cyber-attack. The attacks include weak user login credentials, as computer passwords are also used to access remote RDP logins, which leave users open to brute-force attacks and credential stuffing.
- The lag that RDP causes may result in lower employee productivity.
- RDP can result in a bad users experiencing, especially if they have a slow internet connection.
- Keep all the security patches in local system and updated in time.
- Close TCP Port 3389 on the computers and routers if RDP not required.
- Scan your network for computers using RDP and if the service is not needed disable it.
- Restrict login attempts.
- Use two-factor authentication.
- Limit the number of third-party vendors and employees that have access to RDP connections.
- To encrypt RDP traffic, use VPN connections.
-DR
No comments:
Post a Comment