Protection against attacks targeting RDP

by | Oct 24, 2017

Microsoft’s Remote Desktop Protocol (RDP) allows remote connection to a computer to provide, for example, computer support. The ability to take control of the computer is a very useful feature for users, but also for cybercriminals.

Port and network scanners allow to find computers with this protocol enabled, and the hackers find out the access data with the so-called “brute-force attacks” to connect to them. They consist of testing all possible combinations until you get the right one, which allows to take complete control of the server and thus to install a ransomware, keylogger, disable security measures…

In order to protect our devices against these attacks it is necessary to take certain security measures. Some are very simple, like using a username and password as long and complicated as possible or disable the Administrator account** so that they can not connect through it.

It will also serve as a security barrier configure users with permission to use this protocol properly, thus preventing third parties from connecting through users who don´t have this feature.

Reducing the number of login attempts before the user account is blocked from the Administration tools will also work as protection against this type of attack.

Finally, changing the port that is used will make it appear that the port is closed, blocked and as if we did not use the RDP protocol, so that in the results of the scanners will appear that we are not using this protocol.

Source: Redes Zone



Submit a Comment

Your email address will not be published. Required fields are marked *

Recent posts

VDI: The most secure environment for hybrid working

Today is Data Privacy Day. The purpose of this date is to raise awareness and promote privacy and data protection best practices. It was initiated by the European Commission, the Council of Europe, and the Data Protection authorities of the European Union’s member states. Their main goal was to drive attention to the importance of privacy, user data protection, and compliance of the General Data Protection Regulation (RGPD). It is a regulation characterized by significant fines for non-compliance since its implementation in 2018.

How to avoid issues with virtual machines

Virtualization comes with a wide range of benefits for organizations. It helps cut IT costs and reduces downtime while increasing efficiency and productivity. It also increases the resiliency of networks, primarily when disasters occur, and promotes more green-friendly operations.

However, using virtual machines also comes with a set of downsides. Information security may get compromised, workloads mixed up, separation duties lost, among other issues. It is vital to know how you can get over these problems, and that’s what this article will discuss.

Let’s get started.


Stay up to date with all the news from UDS ENTERPRISE through our social networks. Follow us!

Skip to content