Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

Securing Remote desktop

Posted on 2010-08-26
4
410 Views
Last Modified: 2013-11-21
I want to let prospective companies look at an application server inside our network, but restrict them from downloading or removing any of the code. Programmers generally know how to get around restrictions. The server is 2003 Standard edition, and I've created a user that is only a member of remote desktop users. I've also prevented local drive mapping and clipboard via Terminal Service Configuration.

What about ftp via browser or command line?

What other methods would a person use?

What else should i be doing?
0
Comment
Question by:zen_68
  • 2
4 Comments
 
LVL 7

Expert Comment

by:simonseztech
ID: 33531036
You have a few options here.

Here 2 options that I know will work.
You can install 2X Application Server (http://www.2x.com/applicationserver/) that let other only remote the application (not the whole desktop). They have a free version up to 5 connection.

You can also check ThinApp (from VMware) it's an application streaming technologie (http://www.vmware.com/products/thinapp/).
0
 
LVL 7

Accepted Solution

by:
simonseztech earned 500 total points
ID: 33531080
You can also "lockdown" your windows 2003 remote desktop via group policy (http://support.microsoft.com/kb/278295)
0
 
LVL 31

Expert Comment

by:Cláudio Rodrigues
ID: 33543122
Well they can for example print stuff. So you should disable that.
The reality is they can always do PRINT SCREEN if they really want to steal information. Cumbersome, yes, it is. But can be done.

Cláudio Rodrigues
Microsoft MVP - Remote Desktop Services
Citrix CTP
0
 

Author Comment

by:zen_68
ID: 33561921
hmmmm...looking for a bit deeper info.
0

Featured Post

Enterprise Mobility and BYOD For Dummies

Like “For Dummies” books, you can read this in whatever order you choose and learn about mobility and BYOD; and how to put a competitive mobile infrastructure in place. Developed for SMBs and large enterprises alike, you will find helpful use cases, planning, and implementation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

My previous article  (http://www.experts-exchange.com/OS/Microsoft_Operating_Systems/Server/Windows_Server_2008/A_4466-A-beginners-guide-to-installing-SCCM2007-on-Windows-2008-R2-Server.html)detailed one possible method to get SCCM 2007 installed an…
Welcome to my series of short tips on migrations. Whilst based on Microsoft migrations the same principles can be applied to any type of migration. My first tip is around source server preparation. No migration is an easy migration, there is a…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
I've attached the XLSM Excel spreadsheet I used in the video and also text files containing the macros used below. https://filedb.experts-exchange.com/incoming/2017/03_w12/1151775/Permutations.txt https://filedb.experts-exchange.com/incoming/201…

809 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question