?
Solved

Securing Remote desktop

Posted on 2010-08-26
4
Medium Priority
?
414 Views
Last Modified: 2013-11-21
I want to let prospective companies look at an application server inside our network, but restrict them from downloading or removing any of the code. Programmers generally know how to get around restrictions. The server is 2003 Standard edition, and I've created a user that is only a member of remote desktop users. I've also prevented local drive mapping and clipboard via Terminal Service Configuration.

What about ftp via browser or command line?

What other methods would a person use?

What else should i be doing?
0
Comment
Question by:zen_68
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 
LVL 7

Expert Comment

by:simonseztech
ID: 33531036
You have a few options here.

Here 2 options that I know will work.
You can install 2X Application Server (http://www.2x.com/applicationserver/) that let other only remote the application (not the whole desktop). They have a free version up to 5 connection.

You can also check ThinApp (from VMware) it's an application streaming technologie (http://www.vmware.com/products/thinapp/).
0
 
LVL 7

Accepted Solution

by:
simonseztech earned 2000 total points
ID: 33531080
You can also "lockdown" your windows 2003 remote desktop via group policy (http://support.microsoft.com/kb/278295)
0
 
LVL 31

Expert Comment

by:Cláudio Rodrigues
ID: 33543122
Well they can for example print stuff. So you should disable that.
The reality is they can always do PRINT SCREEN if they really want to steal information. Cumbersome, yes, it is. But can be done.

Cláudio Rodrigues
Microsoft MVP - Remote Desktop Services
Citrix CTP
0
 

Author Comment

by:zen_68
ID: 33561921
hmmmm...looking for a bit deeper info.
0

Featured Post

Simplifying Server Workload Migrations

This use case outlines the migration challenges that organizations face and how the Acronis AnyData Engine supports physical-to-physical (P2P), physical-to-virtual (P2V), virtual to physical (V2P), and cross-virtual (V2V) migration scenarios to address these challenges.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

1. Boot PC and press F10, select storage options and change the compatibility from “AHCI” to “IDE”, save and exit 2. Boot PC and press F12 3. Upon PXE display of searching for DHCP server, press Pause break to obtain MAC address 3. Open Configu…
Some time ago I faced the need to use a uniform folder structure that spanned across numerous sites of an enterprise to be used as a common repository for the Software packages of the Configuration Manager 2007 infrastructure. Because the procedu…
In this video you will find out how to export Office 365 mailboxes using the built in eDiscovery tool. Bear in mind that although this method might be useful in some cases, using PST files as Office 365 backup is troublesome in a long run (more on t…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

752 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question