Solved

How much of a security risk is opening port 3389 on a firewall?

Posted on 2010-09-19
7
2,333 Views
Last Modified: 2013-11-21
How much of a security risk is opening port 3389 on a firewall for RDP?  
0
Comment
Question by:bmcconn
7 Comments
 
LVL 74

Expert Comment

by:Glen Knight
ID: 33711531
Its not overly, thousands of IT admins all ocer the world use it for remote access.

You obviously still need to have credentials to login.

With SBS2003 it was a requirement for RWW.

0
 
LVL 27

Expert Comment

by:davorin
ID: 33711617
Agree with demazter.
As long as you have fully patched server...
0
 
LVL 6

Accepted Solution

by:
Azhrei1 earned 500 total points
ID: 33711644
just make sure you set up your default domain policy correctly, with requirements for password changes every now and then, complex passwords (easy ones will be guessed...I see attempts on my server alll day long cuz I have 3389 open as well). Maybe a minimum length of 8 characters or so.

And if you want to make it really secure you could add some security, but it might be too much of a hassle...if you're interested read this:

http://www.petri.co.il/securing_rdp_communications.htm
0
Best Practices: Disaster Recovery Testing

Besides backup, any IT division should have a disaster recovery plan. You will find a few tips below relating to the development of such a plan and to what issues one should pay special attention in the course of backup planning.

 

Expert Comment

by:Aakron
ID: 33711662
Agree with the above.
Also if you are paranoid or just have multiple servers you need to RDC u can change the listening port to non default:

1. Locate the following registry subkey:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\TerminalServer\WinStations\
RDP-Tcp\PortNumber
3. On the Edit menu, click Modify, and then click Decimal.
4. Type the new port number, and then click OK.
0
 
LVL 7

Expert Comment

by:oztrodamus
ID: 33714050
The degree to which you decide to protect RDP 3389 should be based on the importance of the data you're accessing. If all you want is a desktop so you can do some basic work on the server from home.
Then it's not that big of a deal. If it's a system that contains confidential customer information. Then you're not being very smart about it.
0
 

Expert Comment

by:SanthoshVK
ID: 33714693
Also if you dont want your attacker know that you have opened port for RDP protocol, then you can open a nonstandard port as Akron said and internally do a Port Address Translation (PAT) by adding firewall rules.

Hope this helps
0
 
LVL 31

Expert Comment

by:Cláudio Rodrigues
ID: 33716475
One thing no one is mentioning here is what is on the other side in terms of RDP listener. Is this a Windows 2000/2003/2008/2008 R2?
The reason for the question is simple. Depending on the version you CANNOT use certificates for the RDP connection what means it becomes susceptible to Man in the Middle Attacks.
If you are using certificates and have decent password policies (so no one can have a password like 'newyork', 'password', 'mom', etc you will be very safe. RDP itself, regarding on the version/certificates, is encrypted. And as Aakron mentioned, by changing the port you make things a little 'harder' for a possible attack.
Also keep in mind which market you are in as certain ones (healthcare, financial, etc) may have their own regulations regarding data safety like PCI/HIPAA etc. Make sure whatever you do meets these requirements for data being accessed remotely.

Cláudio Rodrigues
Microsoft MVP - Remote Desktop Services
Citrix CTP
0

Featured Post

Problems using Powershell and Active Directory?

Managing Active Directory does not always have to be complicated.  If you are spending more time trying instead of doing, then it's time to look at something else. For nearly 20 years, AD admins around the world have used one tool for day-to-day AD management: Hyena. Discover why

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Redirected folders in a windows domain can be quite useful for a number of reasons, one of them being that with redirected application data, you can give users more seamless experience when logging into different workstations.  For example, if a use…
To setup a SonicWALL for policy based routing to be used with the Websense Content Gateway there are several steps that need to be completed. Below is a rough guide for accomplishing this. One thing of note is this guide is intended to assist in the…
This tutorial will walk an individual through locating and launching the BEUtility application to properly change the service account username and\or password in situation where it may be necessary or where the password has been inadvertently change…
This tutorial will show how to configure a single USB drive with a separate folder for each day of the week. This will allow each of the backups to be kept separate preventing the previous day’s backup from being overwritten. The USB drive must be s…

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question