• Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 259
  • Last Modified:

Can network see my RDC session?

I have to use remote desktop connection to connect to another/client server...but the client is adamant that we the network I am working from not track any data like ip address and such ...is this a problem?
0
GlobaLevel
Asked:
GlobaLevel
  • 3
  • 3
1 Solution
 
JammyPakCommented:
'the network' is a bunch of connected devices. If any of these devices is say sniffing all of the traffic , then yes it would see the destination ip address of your outbound rdp request. But if it's just a 'normal' network that isn't logging and capturing anything (like I would guess) then you're probably fine.

are you connecting via vpn before rdp? rdp over the internet?
0
 
GlobaLevelProgrammerAuthor Commented:
Connecting via tsp over Internet ...is there a way to test to see if there us a packet sniffer?...is there a website that I connect to that masks all that data...sometimes we work from a free public  wifi like panera bread and we just need to be sure 'no' data is compromised...
0
 
GlobaLevelProgrammerAuthor Commented:
Not tsp but rdp
0
Network Scalability - Handle Complex Environments

Monitor your entire network from a single platform. Free 30 Day Trial Now!

 
JammyPakCommented:
you won't be able to tell if anyone else is sniffing your data. you could try out a proxy server that anonymizes you, but I don't have any experience with those (there are lots if you google)

the only thing that would be visible would be your initial connection request once the session is there everything is encrypted. you might be able to capture the external IP that's being requested but that is public anyway it doesn't really give away a big secret. You could change the rdp port from the default one so that it's somewhat less obvious what it is, but anyone who's interested can port scan your public IPs and figure it out anyway
0
 
GlobaLevelProgrammerAuthor Commented:
Can you please give me more info on port scan ips
0
 
JammyPakCommented:
I'm just saying there are tools you can run against a public IP to see what ports it is responding on. To that end, if someone was sniffing their or your public traffic and saw what public IP address you are connecting to, that wouldn't give them much more information than they could have figured out themselves if they were interested. It also doesn't give them a lot of useful information.

do a search on 'port scanner' and you'll find lots
0
 
bbaoIT ConsultantCommented:
there are a number of ways to secure RDP sessions as per MS best practices.

Configure Security Settings for Remote Desktop Services Connections
http://technet.microsoft.com/en-us/library/cc753488.aspx

however, you may add extra network layer protection by creating a VPN channel before establishing a RDP session to remote business-critical servers. this approach also protect the remote servers as the must-open RDP listening port will not be exposed to the public.

in regard to changing the listening port of RDP, it does not help in securing the servers as the port can be discovered through a simple port scan. commonly, changing port number may help in avoiding port conflicts, such as forwarding RDP requests over NAT.

hope it helps,
bbao
0
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

Featured Post

Ultimate Tool Kit for Technology Solution Provider

Broken down into practical pointers and step-by-step instructions, the IT Service Excellence Tool Kit delivers expert advice for technology solution providers. Get your free copy now.

  • 3
  • 3
Tackle projects and never again get stuck behind a technical roadblock.
Join Now