Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
?
Solved

Remote desktop connection, configuration and security

Posted on 2011-09-12
2
Medium Priority
?
398 Views
Last Modified: 2012-05-12
HI,

To be compliant with PCI, we need to review the way we have configured Remote Desktop Protocol. We need to be using Remote Desktop Connection, with HIGH encryption level. At my organization, people use RDC when:

* Admins and users are physically outside of the network: In which case, they have to VPN to the network and then only they can remote in to the intended machine.
* Admins and users are physically on the network: In which case, they can directly start a remote session with the server.

PCI requirement is not very clear about whether we need to have high encryption level for "on-network" type of connections or this requirement is only meant for organizations allowing RDP over internet?

If you PCI better, that's great, please share !

But from technical standpoint, I also want to compare the security aspect of using RDP over the internet and RDP over VPN. Can we say RDP over VPN is quite secure ? What measures can I take to secure RDC sessions.

Thanks !
0
Comment
Question by:pratz09
2 Comments
 
LVL 19

Accepted Solution

by:
CoccoBill earned 2000 total points
ID: 36528443
The only requirement for internal traffic is that all sensitive information such as authentication credentials need to be protected, encrypting other traffic is merely recommended. RDP protects the authentication credentials and provides some level of encryption so this should not be a problem.

RDP over VPN is as secure as anything over VPN. For external RDP access I would only allow it with High or FIPS-compliant encryption, and either TLS or network-level authentication to mitigate man-in-the-middle attacks. For external access one measure that would greatly improve the security would be to restrict the addresses connections can be made from in the VPN gateway/firewall, if that's possible.
0
 

Author Closing Comment

by:pratz09
ID: 36533045
Thanks !
0

Featured Post

Evaluating UTMs? Here's what you need to know!

Evaluating a UTM appliance and vendor can prove to be an overwhelming exercise.  How can you make sure that you're getting the security that your organization needs without breaking the bank? Check out our UTM Buyer's Guide for more information on what you should be looking for!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The well known Cerber ransomware continues to spread this summer through spear phishing email campaigns targeting enterprises. Learn how it easily bypasses traditional defenses - and what you can do to protect your data.
Will you be ready when the clock on GDPR compliance runs out? Is GDPR even something you need to worry about? Find out more about the upcoming regulation changes and download our comprehensive GDPR checklist today !
How to install and configure Citrix XenApp 6.5 - Part 1. In this video tutorial we have explained step by step installation of Citrix XenApp 6.5 Server on Windows Server 2008 R2 is explained in this video. We have explained the difference between…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Suggested Courses

564 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question