Solved

Remote desktop connection, configuration and security

Posted on 2011-09-12
2
385 Views
Last Modified: 2012-05-12
HI,

To be compliant with PCI, we need to review the way we have configured Remote Desktop Protocol. We need to be using Remote Desktop Connection, with HIGH encryption level. At my organization, people use RDC when:

* Admins and users are physically outside of the network: In which case, they have to VPN to the network and then only they can remote in to the intended machine.
* Admins and users are physically on the network: In which case, they can directly start a remote session with the server.

PCI requirement is not very clear about whether we need to have high encryption level for "on-network" type of connections or this requirement is only meant for organizations allowing RDP over internet?

If you PCI better, that's great, please share !

But from technical standpoint, I also want to compare the security aspect of using RDP over the internet and RDP over VPN. Can we say RDP over VPN is quite secure ? What measures can I take to secure RDC sessions.

Thanks !
0
Comment
Question by:pratz09
2 Comments
 
LVL 19

Accepted Solution

by:
CoccoBill earned 500 total points
Comment Utility
The only requirement for internal traffic is that all sensitive information such as authentication credentials need to be protected, encrypting other traffic is merely recommended. RDP protects the authentication credentials and provides some level of encryption so this should not be a problem.

RDP over VPN is as secure as anything over VPN. For external RDP access I would only allow it with High or FIPS-compliant encryption, and either TLS or network-level authentication to mitigate man-in-the-middle attacks. For external access one measure that would greatly improve the security would be to restrict the addresses connections can be made from in the VPN gateway/firewall, if that's possible.
0
 

Author Closing Comment

by:pratz09
Comment Utility
Thanks !
0

Featured Post

Free Trending Threat Insights Every Day

Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

Join & Write a Comment

Let’s list some of the technologies that enable smooth teleworking. 
Since pre-biblical times, humans have sought ways to keep secrets, and share the secrets selectively.  This article explores the ways PHP can be used to hide and encrypt information.
How to install and configure Citrix XenApp 6.5 - Part 1. In this video tutorial we have explained step by step installation of Citrix XenApp 6.5 Server on Windows Server 2008 R2 is explained in this video. We have explained the difference between…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

763 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

6 Experts available now in Live!

Get 1:1 Help Now