Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win


Terminal Services Security

Posted on 2012-03-12
Medium Priority
Last Modified: 2012-03-26
I have a remote web server that I access using Terminal Services.  I noticed (in the event log) that someone is attempting to access the machine.  There are numerous "invalid logon" attempts (every second).

This is a W2008 server.  What is the best way to secure this?   Is there a way to automatically block an IP that has repeated bad logons?

I need to be able to access this server from any location.  Is there a certificate method?
Question by:No1Coder
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 5
  • 3
LVL 40

Expert Comment

ID: 37710971
You can use certificate for authentification:
IP blocking is function of firewall, it is not possible in RDP settings.

Author Comment

ID: 37711940
If I setup the certificate, does that require something extra on the client computers I will be using?
LVL 40

Expert Comment

ID: 37713128
You should install certificate on client:
May be this article will be interesting to you:
This parameter was new for me:
Set an account lockout policy - There are tools that will use brute-force to guess passwords and log-on remotely. You cannot totally stop this, but you can minimized it by setting an account lockout policy. If someone tries to guess the password, then after a few guesses they will be locked out for a period of time.
What does it mean to be "Always On"?

Is your cloud always on? With an Always On cloud you won't have to worry about downtime for maintenance or software application code updates, ensuring that your bottom line isn't affected.


Author Comment

ID: 37729165
I setup account lockout policies but they don't seem to work for terminal service connections.  I am still seeing numerous invalid logon attempts every few seconds.  If the lockout was working, I would think it would lock the attemp out for 30 minutes.

These articles are fairly complex.  Event the wizards are pretty complex.  I'm afraid will will lock myself out, or lock out customer access to teh web sites.

I just want to be sure that terminal services connections are from me, although it can be fro multiple machines.

What is the best approach.
LVL 40

Expert Comment

ID: 37729290
As I've stated before - for successfull filtering of attacks you need firewall.
You can try to use internal server 2008 firewall, but usually some external (hardware or software) is used.
Here are some basics:
You can block individual Ips:
LVL 40

Expert Comment

ID: 37734290

Author Comment

ID: 37746584
I don;t think IP filtering will work.  The attacks seem to be coming from more tahn one IP address.

Would a VPN connection be more secure?  I could establish a VPN, and then do terminal services.  I would not have to open the port (3389) publically.
LVL 40

Accepted Solution

als315 earned 1000 total points
ID: 37746694
Good idea. This is usual setup.

Featured Post


Modern healthcare requires a modern cloud. View this brief video to understand how the Concerto Cloud for Healthcare can help your organization.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Ever visit a website where you spotted a really cool looking Font, yet couldn't figure out which font family it belonged to, or how to get a copy of it for your own use? This article explains the process of doing exactly that, as well as showing how…
In this post we will be converting StringData saved within a text file into a hash table. This can be further used in a PowerShell script for replacing settings that are dynamic in nature from environment to environment.
With the advent of Windows 10, Microsoft is pushing a Get Windows 10 icon into the notification area (system tray) of qualifying computers. There are many reasons for wanting to remove this icon. This two-part Experts Exchange video Micro Tutorial s…
Finding and deleting duplicate (picture) files can be a time consuming task. My wife and I, our three kids and their families all share one dilemma: Managing our pictures. Between desktops, laptops, phones, tablets, and cameras; over the last decade…

618 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question