Hello,<\/p>\n
I am looking for recommendations on how to secure RDP for access to Windows Servers. MFA sounds like a good start but I’m not sure the best options are to do this. I was thinking perhaps setting up a jump box or bastion host with MFA. Does anyone have other ideas?<\/p>","upvoteCount":23,"answerCount":23,"datePublished":"2022-09-10T13:02:07.000Z","author":{"@type":"Person","name":"blacklight321234","url":"https://community.spiceworks.com/u/blacklight321234"},"suggestedAnswer":[{"@type":"Answer","text":"
Hello,<\/p>\n
I am looking for recommendations on how to secure RDP for access to Windows Servers. MFA sounds like a good start but I’m not sure the best options are to do this. I was thinking perhaps setting up a jump box or bastion host with MFA. Does anyone have other ideas?<\/p>","upvoteCount":23,"datePublished":"2022-09-10T13:02:08.000Z","url":"https://community.spiceworks.com/t/how-to-secure-rdp/935679/1","author":{"@type":"Person","name":"blacklight321234","url":"https://community.spiceworks.com/u/blacklight321234"}},{"@type":"Answer","text":"
Secure it on the LAN or over the internet - the latter is a bad idea, but you could start by restricting the IPs allowed to RDP to it.<\/p>\n
Likewise, with LAN based RDP, you could limit only RDP sessions from the IT users devices (they would also have to be static or on a subnet of their own) as a start to reduce the risks<\/p>","upvoteCount":1,"datePublished":"2022-09-10T13:06:14.000Z","url":"https://community.spiceworks.com/t/how-to-secure-rdp/935679/2","author":{"@type":"Person","name":"Rod-IT","url":"https://community.spiceworks.com/u/Rod-IT"}},{"@type":"Answer","text":"
Avoid direct internet RDP connections if at all possible. For remote users, have them VPN in to access RDP. Most modern firewalls allow for easy VPN setup including MFA access for VPN connection. For access to the RDP itself, you can configure certificate based access (internal certs are fine for this - no need to spend big bucks for NetSol, DigiCert, etc. since these will only be used inside your enterprise) and can even use these certs as part of the VPN authentication.<\/p>","upvoteCount":10,"datePublished":"2022-09-10T15:23:38.000Z","url":"https://community.spiceworks.com/t/how-to-secure-rdp/935679/3","author":{"@type":"Person","name":"jeffjones11","url":"https://community.spiceworks.com/u/jeffjones11"}},{"@type":"Answer","text":"
We dumped all external RDP access a couple of years ago, there is just so many better options out there. VPN to internal system and then RDP or go with a service like Conectwise with MFA.<\/p>","upvoteCount":0,"datePublished":"2022-09-10T15:57:01.000Z","url":"https://community.spiceworks.com/t/how-to-secure-rdp/935679/4","author":{"@type":"Person","name":"Repairatrooper","url":"https://community.spiceworks.com/u/Repairatrooper"}},{"@type":"Answer","text":"
My feeling is no RDP to the internet, unless you want to do custom ports for the traffic, but if I’m not mistaken, crims can listen on many ports for RDP traffic?<\/p>\n
VPN is the way to go. Then I would decide how you want to filter who can connect to the host with RDP enabled. Some good ideas have already been posted.<\/p>","upvoteCount":1,"datePublished":"2022-09-10T17:11:25.000Z","url":"https://community.spiceworks.com/t/how-to-secure-rdp/935679/5","author":{"@type":"Person","name":"chivo243","url":"https://community.spiceworks.com/u/chivo243"}},{"@type":"Answer","text":"
Bastion host for cloud workloads is great since the portal can be controlled with conditional access/etc. On-prem, VPN into the network and then allow to a jump box as the entry point and then jump from there (rather than allowing all RDP from the VPN network), enforce MFA for the VPN.<\/p>","upvoteCount":0,"datePublished":"2022-09-10T18:32:01.000Z","url":"https://community.spiceworks.com/t/how-to-secure-rdp/935679/6","author":{"@type":"Person","name":"bbigford","url":"https://community.spiceworks.com/u/bbigford"}},{"@type":"Answer","text":"
My first thought was to use a SSH tunnel (don’t ask me for details … it’s something I’ve heard of, but never used myself).<\/p>\n
A VPN (as suggested by others) would probably be a better option … just make sure it is setup well. Improperly implemented VPNs can actually be a security hole/risk.<\/p>\n
Where I work, we provide remote RDP access via Citrix (is it still called XenApp?).<\/p>","upvoteCount":0,"datePublished":"2022-09-11T04:47:59.000Z","url":"https://community.spiceworks.com/t/how-to-secure-rdp/935679/7","author":{"@type":"Person","name":"graeme-n","url":"https://community.spiceworks.com/u/graeme-n"}},{"@type":"Answer","text":"
As has been advised, VPN connection first then Remote Desktop access through via the VPN is the way to do remote access.
\nAny login prompt that you have open to the Internet is easy to find. Doesn’t matter if it is on the standard port or your so-called random one. The script kiddies and the hacker 101 tools will scan the port range.
\nSSH tunnelling is a technique of locally re-directing a tcp port to port 22 and then passing the traffic on port 22 (ssh’s well-known port) through the firewall. Similar re-directing is done on the local end also. It is convenient, but I would not allow it or recommend using it in a production environment.<\/p>","upvoteCount":0,"datePublished":"2022-09-11T12:33:28.000Z","url":"https://community.spiceworks.com/t/how-to-secure-rdp/935679/8","author":{"@type":"Person","name":"jadrien","url":"https://community.spiceworks.com/u/jadrien"}},{"@type":"Answer","text":"
So there is lots of confusion out there on this topic. When you hear it said that RDP should never be open to the public. What is meant is raw TCP 3389. A Microsoft RDS Gateway, Azure Bastion, a Citrix Netscaler Gateway or VMware Horizon View Universal Gateway all are tunneling technologies. So you can hack the same thing together with a VPN or SSH tunnel. The trick is to do so in addition to some other form of authentication. Restricting by IP is pretty basic but counts. A device or user authentication certificate in addition to password is better. But TOTP or Push Authentication MFA is generally considered best. Duo will integrate directly with the Microsoft RDS Gateway. Or you could use AzureAD App Proxy. These are well established and affordable solutions.<\/p>\n
Moreover, beyond setting up and establishing tunneling and MFA you still need to harden your Gateway preferably with a next generation firewall and also your endpoints.<\/p>","upvoteCount":6,"datePublished":"2022-09-11T13:01:56.000Z","url":"https://community.spiceworks.com/t/how-to-secure-rdp/935679/9","author":{"@type":"Person","name":"kevinkerrigan","url":"https://community.spiceworks.com/u/kevinkerrigan"}},{"@type":"Answer","text":"
+1 for VPN 1st.<\/p>\n
You forgot to mention whether this was on-premise or cloud.<\/p>\n
If On-Premise, I’ve been using Sonicwall UTMs for decades for SMB client VPN’s. You can use the traditional client, or, SSH Client. They work similarily, however with SSH you have the option of creating an easy-to-use landing page for a RDP Bookmark to the desired device.<\/p>\n
It looks like you can now actually create Application RDP bookmarks - not just whole-desktop - with the latest firmwares.<\/p>\n