O'Reilly logo

Thor's Microsoft Security Bible by Timothy Thor Mullen

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 7. Securing RDP
Information in this chapter:
▪ General RDP Attacks and Mitigation
▪ RDP Solutions Overview
▪ Direct Access of Multiple RDP Hosts
▪ RDG/TSG
▪ RDP Host Security
▪ RDWeb and RemoteApp
▪ Workstation Host Considerations
▪ Limiting Access with Source Port Access Rules
▪ Show Me the Code
This chapter will cover the many methods and processes you may utilize to secure your deployment of RDP, both internally and on the Internet. It delves deeply into authentication and authorization of direct RDP connections as well as via Terminal Services Gateway (TSG). Certificate deployment and client remote workspaces are discussed, and I have provided a new custom-designed tool specifically for the book that allows users to dramatically increase the ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required