Chapter 7. Securing RDP
Information in this chapter:
▪ General RDP Attacks and Mitigation
▪ Direct Access of Multiple RDP Hosts
▪ Workstation Host Considerations
▪ Limiting Access with Source Port Access Rules
This chapter will cover the many methods and processes you may utilize to secure your deployment of RDP, both internally and on the Internet. It delves deeply into authentication and authorization of direct RDP connections as well as via Terminal Services Gateway (TSG). Certificate deployment and client remote workspaces are discussed, and I have provided a new custom-designed tool specifically for the book that allows users to dramatically increase the ...