Chapter 7. Securing RDP
Information in this chapter:
▪ General RDP Attacks and Mitigation
▪ RDP Solutions Overview
▪ Direct Access of Multiple RDP Hosts
▪ RDP Host Security
▪ RDWeb and RemoteApp
▪ Workstation Host Considerations
▪ Limiting Access with Source Port Access Rules
▪ Show Me the Code
This chapter will cover the many methods and processes you may utilize to secure your deployment of RDP, both internally and on the Internet. It delves deeply into authentication and authorization of direct RDP connections as well as via Terminal Services Gateway (TSG). Certificate deployment and client remote workspaces are discussed, and I have provided a new custom-designed tool specifically for the book that allows users to dramatically increase the ...

Get Thor's Microsoft Security Bible now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.