Remote desktop protocol (RDP) is a proprietary communication protocol initially built by Microsoft. It allows two computers to exchange a graphical user interface (GUI) via transmission control protocol (TCP)\/internet protocol (IP). RDP is an extension of the T.120 point-to-point (P2P) communication protocols that are standardized by the International Telecommunications Union (ITU). <\/p>\n\n\n\n
There are three primary use cases for RDP. Firstly, IT admins can use this protocol to remotely perform administrative tasks, such as PC tuneups, ID protection settings, software installations, computer troubleshooting, and printer setups. By using RDP, IT teams can easily maintain and diagnose problems that individual employees are encountering from afar. <\/p>\n\n\n\n
Secondly, employees can leverage RDP to access their workstations remotely. For example, they could access enterprise resources while working from home or traveling. Thirdly, RDP is also helpful for \u201cheadless computers<\/a>\u201d or thin clients<\/a> that employees may want to leverage to access powerful workstations in the office. <\/p>\n\n\n\n
RDP is a secure protocol that furnishes the user on one computer with a GUI that they can use to connect to another PC over TCP\/IP network directly. For this to work, the user originating the request must have an RDP client application installed on their computer. Similarly, the PC the user is trying to access must be running an RDP server software, allowing the client to connect remotely. <\/p>\n\n\n\n
Once linked, the user can now see the desktop of the PC to which they have connected through RDP to access applications and files on that desktop. All current Windows operating systems (OSs), including Windows Server and desktop versions, come with a built-in RDP server that provides remote desktop connection capabilities. <\/p>\n\n\n\n
However, the RDP client software is only available to Windows Pro and higher versions. For example, Windows Home users must upgrade their OSs to Windows Pro or higher versions to use remote desktop connection (RDC) services. <\/p>\n\n\n\n
RDC is one of the three client components of Microsoft\u2019s Remote Desktop Services (RDS). It enables remote client PCs \u2014 powered by RDP \u2014 to connect with Windows-based platforms. The two other client components of Microsoft\u2019s RDS are Fast User Switching<\/a> and Windows Remote Assistance<\/a>. Aside from RDCs, RDP clients are available for Unix, Linux, macOS, Android, and iOS. <\/p>\n\n\n\n
To help render the user\u2019s actions, RDP uses its own graphics driver to construct the display output into TCP\/IP packets that are then redirected to the RDC client. On the client\u2019s side, the RDC client receives the rendered data and translates it into corresponding graphics device interface (GDI)<\/a> application programming interface (API) calls. <\/p>\n\n\n\n
Below are some advantages that organizations and users can derive from RDP:<\/p>\n\n\n\n
Despite the advantages, RDP has its own disadvantages. Below are a few of them:<\/p>\n\n\n\n
RDP is the foundation for many remote access solutions within Windows-based environments. As such, it has become one of the most popular targets for hackers. Below are three common RDP security risks that hackers can exploit:<\/p>\n\n\n\n
Most users rely on passwords to protect their workstations. They often reuse the same password across different systems, including RDP logins. If the password is weak, any hacker can attempt a brute force attack through techniques such as credential stuffing or rainbow table attack<\/a> to gain access to the enterprise network. To mitigate these attacks, organizations can use single sign-on (SSO)<\/a>, multi-factor authentication (MFA)<\/a>, and adhere to password management best practices<\/a>.<\/p>\n\n\n\n
By default, RDP connections take place on TCP port 3389. If this port is left open, an attacker can easily carry out on-path attacks and compromise the network. To protect against port-based attacks, you\u2019ll need to lock down port 3389 and implement firewall rules. <\/p>\n\n\n\n
Microsoft has already provided and continues to provide OS updates and hotfixes for some of the most severe RDP vulnerabilities. Still, some of these vulnerabilities can cause damage, especially when left unpatched. <\/p>\n\n\n\n
For example, \u201cBlueKeep<\/a>\u201d\u2014a wormable attack that allows hackers to execute arbitrary codes on a remote PC\u2014can cause damage to the organization if the OS is not patched. To mitigate against these vulnerabilities, you can leverage patch management tools<\/a> to ensure their OS and applications are up to date. <\/p>\n\n\n\n
It\u2019s no longer a secret that the shift to hybrid workplaces is having severe security implications for most modern organizations. To succeed in such environments, companies must ensure remote access solutions like mobile device management (MDM)<\/a> tools are secure and fit into the organization\u2019s budget.\u00a0<\/p>\n\n\n\n
Remote Assist will be a FREE add-on for organizations already using the JumpCloud Directory Platform<\/a>\u00ae<\/sup> to manage Windows, macOS, and Linux endpoints.\u00a0<\/p>\n\n\n\n\n