Cloud Management Insider

Secure Your Remote Desktop Protocol – Best practices & useful insights

Remote Desktop Protocol is developed by Microsoft and it is a proprietary protocol which provides a user with a graphical interface to connect another computer over a network connection. It runs on the client-server-based architecture. On the server computer, RDP server software should be installed and on the client side, the user must employ the RDP client software for this purpose.

Azure enables 3389 port of your Remote Desktop Protocol (RDP) and allows connections from any IP around the world, by default. It has many benefits but can also be a cause of a threat and a high-security risk. If some attacker performs brute force attack on your RDP and can remotely access your device(s), then all your sensitive data can get compromised. How can we deal with this now? We have two options – either restrict RDP access over your VMs or select a range of IPs or specific IPs to access your VMs.

Restricting your Remote Desktop Protocol (RDP) to access VMs isn’t challenging but it requires some understanding of Azure Network Security. We can ensure this by using Azure Network Security Groups (NSG’s). While deploying a VM, it expects an NSG to be assigned. You need to create an NSG beforehand and directly employ the same NSG to the new VMs deployments Now, how we can create such Network Security Groups (NSG’s).

How you can create such Network Security Groups (NSG’s)?

Furthermore, perform the following steps:

Properties of Inbound Security Rule are as follows:

The below image shows you the fields (described above) you need to fill in for allowing RDP for specific IP ranges.

The below image shows all the fields you need to fill in for denying all RDP access:

How Centilytics helps you in securing your Remote Desktop Protocol (RDP)?

Centilytics has an insight that lists down all your Azure subscriptions whose RDP has no restricted access to the internet as well as the subscriptions whose RDP has restricted access to the internet. This insight also helps you by scrutinize your security rules, access given to RDP in your network security group and shows where it has been created. Hence, it becomes easier to manage and ensure that your data is secure.

Insight Description:

  1. Severity: This column represents the severity of the access allowance to RDP.

 

Ok: It means RDP access is restricted from the internet or restricted to some specific range of IPs

 

Warning: It means RDP access unrestricted from the internet

 

Applicable filters are:

EA Account IDs Applying the account Id filter will display data for the selected account Id.
Severity Applying severity filter will display resources according to the selected severity type i.e. selecting critical will display all resources with critical severity. Same will be the case for warning and ok severity types
EA Resource Tags Applying resource tags filter will display data which will have the selected resource tag. For e.g. – If the user has tagged any resource using a tag named environment, then selecting an environment from the resource tags filter will display all the data accordingly 
EA Resource Tags Value Applying resource tags value filter will further display data which will have the selected resource tag value. For e.g. – If the user has tagged some resource by a tag named environment and has given it a value say production (environment:production), then the user will be able to view data of all the resources which are tagged as “environment:production”. User can use the tag value filter only when a tag name has been provided. 

 

Read More:

https://docs.microsoft.com/en-us/windows/desktop/termserv/remote-desktop-protocol