Overview
This lecture covers remote access tools and protocols used for desktop support, secure administration, and file sharing, with a focus on security best practices.
Remote Desktop Technologies
- Remote desktop allows controlling another computer from a different location.
- Microsoft RDP (Remote Desktop Protocol) is widely used, available on many operating systems.
- VNC (Virtual Network Computing) is an open-source remote desktop solution using the RFB protocol.
- Remote desktop access requires careful security as it can be targeted by scammers.
Security Considerations
- Open TCP port 3389 usually indicates RDP is enabled and could be vulnerable.
- Most remote desktop solutions use only usernames and passwords, making them susceptible to brute-force attacks.
- Multi-factor authentication (MFA) adds extra security for remote access.
- Restrict remote access to authorized users and consider filtering by IP address.
Virtual Private Networks (VPNs)
- VPNs encrypt all data between user devices and company resources, protecting information on public networks.
- Users connect to a VPN concentrator, which is often integrated into next-generation firewalls.
- VPN authentication should include MFA to reduce the risk of unauthorized access.
Remote Administration Protocols
- SSH (Secure Shell) provides encrypted terminal access, using TCP port 22.
- SSH is more secure than Telnet, which sends credentials in clear text.
- SSH can use public/private key pairs for authentication and should restrict root access.
- Some organizations require certificates instead of passwords for SSH access.
Remote Monitoring and Management (RMM)
- RMM tools allow managed service providers (MSPs) to monitor, patch, and manage multiple clients from one console.
- RMM access must be tightly controlled, use MFA, and be audited regularly to prevent compromise.
Specialized Remote Access Tools
- Spice protocol enables efficient remote desktop for virtual machines, with fast graphics and shared resources.
- Windows Remote Management (WinRM) allows scripts to execute on remote Windows servers without direct desktop access.
Third-Party Utilities
- Tools like GoToMyPC, TeamViewer provide screen sharing and remote control.
- Zoom and Webex offer remote video conferencing.
- Dropbox, Box.com, and Google Drive enable file sync and sharing.
- Citrix Endpoint Management and ManageEngine Desktop Central support desktop management.
Key Terms & Definitions
- Remote Desktop — Controlling a remote computer’s desktop from another device.
- RDP (Remote Desktop Protocol) — Microsoft’s protocol for remote desktop access.
- VNC (Virtual Network Computing) — Open-source protocol for remote desktop sharing.
- VPN (Virtual Private Network) — Encrypts data between endpoints over public networks.
- SSH (Secure Shell) — Protocol for secure terminal access and commands.
- RMM (Remote Monitoring and Management) — Tools for managing and monitoring multiple systems.
- Spice — Protocol for remote access to virtual machine desktops.
- WinRM (Windows Remote Management) — Allows remote script execution on Windows.
Action Items / Next Steps
- Review security practices for remote desktop and VPN access.
- Enable multi-factor authentication on all remote access tools.
- Read further on SSH key management and RMM auditing procedures.