Remote Access Tools Overview

Jun 26, 2025

Overview

This lecture covers remote access tools and protocols used for desktop support, secure administration, and file sharing, with a focus on security best practices.

Remote Desktop Technologies

  • Remote desktop allows controlling another computer from a different location.
  • Microsoft RDP (Remote Desktop Protocol) is widely used, available on many operating systems.
  • VNC (Virtual Network Computing) is an open-source remote desktop solution using the RFB protocol.
  • Remote desktop access requires careful security as it can be targeted by scammers.

Security Considerations

  • Open TCP port 3389 usually indicates RDP is enabled and could be vulnerable.
  • Most remote desktop solutions use only usernames and passwords, making them susceptible to brute-force attacks.
  • Multi-factor authentication (MFA) adds extra security for remote access.
  • Restrict remote access to authorized users and consider filtering by IP address.

Virtual Private Networks (VPNs)

  • VPNs encrypt all data between user devices and company resources, protecting information on public networks.
  • Users connect to a VPN concentrator, which is often integrated into next-generation firewalls.
  • VPN authentication should include MFA to reduce the risk of unauthorized access.

Remote Administration Protocols

  • SSH (Secure Shell) provides encrypted terminal access, using TCP port 22.
  • SSH is more secure than Telnet, which sends credentials in clear text.
  • SSH can use public/private key pairs for authentication and should restrict root access.
  • Some organizations require certificates instead of passwords for SSH access.

Remote Monitoring and Management (RMM)

  • RMM tools allow managed service providers (MSPs) to monitor, patch, and manage multiple clients from one console.
  • RMM access must be tightly controlled, use MFA, and be audited regularly to prevent compromise.

Specialized Remote Access Tools

  • Spice protocol enables efficient remote desktop for virtual machines, with fast graphics and shared resources.
  • Windows Remote Management (WinRM) allows scripts to execute on remote Windows servers without direct desktop access.

Third-Party Utilities

  • Tools like GoToMyPC, TeamViewer provide screen sharing and remote control.
  • Zoom and Webex offer remote video conferencing.
  • Dropbox, Box.com, and Google Drive enable file sync and sharing.
  • Citrix Endpoint Management and ManageEngine Desktop Central support desktop management.

Key Terms & Definitions

  • Remote Desktop — Controlling a remote computer’s desktop from another device.
  • RDP (Remote Desktop Protocol) — Microsoft’s protocol for remote desktop access.
  • VNC (Virtual Network Computing) — Open-source protocol for remote desktop sharing.
  • VPN (Virtual Private Network) — Encrypts data between endpoints over public networks.
  • SSH (Secure Shell) — Protocol for secure terminal access and commands.
  • RMM (Remote Monitoring and Management) — Tools for managing and monitoring multiple systems.
  • Spice — Protocol for remote access to virtual machine desktops.
  • WinRM (Windows Remote Management) — Allows remote script execution on Windows.

Action Items / Next Steps

  • Review security practices for remote desktop and VPN access.
  • Enable multi-factor authentication on all remote access tools.
  • Read further on SSH key management and RMM auditing procedures.