🔒

PS L 19 Remote

Nov 25, 2024

Lecture on Remote Desktop Connections and Network Security

Remote Desktop Connections

  • Definition: Ability to see and control a desktop across the network.
  • Types of Connections:
    • RDP (Remote Desktop Protocol):
      • Primarily a Windows technology.
      • Clients available for Mac OS, Linux, and other OS.
      • Uses TCP port 3389.
    • VNC (Virtual Network Computing):
      • Uses RFB (Remote Frame Buffer Protocol).
      • Available as open-source projects for multiple OS including Windows.

Security Concerns

  • RDP and VNC often secured with username and password.
  • Risk of unauthorized access if credentials are reused.
  • Full control of system can be gained if access is obtained.

Virtual Private Networks (VPN)

  • Definition: Provides secure access to a corporate network.
  • Components:
    • Central concentrator for encryption/decryption.
    • Client software on user machines.
  • Types of VPN Implementations:
    • On-demand and always-on.
  • Security: Uses strong encryption; attacks focus on endpoints.
  • Multi-factor Authentication (MFA): Additional authentication using phone codes.

Secure Shell (SSH)

  • Definition: Encrypted protocol for administering servers across the network.
  • Security Features:
    • Public and private key pair for authentication.
    • Limit login accounts and IP addresses.

Remote Monitoring and Management (RMM)

  • Function: Allows MSPs to manage and monitor networks remotely.
  • Features:
    • Patch operating systems.
    • Monitor anomalies and system status.
    • Inventory of hardware and software.
  • Security Concerns: Importance of authentication and auditing.

Microsoft Remote Assistance

  • MSRA (Microsoft Remote Assistance):
    • Provides on-demand access.
    • No need for firewall configuration.
    • Use of invitation files or Easy Connect.
  • Quick Assist: Modern version of MSRA in Windows 10 and 11.
    • Simpler interface, same functionality.
    • No always-running service, reducing unauthorized access risk.

Third-party Remote Access and Conferencing Tools

  • Remote Access:
    • GoToMyPC, TeamViewer.
  • Video Conferencing:
    • Zoom, WebEx.
  • File Sharing:
    • Dropbox, Box.com, Google Drive.
  • Desktop Management:
    • Citrix Endpoint Management, Manage Engine Desktop Central.

Conclusion

  • Remote desktop technologies and VPNs are critical for IT support and security.
  • Strong security measures are essential to prevent unauthorized access.