{"id":15524,"date":"2022-04-27T09:00:35","date_gmt":"2022-04-27T01:00:35","guid":{"rendered":"https:\/\/www.mondoze.com\/blog\/?p=15524"},"modified":"2022-09-25T00:13:09","modified_gmt":"2022-09-24T16:13:09","slug":"rdp-server-remote-desktop","status":"publish","type":"post","link":"https:\/\/www.mondoze.com\/blog\/tip-sharing\/rdp-server-remote-desktop","title":{"rendered":"RDP Server (Remote Desktop Protocol)"},"content":{"rendered":"\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t

How Does RDP Server Works?<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t
\n\t\t\t\t

The T.128 application sharing protocol is a derivation of the RDP (remote desktop protocol), which uses a single TCP\/IP port (default 3389) to establish a connection. Without getting into the technicalities of how each packet and frame is built, the important takeaway is that all traffic is generally point-to-point, encrypted, and contains all the data needed to efficiently transmit and process an entire user experience remotely with various fault tolerance, authentication, and even multiple monitor support mechanisms. All of this is accomplished without the need of HDMI, USB, or other forms of cords. In reality, as long as TCP\/IP is accessible, it works great across WiFi and even cellular.<\/p>\n

The picture above is about illustrates typical networking possibilities. To connect to remote desktop gateways on-premises, a client can utilize a browser or a remote desk client over the Internet. While these are predicated on using RDP via HTTPS (blue and black connecting lines), the danger is only substantially reduced as compared to using RDP directly (orange line). As part of the mitigation, additional authentication and abstraction constraints in the RD Gateway or RD Web Access Server would be established as Policy Rules.<\/p>\n

The greatest risk, however, is exposing RDP<\/a> on the Internet (port 3389) and allowing it to get through firewalls directly to a target on the internal network. This is a widespread practice that should be avoided at all costs. To that end, whether you\u2019re acquainted with Citrix Server or Microsoft Windows Terminal Services, you\u2019re presumably utilizing RDP on a regular basis\u2014and may not even realize it\u2014through a Remote Desktop (RD) Gateway or RD Web Access method, both of which pose comparable hazards.<\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t

\n\t\t\t\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t

Use Cases For RDP<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t
\n\t\t\t\t

RDP may be used by businesses of all sizes to connect to servers, interact with other employees, and remotely access computers to accomplish duties comparable to those performed in a real office.<\/p>

The following are some of the most prevalent RDP use cases:<\/p>