Remote-access Guide

lockdown remote access to terminal server

by Bridie Turcotte Published 1 year ago Updated 1 year ago
image

To provide the most secure remote access, keep Terminal Servers in the private network, behind a firewall and access these machines via a reverse proxy or SSL VPN Device placed in a DMZ. In these configurations, users do not interact directly with any of the terminal servers, which adds an additional layer of security.

Full Answer

How do I lock down a terminal server?

There are several ways of locking down a Terminal Server. You can put all users in a special OU and apply a GPO to that group but the best way is to put the Terminal Server in its own OU and take it from there. Here is how you do that: Open Active Directory Users and Computers from the Administrative tools.

How to create a list of standard lockdowns for terminal server?

Recently have had to setup a couple terminal servers and wanted to create a list of standard lock downs that can be added via a Terminal Server lockdown Group Policy Object (GPO). 1. Open Active Directory Users & Computers 2. Create Organizational Unit (OU) for Terminal Server. 3. Move all terminal servers to this OU. 4.

How to lock down the terminal server using loopback processing?

For terminal services, loopback processing is usually applied as Replace. Now we need to change the GPO with all kind of settings that will effectively lockdown the Terminal Server. One setting is very important and I will show you in the next screenshot which one that is. Right click the Terminal Server Lockdown GPO and choose edit.

How do I add Terminal Server users to the Security Group?

Open Control Panel, open System, click on Remote Settings then click on the Remote tab. 3. Click on Select Users, Remove any groups/users and then Add the Terminal Server Users security group.

image

How do you lock down a terminal server?

Create and apply the GPO that locks down the Terminal Server Open Group Policy Management from the Administrative Tools. Right click Group Policy Objects and choose new. Name the the GPO 'Terminal Server Lockdown'.

How do I lock down Remote Desktop Services?

Go to “User Configuration then to Administrative Templates”. Go to “Start Menu and Taskbar”. Click on “Remove and prevent access to the Shut Down, Restart, Sleep, and Hibernate commands”. Enable the setting.

How do you harden RDP?

How to harden RDP connectionsUse Network Level Authentication. ... Use the 'High' encryption level. ... Disable LTP redirection. ... Disable clipboard redirection. ... Disable network printer redirection. ... Restrict admins to one session.

Do you still need to lock down the server when you use remote App programs?

Do you still need to lock down the server when you use RemoteApp programs? Can you configure a server to permit users only to connect via RemoteApp and block users from connecting to the desktop? NO. This option is not supported.

Why RDP is not secure?

The problem is that the same password is often used for RDP remote logins as well. Companies do not typically manage these passwords to ensure their strength, and they often leave these remote connections open to brute force or credential stuffing attacks. Unrestricted port access.

Is RDP secure without VPN?

Remote Desktop Protocol (RDP) Integrated in BeyondTrust Establishing remote desktop connections to computers on remote networks usually requires VPN tunneling, port-forwarding, and firewall configurations that compromise security - such as opening the default listening port, TCP 3389.

Can RDP be hacked?

RDP has become a common way for hackers to steal valuable information from devices and networks. It is specifically vulnerable because of its ubiquity. Since so many businesses use it, the odds accessing an improperly secured network are higher and hackers have a better chance of breaking through.

Is VNC more secure than RDP?

VNC vs RDP security Secure RDP access is available with the help of SSL / TLS on most versions of Windows and Windows Server. VNC makes use of end-to-end encryption and relies on passwords. It is possible to secure VNC further by using SSH tunneling.

Is RDP safe with VPN?

Security. Although both VPN and RDP are encrypted through internet connection, a VPN connection is less accessible to threats than a remote desktop connection. For this reason, VPN is often considered more secure than RDP.

How many RDP connections can a server handle?

2 simultaneous connectionsCurrently RDP only allows 2 simultaneous connections at a time.

How do terminal servers work?

A terminal server, also sometimes called a communication server, is a hardware device or server that provides terminals, such as PCs, printers, and other devices, with a common connection point to a local or wide area network (WAN). The terminals connect to the terminal server from their RS-232C or RS-423 serial port.

How does a Windows terminal server work?

In a nutshell a terminal server allows users to share data and documents by running the applications on the server instead of the user's PC, so enabling the users to be based anywhere in the world and use any device they choose.

How do you lock someone off your computer?

There is no way to prevent other people with user accounts on that computer from logging in unless you disable Fast User Switching. And quick tip: You don't have to choose "lock" from the Start Menu, just press Windows key+L on your keyboard. Was this reply helpful?

How do I lock my TeamViewer screen?

You can define the logic of the "lock remote computer" feature for your connections in your advanced TeamViewer settings. Go to Extras --> Options --> Advanced --> Advanced settings for connections to other computers --> Lock remote computer --> Depending on your preferences, choose Always, Never or Automatic.

Can I lock my computer from my phone?

Under Dynamic lock, select the Allow Windows to automatically lock your device when you're away check box. Take your phone with you when you move away from your PC, and it will automatically lock a minute or so after you're out of Bluetooth range. (Note that Bluetooth range varies by devices.)

Can you remote into a locked computer?

When you lock a computer screen, no local keyboard or mouse input is accepted, but you can continue to administer the computer using Remote Desktop.

Introduction

There is no magic wand that can lock down your Windows Terminal Servers, but there are many built-in tools provided by Microsoft that do a pretty good job. When the built-in tools are not appropriate or sufficient there are many freeware and commercial 3rd party utilities to do the job.

Built-in tools, settings and lockdown tactics

The number one thing one can do to protect a terminal server from being intentionally or unintentionally tampered with is to limit the number of user accounts that are members of the local administrators security group.

Freeware Lockdown Utilities

Fabrice Cornet of FCConsult.be provides an excellent, database driven system lockdown utility called BrsSuite.

Commercial 3rd Party Programs

Appsense Application Manager is designed to restrict access to authorized applications, stop spyware, malware, trojans… Application Manager is part of the Appsense Management Suite.

Border Security

To provide the most secure remote access, keep Terminal Servers in the private network, behind a firewall and access these machines via a reverse proxy or SSL VPN Device placed in a DMZ. In these configurations, users do not interact directly with any of the terminal servers, which adds an additional layer of security.

Summary

Windows comes with many built-in tools and settings to secure Windows Terminal Servers, but which ones you can use depends on your organizational structure and expertise with each tool.

Can you modify RD session host?

You must perform these modifications on the RD Session Host server. You can use the Registry to make these changes.

Can you see drives C and D of a remote app?

Currently, when a user creates an RDP session or a RemoteApp program, they can see, and in some cases transverse, drives C and D of the RD Session Host server. They can also save anything on the desktop, which might look like their personal desktop, but it's actually the desktop of the RD Session Host server.

How to lock down a server in GPO?

Open Group Policy Management from the Administrative Tools. Right click Group Policy Objects and choose new. Name the the GPO 'Terminal Server Lockdown'.

Where is a terminal server?

A terminal can reside in an office, kiosk, classroom, laboratory, on a factory floor, or across the internet in another country while the server is in a secure server room. For example; Terminal Server can be used by Application Service Providers to provide access for multiple applications to customers over the Internet.

How to force a GPO to supersede?

In order to force this GPO and have it supersedes and replace all other GPO's on the domain we need to set 'User Group Policy loopback processing mode'. Use the mode 'Replace'.

Where is loopback processing?

Loopback processing is a GPO setting located in Computer SettingsAdministrative templatesSystemGroup Policy and was originally put in Group Policy to handle kiosk type computers. No matter who logs into this particular computer, they will get these users settings.

Who is server essentials?

server-essentials.com is a community for IT Consultants and Business Owners who, themselves, take care of the IT infrastructure and Employees who do that little extra in the company to keep things running. Our forum is for discussing all things ‘IT’ and more. Our documentation is top notch and written by and for the community.

Why do administrators want strict control of the user's session?

Administrators want strict control of the user’s session because of the multi-user nature of the terminal server. So the administrator is left with a dilemma - do they lock down the user policy and have that affect the workstation as well as the terminal session or keep the GPO as it is and run the risk of the user taking down the server.

How to enable TLS 1.1 in Server 2008 R2?

For Server 2008 R2, you will need a patch to support TLS 1.1 or 1.2 for RDP. Install KB3080079 to support the higher TLS settings. Set a Group Policy object that disables SSL 1.0, 2.0, 3.0 and TLS 1.0 via registry keys and explicitly enables TLS 1.1. and TLS 1.2 for both server and client settings as noted in this blog. You can also use IISCrypto to set and review the TLS settings. If you use RDgateway, review the SSL settings externally using an SSL test. Review KB245030 to restrict the cyphers that are being used in your organization.

How to prevent password reuse?

Enforce a strong password policy. Encourage your users to not reuse passwords. Remind them of breaches that have exposed passwords that are now in the hands of attackers. Ensure that users do not save the password to their RDP-connected computer.

Is RDP exposed publicly?

Recent advice for mitigating the BlueKeep vulnerability says that RDP should never be exposed publicly. It’s hard for some companies to follow that advice now. Network Level Authentication (NLA) forces users to authenticate before connecting to remote systems, which dramatically decreases the chance of success for RDP-based worms.

What is an applocker?

Applocker or SRP are the built-in tools for restricting access to applications.

Can Applocker run on RDS farm?

As for locking down the applications. I run Applocker on my RDS farm. Only thing standard users are allowed to run is our ERP software.

image

Introduction

Built-In Tools, Settings and Lockdown Tactics

Freeware Lockdown Utilities

  • Fabrice Cornet of FCConsult.beprovides an excellent, database driven system lockdown utility called BrsSuite. 2X Software Ltd. offers a freeware product called SecureRDPwhich can filter connections by RDP Client Version, MAC Address… Login Consultants, NL maintains a utility called the Flex Profile Kit, which applies settings from an OPS File (Office Profile Setting) to a M…
See more on techgenix.com

Commercial 3rd Party Programs

  • Appsense Application Manageris designed to restrict access to authorized applications, stop spyware, malware, trojans… Application Manager is part of the Appsense Management Suite. Appsense Environment Manageris a desktop lockdown utility and is part of the Appsense Management Suite. Provision Networks Block-IT is an Application Access Control and Host Acc…
See more on techgenix.com

Border Security

  • To provide the most secure remote access, keep Terminal Servers in the private network, behind a firewall and access these machines via a reverse proxy or SSL VPN Device placed in a DMZ. In these configurations, users do not interact directly with any of the terminal servers, which adds an additional layer of security. Commonly used products that f...
See more on techgenix.com

Summary

  • Windows comes with many built-in tools and settings to secure Windows Terminal Servers, but which ones you can use depends on your organizational structure and expertise with each tool. If you can’t or don’t want to one or all of the Microsoft tools, there are plenty of companies making polished lockdown solutions, and even some offering very good freeware utilties. References Ho…
See more on techgenix.com

Removing Favorites and Libraries

  • You must perform these modifications on the RD Session Host server. You can use the Registry to make these changes.
See more on social.technet.microsoft.com

Hiding/Preventing Access to Drives

  • You can use Group Policy settings to hide and restrict access to drives on the RD Session Host server. By enabling these settings you can ensure that users do not inadvertently access data stored on other drives, or delete or damage programs or other critical system files on drive C. The following settings are located in the Group Policy Management Console under User Configuratio…
See more on social.technet.microsoft.com

Other Group Policy Settings For Additional Security

  • You can also enable the following Group Policy settings atUser Configuration\Administrative Templates\Windows Components\Windows Explorer: 1. Hides the Manage item on the Windows Explorer context menu — Enabled 2. Remove Hardware tab — Enabled 3. Remove “Map Network Drive” and “Disconnect Network Drive” — Enabled 4. Remove Search button from Window...
See more on social.technet.microsoft.com

Put The Terminal Server in A Special Ou

  • There are several ways of locking down a Terminal Server. You can put all users in a special OU and apply a GPO to that group but the best way is to put the Terminal Server in its own OU and take it from there. Here is how you do that: Open Active Directory Users and Computers from the Administrative tools. You can see that there is already an OU c...
See more on server-essentials.com

Create and Apply The Gpo That Locks Down The Terminal Server

  • Open Group Policy Management from the Administrative Tools. Right click Group Policy Objects and choose new. Name the the GPO 'Terminal Server Lockdown'. In the next picture you can see that the new GPO is listed but it does not do anything because it has not been configured nor has it been linked to any OU. Now we need to link and configure the new GPO. Choose the Terminal …
See more on server-essentials.com

Loopback Processing Explained.

  • In regards to terminal servers, the problem with Group Policy in its default configuration is that users who log into both a workstation and a terminal session will have the same policies applies. Workstation policies are typically looser than what administrators want on a terminal server. Administrators want strict control of the user’s session because of the multi-user nature of the t…
See more on server-essentials.com

Allow Unrestricted Access to The Terminal Server For Administrators

  • After you have applied the Terminal Server Lockdown policy you will notice that it is even applied to the Administrator on your domain. That is not very handy and we want to change that. There is a knowledge base articlethat describes how to that but it is kind of confusing because it does not show you how to do that using the Group Policy Manager included in SBS 2003. Again from the …
See more on server-essentials.com

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 1 2 3 4 5 6 7 8 9