Menu
InformatiWeb Pro
  • Index
  • System admin
  • Virtualization

Login

Registration Password lost ?
FR
  • Windows Server
    • WMS 2012
    • WS2012 R2
    • WS2016
  • Citrix
    • Citrix NetScaler Gateway
    • Citrix XenApp / XenDesktop
    • Citrix XenServer
  • VMware
    • VMware ESXi
    • VMware vSphere
    • VMware Workstation
  • Microsoft
    • Hyper-V
  • RAID
    • Adaptec SmartRAID
  • UPS
    • APC Back-UPS Pro
  • InformatiWeb Pro
  • System admin
  • Windows Server
  • Courses
  • Learn how to deploy RDS on WS 2012 and 2012 R2
  • Restrict remote desktop access
17 / 27
  • Enable the NLA and use SSL (TLS 1.0)
  • Improve RDS server performance
  • Windows Server
  • 06 April 2019 at 11:18 UTC
  • InformatiWeb
  • 1/2

Restrict unauthorized remote desktop access to your RDS session host servers on Windows Server 2012 / 2012 R2 / 2016

When you publish desktops and/or RemoteApp programs, your users directly use published programs on your server.
This can be a problem if one of your users tries to play the smartest.

  1. Unauthorized Connection of a User in Remote Desktop Mode
  2. Secure your session host server with group policies (GPO)

1. Unauthorized Connection of a User in Remote Desktop Mode

Indeed, even if you only publish RemoteApp programs (which unpublishes the associated desktop), the user can very easily connect via Remote Desktop (thanks to the Windows RDP client) to access everything that is on your session host server.
The server address is not difficult to find since Windows displays the address when launching the 1st RemoteApp program and may even be identical to the one used to use the web access of the RDS solution.

For example, if our user launches the "Word 2013" program that we have published from our "RDS" session host server, he will know that the domain name of the session host server is : RDS.INFORMATIWEB.LAN

It is therefore enough for him to connect via the RDP client of Windows on this domain name.

Enter its identifiers.

The session opens on the remote server.

And your user arrives on a full session (limited by Windows basic permissions) and can therefore wander through the different options that are not restricted to administrators.
In short, this demonstration has the sole purpose of proving that this is easily possible and you should therefore consider securing a minimum your session host server to prevent a user makes you a bad joke.

In addition, you will not be able to block this access through Remote Desktop.
Indeed, you have allowed them to access this collection of desktops or RemoteApp programs.

If you look in the computer management of your session host server, you will see that the same user group is a member of the local "Remote Desktop Users" group.
If your user is a member of this group, he can use the RemoteApp programs and the desktop through the RDP client. And if you remove it, it can't use any of the 2 features.

Moreover, as you can see in the description of this group, the members of this group have the necessary rights to log in remotely.

Next page

Share this tutorial

Partager
Tweet

To see also

  • WS 2012 / 2012 R2 - RDS - Set up HA on your RDS infrastructure

    Windows Server 6/7/2019

    WS 2012 / 2012 R2 - RDS - Set up HA on your RDS infrastructure

  • WS 2012 / 2012 R2 / 2016 - RDS - Access RemoteApp via a modern application

    Windows Server 3/8/2019

    WS 2012 / 2012 R2 / 2016 - RDS - Access RemoteApp via a modern application

  • WS 2012 / 2012 R2 / 2016 - RDS - Attempt to unblock the session as a user

    Windows Server 4/28/2019

    WS 2012 / 2012 R2 / 2016 - RDS - Attempt to unblock the session as a user

  • WS 2012 / 2012 R2 / 2016 - RDS - Change the properties of RemoteApps

    Windows Server 3/16/2019

    WS 2012 / 2012 R2 / 2016 - RDS - Change the properties of RemoteApps

Comments

You must be logged in to post a comment

Share your opinion

Pinned content

  • Software (System admin)
  • Linux softwares
  • Our programs
  • Terms and conditions
  • Share your opinion

Contact

  • Guest book
  • Technical support
  • Contact

® InformatiWeb-Pro.net - InformatiWeb.net 2008-2022 - © Lionel Eppe - All rights reserved.

Total or partial reproduction of this site is prohibited and constitutes an infringement punishable by articles L.335-2 and following of the intellectual property Code.