{"id":81984,"date":"2024-07-28T11:48:23","date_gmt":"2024-07-28T03:48:23","guid":{"rendered":"https:\/\/version-2.com\/?p=81984"},"modified":"2024-07-25T15:54:19","modified_gmt":"2024-07-25T07:54:19","slug":"rdp-security-how-to-secure-your-remote-desktop","status":"publish","type":"post","link":"https:\/\/version-2.com\/zh\/2024\/07\/rdp-security-how-to-secure-your-remote-desktop\/","title":{"rendered":"RDP security: How to secure your remote desktop"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"81984\" class=\"elementor elementor-81984\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-35fe5dd post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"35fe5dd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;cef08c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-409a2e9a\" data-id=\"409a2e9a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5a8be8f elementor-widget elementor-widget-text-editor\" data-id=\"5a8be8f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/4LWj5fNWFjK4nsVhHRs60q\/a4cb16bb17749388d2ebc8075dfebe3b\/RDP-security.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp\" width=\"1080\" height=\"617\" \/><\/p><article class=\"RichText_root__1_CNu BlogPostContent_richText__rG0U1\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">With<a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"https:\/\/mitsloan.mit.edu\/ideas-made-to-matter\/how-many-americans-are-really-working-remotely\" target=\"_blank\" rel=\"noopener\"> 27% of the US workforce<\/a> operating remotely, companies need efficient and secure ways to connect users and central servers.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Microsoft&#8217;s Remote Desktop Protocol has become a go-to option for flexible working. More than 50% of companies<a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"https:\/\/www.statista.com\/statistics\/1368456\/global-remote-desktop-usage\/\" target=\"_blank\" rel=\"noopener\"> report<\/a> using RDP in the past year, and it&#8217;s not hard to see why. RDP allows fast connections and seamless remote work.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">But is RDP a <i>secure<\/i> option for your workforce? As always, the answer depends on your security setup.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">This blog will explore how RDP works and some of the main RDP vulnerabilities. As we will see, remote access creates significant security risks. However, these risks can be managed if you follow our RDP security tips and implement smart remote access solutions. Let&#8217;s find out more.<\/p><h2 id=\"what-is-rdp\" class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h2__2iijA\" data-testid=\"heading\">What is RDP?<\/h2><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Businesses use the <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/rdp\/\">Remote Desktop Protocol (RDP)<\/a> to <b>communicate with and control external devices<\/b>. Created by Microsoft, RDP enables seamless remote work via Windows systems.<\/p><p><img decoding=\"async\" class=\"Image_autoHeight__eDTAt Image_autoWidth__spy21 RichText_image__z9xEG\" style=\"color: transparent;\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/79hmyCY2sKQlrehNFwxwdK\/63782ec54a825077d6836da331315168\/What-is-RDP_.png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp\" sizes=\"(max-width: 1280px) 100vw, 50vw\" srcset=\"https:\/\/images.ctfassets.net\/5natoedl294r\/79hmyCY2sKQlrehNFwxwdK\/63782ec54a825077d6836da331315168\/What-is-RDP_.png?w=384&amp;q=75&amp;fit=fill&amp;fm=webp 384w, https:\/\/images.ctfassets.net\/5natoedl294r\/79hmyCY2sKQlrehNFwxwdK\/63782ec54a825077d6836da331315168\/What-is-RDP_.png?w=600&amp;q=75&amp;fit=fill&amp;fm=webp 600w, https:\/\/images.ctfassets.net\/5natoedl294r\/79hmyCY2sKQlrehNFwxwdK\/63782ec54a825077d6836da331315168\/What-is-RDP_.png?w=640&amp;q=75&amp;fit=fill&amp;fm=webp 640w, https:\/\/images.ctfassets.net\/5natoedl294r\/79hmyCY2sKQlrehNFwxwdK\/63782ec54a825077d6836da331315168\/What-is-RDP_.png?w=750&amp;q=75&amp;fit=fill&amp;fm=webp 750w, https:\/\/images.ctfassets.net\/5natoedl294r\/79hmyCY2sKQlrehNFwxwdK\/63782ec54a825077d6836da331315168\/What-is-RDP_.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp 828w, https:\/\/images.ctfassets.net\/5natoedl294r\/79hmyCY2sKQlrehNFwxwdK\/63782ec54a825077d6836da331315168\/What-is-RDP_.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp 1080w, https:\/\/images.ctfassets.net\/5natoedl294r\/79hmyCY2sKQlrehNFwxwdK\/63782ec54a825077d6836da331315168\/What-is-RDP_.png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp 1280w\" alt=\"What-is-RDP\" width=\"0\" height=\"0\" data-nimg=\"future\" \/><img decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/79hmyCY2sKQlrehNFwxwdK\/63782ec54a825077d6836da331315168\/What-is-RDP_.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp\" width=\"1080\" height=\"570\" \/><\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">RDP functions by creating sessions between clients and servers. Clients request access. Servers authenticate requests and transmit a graphical interface to the remote client. This interface replicates the desktop contained on the server and functions just as if installed on the client.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">The Remote Desktop Protocol supports this setup by <b>carrying data about mouse movements, clicks, and keyboard presses<\/b>. The protocol converts activity into data packets, which the server converts into graphical updates.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">In the process, a lot of information passes across the RDP connection. RDP access handles document printing, audio, and video communications, collaborative editing, and file transfers. Much of this information could be very valuable in the wrong hands.<\/p><h3 class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h3__gewqv\" data-testid=\"heading\">Why use RDP?<\/h3><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">RDP allows remote workers to <b>access resources located in central data centers<\/b>. Workers can run applications and manipulate files just as they would in on-premises offices. Users do not need to install apps locally or download documents for local use. Everything stays on-site.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">RDP also <b>enables technicians to access remote devices<\/b>. On-site specialists can diagnose problems, deliver security patches, assess device postures, and monitor remote operations. Managers and security teams can easily train remote workers.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Technicians favor the RDP protocol due to its <b>reliability and speed.<\/b> Windows compatibility is another attractive feature, making it convenient for most organizations. However, there is a downside: RDP security issues.<\/p><h2 id=\"what-are-the-main-rdp-security-issues\" class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h2__2iijA\" data-testid=\"heading\">What are the main RDP security issues?<\/h2><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">RDP is a transfer protocol, and protocols are almost always vulnerable to external attacks. That&#8217;s not all. Attackers can also target the servers and applications used to enable RDP access.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Attacks range from mild irritants to serious threats that put workloads and data at risk. Companies using RDP for remote work need plans to handle these threats and keep data safe.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Security planning starts with awareness of common RDP threats. Here are some of the most common (and damaging) vulnerabilities:<\/p><ul class=\"RichText_ul__Ajzbe\"><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>Unsecured ports<\/b>. RDP always uses port 3389 to establish connections. This is an external and open port. Malicious actors can impose themselves between users and port 3389 to steal credentials via on-path attacks. Attackers can then use the open port to access servers or devices.<\/p><\/li><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>Credentials theft. <\/b>Weak credentials are a critical RDP security issue. Users often reuse passwords for RDP and email and access web applications. Attackers obtaining these user credentials can implant ransomware via workloads or servers. Even slightly different passwords are vulnerable to brute-force attacks.<\/p><\/li><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>Server exploits. <\/b>In the past, Microsoft&#8217;s RDP services have fallen victim to remote code execution vulnerabilities. Hackers use flaws in servers or protocol codes to gain unauthorized access. For instance, an exploit called BlueKeep once exposed millions of RDP servers to external attacks. Microsoft resolved the BlueKeep issue, but exploits can emerge at any time.<\/p><\/li><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>Protocol tunneling<\/b>. In tunneling attacks, hackers implant malicious code within protocol traffic. RDP traffic appears to be legitimate but carries malware or other harmful agents. Even worse, many standard firewalls struggle to detect this type of attack.<\/p><\/li><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>Session hijacking<\/b>. Attackers can gain access to active remote desktop access sessions. In these situations, attackers can explore any resources available to legitimate remote users. Until they are detected, they can implant malware, extract data, and disrupt operations.<\/p><\/li><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>DDoS attacks<\/b>. Attackers often use protocols to flood networks with traffic and take systems offline. RDP is vulnerable to DDoS-style attacks because it uses an open port, and servers generally do not enforce rate limits. The protocol is also relatively resource intensive, meaning attackers must unleash less traffic to achieve results.<\/p><\/li><\/ul><h2 id=\"how-to-secure-rdp\" class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h2__2iijA\" data-testid=\"heading\">How to secure RDP<\/h2><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Securing your Remote Desktop Protocol setup should be an urgent task. RDP is<a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"https:\/\/news.sophos.com\/en-us\/2024\/04\/03\/active-adversary-report-1h-2024\/\" target=\"_blank\" rel=\"noopener\"> involved<\/a> in 90% of cyberattacks, and the consequences of attacks are severe. RDP is a critical vector for ransomware, and attackers can use exposed work environments to steal confidential data.<\/p><p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/3rfVVokjXDshzFDBntecHs\/8b974c09a9e99c122eacb4242830238f\/RDP-security-issues.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp\" width=\"1080\" height=\"730\" \/><img loading=\"lazy\" decoding=\"async\" class=\"Image_autoHeight__eDTAt Image_autoWidth__spy21 RichText_image__z9xEG\" style=\"color: transparent;\" src=\"https:\/\/images.ctfassets.net\/5natoedl294r\/3rfVVokjXDshzFDBntecHs\/8b974c09a9e99c122eacb4242830238f\/RDP-security-issues.png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp\" sizes=\"(max-width: 1280px) 100vw, 50vw\" srcset=\"https:\/\/images.ctfassets.net\/5natoedl294r\/3rfVVokjXDshzFDBntecHs\/8b974c09a9e99c122eacb4242830238f\/RDP-security-issues.png?w=384&amp;q=75&amp;fit=fill&amp;fm=webp 384w, https:\/\/images.ctfassets.net\/5natoedl294r\/3rfVVokjXDshzFDBntecHs\/8b974c09a9e99c122eacb4242830238f\/RDP-security-issues.png?w=600&amp;q=75&amp;fit=fill&amp;fm=webp 600w, https:\/\/images.ctfassets.net\/5natoedl294r\/3rfVVokjXDshzFDBntecHs\/8b974c09a9e99c122eacb4242830238f\/RDP-security-issues.png?w=640&amp;q=75&amp;fit=fill&amp;fm=webp 640w, https:\/\/images.ctfassets.net\/5natoedl294r\/3rfVVokjXDshzFDBntecHs\/8b974c09a9e99c122eacb4242830238f\/RDP-security-issues.png?w=750&amp;q=75&amp;fit=fill&amp;fm=webp 750w, https:\/\/images.ctfassets.net\/5natoedl294r\/3rfVVokjXDshzFDBntecHs\/8b974c09a9e99c122eacb4242830238f\/RDP-security-issues.png?w=828&amp;q=75&amp;fit=fill&amp;fm=webp 828w, https:\/\/images.ctfassets.net\/5natoedl294r\/3rfVVokjXDshzFDBntecHs\/8b974c09a9e99c122eacb4242830238f\/RDP-security-issues.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp 1080w, https:\/\/images.ctfassets.net\/5natoedl294r\/3rfVVokjXDshzFDBntecHs\/8b974c09a9e99c122eacb4242830238f\/RDP-security-issues.png?w=1280&amp;q=75&amp;fit=fill&amp;fm=webp 1280w\" alt=\"RDP-security-issues\" width=\"0\" height=\"0\" data-nimg=\"future\" \/><\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">There is some good news. Properly secured remote desktop protocol implementations are hard to infiltrate and secure. Let&#8217;s run through some best practices to create a secure remote desktop environment.<\/p><ul class=\"RichText_ul__Ajzbe\"><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>Use stronger passwords<\/b>. Brute-forcing attacks are much harder to mount against complex passwords. Avoid any words related to individuals or the company, and always avoid recycling passwords from other logins. Use password managers to generate strong passwords that are impossible to guess.<\/p><\/li><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>Change your RDP port. <\/b>Changing your listening port from 3389 helps make RDP secure by limiting external access. Changing the port is a sensible first step, as it blocks many automated port attacks.<\/p><\/li><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>Use access controls<\/b>. Administrator accounts can change RDP settings or use their privileges to access other network resources. Use <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/identity-access-management\/\">access management tools<\/a> to apply the <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/learn\/access-control\/principle-of-least-privilege\/\">principle of least privilege<\/a>. Provide access to administrators when they need it for specific tasks. Otherwise, allow the fewest possible permissions for all remote users.<\/p><\/li><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>Apply firewall protection<\/b>. Strengthen your defenses by casting Windows Firewall protection around RDP environments. Windows Firewall rules for RDP connections block external traffic but allow authorized users to <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/blog\/how-to-access-company-network-from-different-locations\/\">access network resources<\/a>.<\/p><\/li><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>Use Network-Level Authentication (NLA). <\/b>Network-level authentication is native to RDP systems and adds an extra layer of authentication for every session. Users seeking RDP access must supply an additional form of identification, such as smart cards, one-time passcodes, or biometrics.<\/p><\/li><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>Implement lockout policies<\/b>. Lockout policies block users after a certain number of unsuccessful logins. This is a good starting point for blocking brute-force attacks.<\/p><\/li><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>Monitor user sessions<\/b>. Track user activity during RDP sessions to detect suspicious behavior. Monitoring should check for spikes in resource usage. This could suggest a DDoS-style attack. Technicians should also monitor access to sensitive files and limit access to essential resources.<\/p><\/li><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>Add Virtual Private Network (VPN) protection<\/b>. VPNs ensure <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/secure-remote-access\/\">secure remote access<\/a> by creating encrypted shields around remote connections. Users log onto a VPN gateway before accessing RDP servers. This adds an extra barrier for hackers and effectively anonymizes traffic.<\/p><\/li><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>Update RDP tools regularly<\/b>. Promptly apply security updates for remote desktop applications and Windows Server. Ensure VPNs, multi-factor authentication tools, and firewalls are up to date. Regular updates cut the risk of exploits, making life much harder for would-be attackers.<\/p><\/li><li class=\"RichText_listItem__DIiAr\"><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\"><b>Train staff in RDP security<\/b>. Never allow remote workers to use RDP connections without security training. Ensure workers know how to use passwords, VPNs, and multi-factor authentication. Outline security and compliance policies.<\/p><\/li><\/ul><p>\u00a0<\/p><h2 id=\"eliminate-rdp-vulnerabilities-using-nordlayer\" class=\"Heading_root__vbfeI Heading_heading20__p7mXS Heading_primary__3VZgz Heading_normal__hJuNy RichText_h2__2iijA\" data-testid=\"heading\">Eliminate RDP vulnerabilities using NordLayer<\/h2><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">RDP is among the most common secure remote access solutions available. Yet, it is not necessarily the best way to ensure secure remote access\u2014at least not on its own.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">The solution lies in combining Microsoft&#8217;s security features with external security tools. On-board tools like NLA, port settings, and user monitoring all help. However, <a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/features\/smart-remote-access\/\">NordLayer&#8217;s Smart Remote Access<\/a> ensures secure RDP connections with end-to-end encryption.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">NordLayer provides secure remote access solutions to meet your remote device access needs. Create virtual LANs around every network endpoint and protect remote users via VPN coverage. Cloud LAN enables secure file sharing from device to device, troubleshooting others&#8217; devices, and using remote devices as virtual machines for work.<\/p><p class=\"Text_text__rSWMU RichText_paragraph__DNqK4 Text_body50___cwDR\" data-testid=\"text\">Benefit from the flexibility and efficiency remote work provides while avoiding security nightmares. To find out more,<a class=\"Link_inherit__NP_8V Link_medium__XEV_Z Link_noTextDecoration__GhdxD Link_aTagRoot__8wRP7 Hyperlink_link__umZi8\" href=\"\/contact-sales\/\"> contact the NordLayer team<\/a> today.<\/p><\/article>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-cf03edf elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"cf03edf\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b576c6d\" data-id=\"b576c6d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-bfd91ca elementor-widget elementor-widget-shortcode\" data-id=\"bfd91ca\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"63561\" class=\"elementor elementor-63561\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1b6aa2c4 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"1b6aa2c4\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1b283ee5\" data-id=\"1b283ee5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4e466f1a elementor-widget elementor-widget-text-editor\" data-id=\"4e466f1a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About NordLayer<br \/><\/strong>NordLayer is an adaptive network access security solution for modern businesses \u2013 from the world\u2019s most trusted cybersecurity brand, Nord Security.<\/p><p>The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-9e34e91 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"9e34e91\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-bb2c932\" data-id=\"bb2c932\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c6a493c elementor-widget elementor-widget-text-editor\" data-id=\"c6a493c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About NordLayer<br \/><\/strong>NordLayer is an adaptive network access security solution for modern businesses \u2013 from the world\u2019s most trusted cybersecurity brand, Nord Security.<\/p><p>The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>With 27% of the US workforce operating remotely, compan [&hellip;]<\/p>\n","protected":false},"author":149011790,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[973,1130,1273,61],"tags":[974,1132,1272],"class_list":["post-81984","post","type-post","status-publish","format-standard","hentry","category-nord-security","category-nordlayer","category-1273","category-press-release","tag-nord-security","tag-nordlayer","tag-1272"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>RDP security: How to secure your remote desktop - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nordlayer.com\/blog\/secure-rdp\/\" \/>\n<meta property=\"og:locale\" content=\"zh_HK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"RDP security: How to secure your remote desktop - Version 2\" \/>\n<meta property=\"og:description\" content=\"With 27% of the US workforce operating remotely, compan [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nordlayer.com\/blog\/secure-rdp\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2024-07-28T03:48:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/images.ctfassets.net\/5natoedl294r\/4LWj5fNWFjK4nsVhHRs60q\/a4cb16bb17749388d2ebc8075dfebe3b\/RDP-security.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9810\u8a08\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/secure-rdp\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/07\\\/rdp-security-how-to-secure-your-remote-desktop\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"RDP security: How to secure your remote desktop\",\"datePublished\":\"2024-07-28T03:48:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/07\\\/rdp-security-how-to-secure-your-remote-desktop\\\/\"},\"wordCount\":1394,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/secure-rdp\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/4LWj5fNWFjK4nsVhHRs60q\\\/a4cb16bb17749388d2ebc8075dfebe3b\\\/RDP-security.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp\",\"keywords\":[\"Nord Security\",\"NordLayer\",\"2024\"],\"articleSection\":[\"Nord Security\",\"NordLayer\",\"2024\",\"Press Release\"],\"inLanguage\":\"zh-HK\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/07\\\/rdp-security-how-to-secure-your-remote-desktop\\\/\",\"url\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/secure-rdp\\\/\",\"name\":\"RDP security: How to secure your remote desktop - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/secure-rdp\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/secure-rdp\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/4LWj5fNWFjK4nsVhHRs60q\\\/a4cb16bb17749388d2ebc8075dfebe3b\\\/RDP-security.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp\",\"datePublished\":\"2024-07-28T03:48:23+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/secure-rdp\\\/#breadcrumb\"},\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nordlayer.com\\\/blog\\\/secure-rdp\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/secure-rdp\\\/#primaryimage\",\"url\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/4LWj5fNWFjK4nsVhHRs60q\\\/a4cb16bb17749388d2ebc8075dfebe3b\\\/RDP-security.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp\",\"contentUrl\":\"https:\\\/\\\/images.ctfassets.net\\\/5natoedl294r\\\/4LWj5fNWFjK4nsVhHRs60q\\\/a4cb16bb17749388d2ebc8075dfebe3b\\\/RDP-security.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nordlayer.com\\\/blog\\\/secure-rdp\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"RDP security: How to secure your remote desktop\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-HK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"RDP security: How to secure your remote desktop - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nordlayer.com\/blog\/secure-rdp\/","og_locale":"zh_HK","og_type":"article","og_title":"RDP security: How to secure your remote desktop - Version 2","og_description":"With 27% of the US workforce operating remotely, compan [&hellip;]","og_url":"https:\/\/nordlayer.com\/blog\/secure-rdp\/","og_site_name":"Version 2","article_published_time":"2024-07-28T03:48:23+00:00","og_image":[{"url":"https:\/\/images.ctfassets.net\/5natoedl294r\/4LWj5fNWFjK4nsVhHRs60q\/a4cb16bb17749388d2ebc8075dfebe3b\/RDP-security.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"\u4f5c\u8005":"tracylamv2","\u9810\u8a08\u95b1\u8b80\u6642\u9593":"8 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nordlayer.com\/blog\/secure-rdp\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2024\/07\/rdp-security-how-to-secure-your-remote-desktop\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"RDP security: How to secure your remote desktop","datePublished":"2024-07-28T03:48:23+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2024\/07\/rdp-security-how-to-secure-your-remote-desktop\/"},"wordCount":1394,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/nordlayer.com\/blog\/secure-rdp\/#primaryimage"},"thumbnailUrl":"https:\/\/images.ctfassets.net\/5natoedl294r\/4LWj5fNWFjK4nsVhHRs60q\/a4cb16bb17749388d2ebc8075dfebe3b\/RDP-security.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp","keywords":["Nord Security","NordLayer","2024"],"articleSection":["Nord Security","NordLayer","2024","Press Release"],"inLanguage":"zh-HK"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2024\/07\/rdp-security-how-to-secure-your-remote-desktop\/","url":"https:\/\/nordlayer.com\/blog\/secure-rdp\/","name":"RDP security: How to secure your remote desktop - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nordlayer.com\/blog\/secure-rdp\/#primaryimage"},"image":{"@id":"https:\/\/nordlayer.com\/blog\/secure-rdp\/#primaryimage"},"thumbnailUrl":"https:\/\/images.ctfassets.net\/5natoedl294r\/4LWj5fNWFjK4nsVhHRs60q\/a4cb16bb17749388d2ebc8075dfebe3b\/RDP-security.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp","datePublished":"2024-07-28T03:48:23+00:00","breadcrumb":{"@id":"https:\/\/nordlayer.com\/blog\/secure-rdp\/#breadcrumb"},"inLanguage":"zh-HK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nordlayer.com\/blog\/secure-rdp\/"]}]},{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/nordlayer.com\/blog\/secure-rdp\/#primaryimage","url":"https:\/\/images.ctfassets.net\/5natoedl294r\/4LWj5fNWFjK4nsVhHRs60q\/a4cb16bb17749388d2ebc8075dfebe3b\/RDP-security.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp","contentUrl":"https:\/\/images.ctfassets.net\/5natoedl294r\/4LWj5fNWFjK4nsVhHRs60q\/a4cb16bb17749388d2ebc8075dfebe3b\/RDP-security.png?w=1080&amp;q=75&amp;fit=fill&amp;fm=webp"},{"@type":"BreadcrumbList","@id":"https:\/\/nordlayer.com\/blog\/secure-rdp\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"RDP security: How to secure your remote desktop"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-HK"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/zh\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-lkk","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/81984","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/comments?post=81984"}],"version-history":[{"count":14,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/81984\/revisions"}],"predecessor-version":[{"id":82225,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/81984\/revisions\/82225"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/media?parent=81984"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/categories?post=81984"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/tags?post=81984"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}