Skip to main content
The Agency.
Back to Cybersecurity Glossary

Resources

Remote Desktop Protocol (RDP)

Remote Desktop Protocol (RDP) is Microsoft's proprietary network protocol that enables users to remotely access and control Windows computers over a network connection. It transmits display output from the remote system to the user's local device while sending keyboard and mouse input from the local device to the remote system, creating a seamless remote desktop experience.

RDP serves as the core technology for Windows Remote Desktop Services, enabling remote display and input capabilities for Windows applications running on servers and workstations through sophisticated virtual channel architecture.

How RDP Works

Microsoft engineered RDP to establish secure remote connections through a multi-layer architecture. The protocol operates over TCP port 3389 by default, using several security mechanisms:

Network Level Authentication (NLA): Validates user credentials before establishing the full RDP session, blocking unauthorized connections and reducing the server's exposure to unauthorized access. NLA requires users to authenticate using their credentials before the remote desktop is initialized, significantly reducing the attack surface.

Encryption: RDP supports multiple encryption configurations including TLS 1.0, 1.1, and 1.2 to protect data transmitted during sessions. Encryption levels include Low, Client Compatible, High, and FIPS Compliant configurations.

Virtual Channels: RDP uses virtual channels to multiplex different types of data—display data, input, audio, clipboard, file system redirection, and printer redirection—over a single connection, enabling rich remote desktop functionality.

Security Vulnerabilities and Risks

RDP has been a frequent target of attackers due to its privileged access capabilities. Common attack vectors include:

Brute Force Attacks: Automated tools attempt thousands of username/password combinations against exposed RDP ports, exploiting weak credentials.

Credential Theft: Stolen credentials from phishing campaigns or data breaches enable attackers to authenticate to RDP services using legitimate credentials.

BlueKeep and Similar Vulnerabilities: Unauthenticated remote code execution vulnerabilities in RDP have periodically been discovered, enabling attackers to compromise systems without valid credentials.

Ransomware Delivery: RDP is one of the most common initial access vectors for ransomware attacks, with threat actors using compromised credentials to access systems and deploy encryption tools.

Security Best Practices

Organizations secure RDP deployments through several approaches: restricting RDP access behind VPNs or Zero Trust Network Access (ZTNA) solutions, implementing multi-factor authentication for all RDP connections, disabling RDP on systems where it is not required, monitoring RDP access logs for anomalous connection patterns, and implementing account lockout policies to prevent brute force attacks.

Is your business cyber-ready?

Talk to our team about building a security posture that keeps attackers out.

Talk to our security team