Server Security Dog Remote Desktop Protection Tutorial

  
                  

Server Security Dog Remote Desktop Guard provides real-time, proactive remote desktop login protection for user servers. Remote Desktop Guard for multiple types of mainstream remote control software, including remote desktop login tools, RealVnc, Redmin Netman, etc. can effectively implement the guard function to ensure that the server remote desktop is not illegally logged in. At the same time, the remote desktop daemon can also help users avoid the problem of remote login being disabled due to improper setting of security policy port protection rules. After the remote desktop daemon function is enabled, if the server remote desktop login fails, please contact the equipment room to suspend server security. The dog remote desktop guard function can solve the problem. Remote login port settings: For the addition of the server remote login port, the system can automatically obtain it and add it to the “remote login port”, the user does not need to add it manually. After

Meanwhile, the Port dialog box also allows users to change this for Remote Desktop login interface changes directly, the user next logs Remote Desktop, you should use the port after the change log.

Such as: After the original default telnet port 12345 instead of 3389, manually modify the telnet port, select & ldquo; Save & rdquo; so that the new settings to take effect. At this point, the system will pop up a prompt box, suggesting that the user go to the “Security Policy” function interface to set the port protection rules for the port, and modify the remote desktop login port that needs to be guarded (that is, modify the port used for remote desktop login). The system asks to restart the server for the settings to take effect. In the "Confirmation Tips" dialog box that pops up, select "Determine" and restart the server manually. As shown below:

terminal authentication mode selection: a terminal authentication mode i.e. how the system will authenticate remote login server computer. The Server Security Dog<;Remote Desktop Protection" feature supports two terminal authentication methods, namely “IP or Domain Name Authentication" and “Computer Name Authentication”. If the user selects the “IP or domain name authentication” method, the system will verify the IP or domain name of the computer that logs in to the remote desktop, whether it is the IP or domain name specified by the user to allow login to the remote desktop; if the user selects “Computer Name Authentication” & rdquo;, then the system will verify the name of the computer for remote desktop login, whether it is the user-specified computer name allowed to log in to the remote desktop. As shown below:

Here we Laijiangjiang disposed remote desktop whitelist. First, the ip type white list We take the IP 192.168.0.1 computer as an example to learn more about: “remote desktop whitelist”, that is, the computer IP, domain name or computer name that the user is allowed to remotely log in to the server. Select “Add” in the “Add Remote Whitelist” dialog box to select “Whitelist Type” and add the corresponding IP or domain name in the “Data” section.

ip for whitelist, the system allows users to add a single IP or IP, or 192.168.0.1-192.168.0.12 such as 192.168.0.1.

finished adding remote desktop white list, the guardian must open the Remote Desktop feature to the previous settings to take effect. Select “Open”, the system will prompt "<; effective time setting", this function allows the user to set the effective time of the remote desktop guard to provide convenience for some users to test. After the user sets the remote desktop daemon to expire, the system will automatically stop the remote desktop daemon.

The user turns off the Remote Desktop daemon by clicking the “On/Off" button at the top right of the operator interface. After

Remote Desktop feature is turned on guard, will be according to the rules set by the user on the remote desktop in real-time protection against all non-compliant terminal login authentication server, before users open a remote desktop feature strongly recommends Guardian, Confirm that the remote port, terminal authentication method, and remote desktop whitelist are correctly filled out. Here, users are also reminded that the “Remote Desktop Whitelist” is similar to the “Super Whitelist” function, but the usage is completely different. “Remote Desktop Whitelist” is used to specify the remote login server. The computer IP, domain name, or computer name, and “super whitelist” is used to add a trusted IP so that the specified IP or IP segment is not subject to DDOS firewall, ARP firewall, and security policy port protection rules.

Copyright © Windows knowledge All Rights Reserved