{"id":25154,"date":"2022-02-16T13:23:48","date_gmt":"2022-02-16T13:23:48","guid":{"rendered":"https:\/\/1-grid.com\/knowledge\/?p=25154"},"modified":"2023-04-12T07:29:39","modified_gmt":"2023-04-12T07:29:39","slug":"how-to-protect-rdp-your-connections-to-your-server","status":"publish","type":"ht_kb","link":"https:\/\/1grid.co.za\/knowledge\/how-to-protect-rdp-your-connections-to-your-server\/","title":{"rendered":"How to protect RDP connections to your server?"},"content":{"rendered":"<article id=\"article-body\" class=\"article-body\">\n<blockquote><p><span style=\"color: #000000;\">This article provides you with steps to secure RDP connections to your server.<\/span><\/p><\/blockquote>\n<\/article>\n<article id=\"article-body\" class=\"article-body\">\n<h1><span style=\"color: #000000;\"><strong>Rename the standard administrator account<\/strong><\/span><\/h1>\n<ul>\n<li><span style=\"color: #000000;\">Press Win + X and select \u201cComputer management\u201d:<\/span><\/li>\n<\/ul>\n<div class=\"image-container \"><a class=\"image-enlarge-link\" href=\"https:\/\/s3.amazonaws.com\/cdn.freshdesk.com\/data\/helpdesk\/attachments\/production\/33047822137\/original\/OGh7YUVnm1nAdwM-9qEwDySld9lPtjctUQ.png?1602244695\" target=\"_blank\" rel=\"noopener\" aria-describedby=\"RDP-protection-- computer management.png\"><img loading=\"lazy\" decoding=\"async\" class=\"fr-fic fr-dib fr-bordered fr-shadow lightbox-image aligncenter\" style=\"box-sizing: border-box; border: 0px; height: 339.399px;\" src=\"https:\/\/s3.amazonaws.com\/cdn.freshdesk.com\/data\/helpdesk\/attachments\/production\/33047822137\/original\/OGh7YUVnm1nAdwM-9qEwDySld9lPtjctUQ.png?1602244695\" alt=\"RDP-protection-- computer management.png\" width=\"211\" height=\"339\" data-attachment=\"[object Object]\" data-id=\"33047822137\" data-index=\"0\" \/><\/a><\/div>\n<ul>\n<li><span style=\"color: #000000;\">Then select \u201cLocal users\u201d &#8211;\u2192 \u201cUsers\u201d &#8211;\u2192 click with the right mouse button on user\u2019s name \u201cAdministrator\u201d and select<\/span><\/li>\n<\/ul>\n<div class=\"image-container \"><a class=\"image-enlarge-link\" href=\"https:\/\/s3.amazonaws.com\/cdn.freshdesk.com\/data\/helpdesk\/attachments\/production\/33047822141\/original\/WEVtbgXdhSi_8wrDuoG7SCNYbOvtx8BV9A.png?1602244696\" target=\"_blank\" rel=\"noopener\" aria-describedby=\"RDP-protection-- rename administrator_0.png\"><img loading=\"lazy\" decoding=\"async\" class=\"fr-fic fr-dib fr-bordered fr-shadow lightbox-image aligncenter\" style=\"box-sizing: border-box; border: 0px; width: 517px; height: 302.74px;\" src=\"https:\/\/s3.amazonaws.com\/cdn.freshdesk.com\/data\/helpdesk\/attachments\/production\/33047822141\/original\/WEVtbgXdhSi_8wrDuoG7SCNYbOvtx8BV9A.png?1602244696\" alt=\"RDP-protection-- rename administrator_0.png\" width=\"517\" height=\"303\" data-attachment=\"[object Object]\" data-id=\"33047822141\" data-index=\"1\" \/><\/a><\/div>\n<ul>\n<li><span style=\"color: #000000;\">Rename the Administrator user and use this name for subsequent connection to the remote desktop.<\/span><\/li>\n<\/ul>\n<div><\/div>\n<h2><span style=\"font-size: 24px; color: #000000;\"><strong>Blocking of RDP connections for accounts with an empty password<\/strong><\/span><\/h2>\n<p><span style=\"color: #000000;\">Security can be improved by prohibiting to connect to accounts with empty passwords. To do this, you should enable security policy \u201cAccounts\u201d: permit to use empty passwords only for log-in from the console\u201d:<\/span><\/p>\n<ul>\n<li><span style=\"color: #000000;\">Open local security policy (press Win + R and enter command secpol.msc)<\/span><\/li>\n<li><span style=\"color: #000000;\">Browse to \u201cLocal policies\u201d \u2013-&gt; \u201cSecurity parameters\u201d.<\/span><\/li>\n<\/ul>\n<div class=\"image-container \"><a class=\"image-enlarge-link\" href=\"https:\/\/s3.amazonaws.com\/cdn.freshdesk.com\/data\/helpdesk\/attachments\/production\/33047822147\/original\/krkm2iE2WHNNGMXrWCpJb5Fd-ddrqsat5A.png?1602244696\" target=\"_blank\" rel=\"noopener\" aria-describedby=\"RDP-protection-- security param.png\"><img loading=\"lazy\" decoding=\"async\" class=\"fr-fic fr-dib fr-bordered fr-shadow lightbox-image aligncenter\" style=\"box-sizing: border-box; border: 0px; width: 692px; height: 277.138px;\" src=\"https:\/\/s3.amazonaws.com\/cdn.freshdesk.com\/data\/helpdesk\/attachments\/production\/33047822147\/original\/krkm2iE2WHNNGMXrWCpJb5Fd-ddrqsat5A.png?1602244696\" alt=\"RDP-protection-- security param.png\" width=\"692\" height=\"277\" data-attachment=\"[object Object]\" data-id=\"33047822147\" data-index=\"2\" \/><\/a><\/div>\n<ul>\n<li><span style=\"color: #000000;\">Double click on policy \u201cAccounts: permit to use empty passwords&#8230;\u00bb and make sure that it is enabled:<\/span><\/li>\n<\/ul>\n<div class=\"image-container \"><a class=\"image-enlarge-link\" href=\"https:\/\/s3.amazonaws.com\/cdn.freshdesk.com\/data\/helpdesk\/attachments\/production\/33047822362\/original\/sAN69Zkf5FMBHgF8GjightQEnyiMF2oiCA.png?1602244989\" target=\"_blank\" rel=\"noopener\" aria-describedby=\"RDP-protection-- limit of blank password.png\"><img loading=\"lazy\" decoding=\"async\" class=\"fr-fic fr-dib fr-bordered fr-shadow lightbox-image aligncenter\" style=\"box-sizing: border-box; border: 0px; vertical-align: top; max-width: 100%; position: relative; cursor: pointer; margin: 5px auto; display: block; float: none; color: #000000; font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, 'Helvetica Neue', Arial, sans-serif; font-size: 13px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; text-decoration-style: initial; text-decoration-color: initial; width: 341px; height: 404.351px;\" src=\"https:\/\/s3.amazonaws.com\/cdn.freshdesk.com\/data\/helpdesk\/attachments\/production\/33047822362\/original\/sAN69Zkf5FMBHgF8GjightQEnyiMF2oiCA.png?1602244989\" alt=\"RDP-protection-- limit of blank password.png\" width=\"341\" height=\"404\" data-id=\"33047822362\" data-attachment=\"[object Object]\" data-index=\"3\" \/><\/a><\/div>\n<h3><br style=\"box-sizing: border-box;\" \/><span style=\"font-size: 24px; color: #000000;\"><strong>Change of standard port Remote Desktop Protocol<\/strong><\/span><\/h3>\n<p><span style=\"color: #000000;\">It&#8217;s good practice to change a standard port, on which RDP protocol works. The method to this is described in our instruction: Windows Server 2012.<\/span><\/p>\n<h4><\/h4>\n<h4><span style=\"font-size: 24px; color: #000000;\"><strong>Protection from brute force<\/strong><\/span><\/h4>\n<p><span style=\"color: #000000;\">In order to block multiple attempts to connect using the wrong data, it is possible to trace the event log and manually block attacking IP addresses using Windows firewall or a ready application. Let\u2019s review the last case in detail.<\/span><\/p>\n<p><br style=\"box-sizing: border-box;\" \/><span style=\"color: #000000;\">We will use free SW for blocking of attacking IP addresses &#8211;\u00a0IPBan. This application is verified and operates with Windows Server 2008 all subsequent versions. Windows XP and Server 2003 are not supported. Its operation algorithm is simple: the program monitors Windows event log, record log-in attempts and blocks IP address for 24 hours after 5 attempts of the hacker.<\/span><\/p>\n<ul>\n<li><span style=\"color: #000000;\">\u00a0Download an archive with the program here;<\/span><\/li>\n<li><span style=\"color: #000000;\">\u00a0It contains two archives IPBan-Linux-x64.zip and IPBan-Windows-x86.zip, we need the last one. Unpack the IPBan-Windows-x86.zip archive into any convenient place (for example, into C: drive root directory);<\/span><\/li>\n<\/ul>\n<ul>\n<li><span style=\"color: #000000;\">As files, downloaded from the Internet, are automatically blocked by the system for security. All files should be unblocked for the application operation. Click with the right mouse button on all extracted files and select properties.<\/span><\/li>\n<li><span style=\"color: #000000;\">Necessarily select \u201cunblock\u201d, if this parameter is available. Or open the PowerShell window (Win + R, enter PowerShell and click on &#8220;\u041e\u041a&#8221;) and enter the following command:<\/span><\/li>\n<\/ul>\n<pre>get-childitem \u201cfolder location\u201d | unblock-file -confirm<\/pre>\n<p><span style=\"color: #000000;\">For example:<\/span><\/p>\n<div class=\"image-container \"><a class=\"image-enlarge-link\" href=\"https:\/\/s3.amazonaws.com\/cdn.freshdesk.com\/data\/helpdesk\/attachments\/production\/33047822155\/original\/8WGe2dEwrggw5ui9iuJrCX62aPFvHesaAw.png?1602244697\" target=\"_blank\" rel=\"noopener\" aria-describedby=\"RDP-protection-- powershell - unblock_0.png\"><img loading=\"lazy\" decoding=\"async\" class=\"fr-fic fr-dib fr-bordered fr-shadow lightbox-image aligncenter\" style=\"box-sizing: border-box; border: 0px; width: 612px; height: 191.034px;\" src=\"https:\/\/s3.amazonaws.com\/cdn.freshdesk.com\/data\/helpdesk\/attachments\/production\/33047822155\/original\/8WGe2dEwrggw5ui9iuJrCX62aPFvHesaAw.png?1602244697\" alt=\"RDP-protection-- powershell - unblock_0.png\" width=\"612\" height=\"191\" data-attachment=\"[object Object]\" data-id=\"33047822155\" data-index=\"4\" \/><\/a><\/div>\n<\/article>\n<div><\/div>\n<div><\/div>\n<div><\/div>\n<article id=\"article-body\" class=\"article-body\">\n<ul>\n<li><span style=\"color: #000000;\">You should make the following changes in the local security policy, in order to make sure that IP addresses are displayed in system logs. Open \u201cLocal security policy\u201d (Win + R, enter secpol.msc and press &#8220;OK&#8221;). Browse to \u201cLocal policies\u201d &#8211;&gt; \u201cAudit policy\u201d and enable registration of failures for \u201cAudit account logon events\u201d and \u201cAudit logon events\u201d:<\/span><\/li>\n<\/ul>\n<div class=\"image-container \"><a class=\"image-enlarge-link\" href=\"https:\/\/s3.amazonaws.com\/cdn.freshdesk.com\/data\/helpdesk\/attachments\/production\/33047822156\/original\/R2Kr-aM0pukDSEe0j5lN7QHTqbyNkia_uw.png?1602244697\" target=\"_blank\" rel=\"noopener\" aria-describedby=\"RDP-protection-- audit-on.png\"><img loading=\"lazy\" decoding=\"async\" class=\"fr-fic fr-dib fr-bordered fr-shadow lightbox-image aligncenter\" style=\"box-sizing: border-box; border: 0px; width: 648px; height: 262.112px;\" src=\"https:\/\/s3.amazonaws.com\/cdn.freshdesk.com\/data\/helpdesk\/attachments\/production\/33047822156\/original\/R2Kr-aM0pukDSEe0j5lN7QHTqbyNkia_uw.png?1602244697\" alt=\"RDP-protection-- audit-on.png\" width=\"648\" height=\"262\" data-attachment=\"[object Object]\" data-id=\"33047822156\" data-index=\"5\" \/><\/a><\/div>\n<div class=\"image-container \"><a class=\"image-enlarge-link\" href=\"https:\/\/s3.amazonaws.com\/cdn.freshdesk.com\/data\/helpdesk\/attachments\/production\/33047822152\/original\/ojTNsA5xpN58Nydi5znNc_iiEOEmkYXvAg.png?1602244697\" target=\"_blank\" rel=\"noopener\" aria-describedby=\"RDP-protection-- audit-chekbox.png\"><img loading=\"lazy\" decoding=\"async\" class=\"fr-fic fr-dib fr-bordered fr-shadow lightbox-image aligncenter\" style=\"box-sizing: border-box; border: 0px; width: 332px; height: 394.584px;\" src=\"https:\/\/s3.amazonaws.com\/cdn.freshdesk.com\/data\/helpdesk\/attachments\/production\/33047822152\/original\/ojTNsA5xpN58Nydi5znNc_iiEOEmkYXvAg.png?1602244697\" alt=\"RDP-protection-- audit-chekbox.png\" width=\"332\" height=\"395\" data-attachment=\"[object Object]\" data-id=\"33047822152\" data-index=\"6\" \/><\/a><\/div>\n<\/article>\n<div><\/div>\n<div><\/div>\n<div><\/div>\n<article id=\"article-body\" class=\"article-body\">\n<ul>\n<li>For Windows Server 2008 or equivalent, you should disable NTLM logins and permit only NTLM2 log-in. There is no other method to obtain an IP address for log in NTLM in Windows Server 2008. Open \u201cLocal security policy\u201d (Win + R, enter secpol.msc and press &#8220;OK&#8221;). Browse to \u201cLocal policies\u201d &#8211;&gt; \u201cSecurity parameters\u201d &#8211;&gt; \u201cNetwork security: NTLM restrictions: NTLM incoming traffic&#8221; and set a value \u201cProhibit all accounts\u201d:<\/li>\n<\/ul>\n<\/article>\n<div class=\"image-container \"><\/div>\n<div><\/div>\n<div><\/div>\n<article id=\"article-body\" class=\"article-body\">\n<ul>\n<li><span style=\"color: #000000;\">Now it is required to create IPBan service so that the application is launched after the system start-up and operates in the background. Launch PowerShell (Win + R, enter PowerShell and press &#8220;\u041e\u041a&#8221;) and run the following command:<\/span><\/li>\n<\/ul>\n<pre>sc.exe create IPBAN type= own start= auto binPath= c:\\\"Directory with program\"\\IPBan.exe DisplayName= IPBAN<\/pre>\n<p><span style=\"color: #000000;\"><strong>For example:<\/strong><\/span><\/p>\n<\/article>\n<div class=\"image-container \"><\/div>\n<div><\/div>\n<article id=\"article-body\" class=\"article-body\">\n<ul>\n<li><span style=\"color: #000000;\">Go to services (Win + R, enter services.msc and press &#8220;OK&#8221;) and launch IPBAN service. Hereafter, it will be launched automatically:<\/span><\/li>\n<\/ul>\n<div class=\"image-container \"><a class=\"image-enlarge-link\" href=\"https:\/\/s3.amazonaws.com\/cdn.freshdesk.com\/data\/helpdesk\/attachments\/production\/33047822143\/original\/rEauh_WBTxhBmRqWNCV7gUG5Uvt1evwWZw.png?1602244696\" target=\"_blank\" rel=\"noopener\" aria-describedby=\"RDP-protection-- start ipban.png\"><img loading=\"lazy\" decoding=\"async\" class=\"fr-fic fr-dib lightbox-image aligncenter\" style=\"box-sizing: border-box; border: 0px; width: 655px; height: 550.872px;\" src=\"https:\/\/s3.amazonaws.com\/cdn.freshdesk.com\/data\/helpdesk\/attachments\/production\/33047822143\/original\/rEauh_WBTxhBmRqWNCV7gUG5Uvt1evwWZw.png?1602244696\" alt=\"RDP-protection-- start ipban.png\" width=\"655\" height=\"551\" data-attachment=\"[object Object]\" data-id=\"33047822143\" data-index=\"9\" \/><\/a><\/div>\n<ul>\n<li><span style=\"color: #000000;\">In \u201cTask dispatcher&#8221; you can look up if the service is launched and operates:<\/span><\/li>\n<\/ul>\n<div class=\"image-container \"><a class=\"image-enlarge-link\" href=\"https:\/\/s3.amazonaws.com\/cdn.freshdesk.com\/data\/helpdesk\/attachments\/production\/33047822153\/original\/ju_d5jZuoPVW_TYpNmhbXZ3ZMlr2lBasyg.png?1602244697\" target=\"_blank\" rel=\"noopener\" aria-describedby=\"RDP-protection-- task manager.png\"><img loading=\"lazy\" decoding=\"async\" class=\"fr-fic fr-dib lightbox-image aligncenter\" style=\"box-sizing: border-box; border: 0px; width: 367px; height: 232.673px;\" src=\"https:\/\/s3.amazonaws.com\/cdn.freshdesk.com\/data\/helpdesk\/attachments\/production\/33047822153\/original\/ju_d5jZuoPVW_TYpNmhbXZ3ZMlr2lBasyg.png?1602244697\" alt=\"RDP-protection-- task manager.png\" width=\"367\" height=\"233\" data-attachment=\"[object Object]\" data-id=\"33047822153\" data-index=\"10\" \/><\/a><\/div>\n<\/article>\n<div><\/div>\n<div><\/div>\n<article id=\"article-body\" class=\"article-body\">\n<ul>\n<li><span style=\"color: #000000;\">Thus, the program monitors failed authorization attempts and add unwanted IP address into the created rule for incoming connections of Windows firewall:<\/span><\/li>\n<\/ul>\n<\/article>\n<div class=\"image-container \"><\/div>\n<div><\/div>\n<article id=\"article-body\" class=\"article-body\">\n<ul>\n<li><span style=\"color: #000000;\">Blocked IP addresses can be unblocked manually. Go to \u201cScope\u201d tab, located in &#8220;IPBan_0\u201d rule properties and remove the required IP address the list:<\/span><\/li>\n<\/ul>\n<div class=\"image-container \"><a class=\"image-enlarge-link\" href=\"https:\/\/s3.amazonaws.com\/cdn.freshdesk.com\/data\/helpdesk\/attachments\/production\/33047822158\/original\/hQ84e-aD--tUIxB3khycTWkr8Bt9bJvyiQ.png?1602244698\" target=\"_blank\" rel=\"noopener\" aria-describedby=\"RDP-protection-- remove IPs.png\"><img loading=\"lazy\" decoding=\"async\" class=\"fr-fic fr-dib lightbox-image aligncenter\" style=\"box-sizing: border-box; border: 0px; width: 476px; height: 547.656px;\" src=\"https:\/\/s3.amazonaws.com\/cdn.freshdesk.com\/data\/helpdesk\/attachments\/production\/33047822158\/original\/hQ84e-aD--tUIxB3khycTWkr8Bt9bJvyiQ.png?1602244698\" alt=\"RDP-protection-- remove IPs.png\" width=\"476\" height=\"548\" data-attachment=\"[object Object]\" data-id=\"33047822158\" data-index=\"12\" \/><\/a><\/div>\n<\/article>\n","protected":false},"excerpt":{"rendered":"<p>This article provides you with steps to secure RDP connections to your server. Rename the standard administrator account Press Win + X and select \u201cComputer management\u201d: Then select \u201cLocal users\u201d &#8211;\u2192 \u201cUsers\u201d &#8211;\u2192 click with the right mouse button on user\u2019s name \u201cAdministrator\u201d and select Rename the Administrator user and&#8230;<\/p>\n","protected":false},"author":21,"comment_status":"closed","ping_status":"closed","template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"ht-kb-category":[1178],"ht-kb-tag":[224,480,782,804,898,1024,1161],"class_list":["post-25154","ht_kb","type-ht_kb","status-publish","format-standard","hentry","ht_kb_category-servers","ht_kb_tag-connection","ht_kb_tag-how-to","ht_kb_tag-protect","ht_kb_tag-rdp","ht_kb_tag-server","ht_kb_tag-to","ht_kb_tag-your"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to protect RDP connections to your server? -<\/title>\n<meta name=\"description\" content=\"This article provides you with steps to secure RDP connections to your server. How to protect RDP connections to your server?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/1grid.co.za\/knowledge\/how-to-protect-rdp-your-connections-to-your-server\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to protect RDP connections to your server? -\" \/>\n<meta property=\"og:description\" content=\"This article provides you with steps to secure RDP connections to your server. How to protect RDP connections to your server?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/1grid.co.za\/knowledge\/how-to-protect-rdp-your-connections-to-your-server\/\" \/>\n<meta property=\"og:site_name\" content=\"1-grid Knowledge Base\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/1grid.co.za\/\" \/>\n<meta property=\"article:modified_time\" content=\"2023-04-12T07:29:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/s3.amazonaws.com\/cdn.freshdesk.com\/data\/helpdesk\/attachments\/production\/33047822137\/original\/OGh7YUVnm1nAdwM-9qEwDySld9lPtjctUQ.png?1602244695\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@1grid_hosting\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/1grid.co.za\/knowledge\/how-to-protect-rdp-your-connections-to-your-server\/\",\"url\":\"https:\/\/1grid.co.za\/knowledge\/how-to-protect-rdp-your-connections-to-your-server\/\",\"name\":\"How to protect RDP connections to your server? -\",\"isPartOf\":{\"@id\":\"https:\/\/1grid.co.za\/knowledge\/#website\"},\"datePublished\":\"2022-02-16T13:23:48+00:00\",\"dateModified\":\"2023-04-12T07:29:39+00:00\",\"description\":\"This article provides you with steps to secure RDP connections to your server. How to protect RDP connections to your server?\",\"breadcrumb\":{\"@id\":\"https:\/\/1grid.co.za\/knowledge\/how-to-protect-rdp-your-connections-to-your-server\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/1grid.co.za\/knowledge\/how-to-protect-rdp-your-connections-to-your-server\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/1grid.co.za\/knowledge\/how-to-protect-rdp-your-connections-to-your-server\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/1grid.co.za\/knowledge\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to protect RDP connections to your server?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/1grid.co.za\/knowledge\/#website\",\"url\":\"https:\/\/1grid.co.za\/knowledge\/\",\"name\":\"1-Grid Domain Hosting Knowledge Base\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/1grid.co.za\/knowledge\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/1grid.co.za\/knowledge\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/1grid.co.za\/knowledge\/#organization\",\"name\":\"1-Grid Domain Hosting Knowledge Base\",\"url\":\"https:\/\/1grid.co.za\/knowledge\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/1grid.co.za\/knowledge\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/1grid.co.za\/knowledge\/wp-content\/uploads\/2023\/01\/1-grid-logo-color.svg\",\"contentUrl\":\"https:\/\/1grid.co.za\/knowledge\/wp-content\/uploads\/2023\/01\/1-grid-logo-color.svg\",\"width\":100,\"height\":100,\"caption\":\"1-Grid Domain Hosting Knowledge Base\"},\"image\":{\"@id\":\"https:\/\/1grid.co.za\/knowledge\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/1grid.co.za\/\",\"https:\/\/twitter.com\/1grid_hosting\",\"https:\/\/www.instagram.com\/1grid_hosting\/\",\"https:\/\/za.linkedin.com\/company\/1-grid\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to protect RDP connections to your server? -","description":"This article provides you with steps to secure RDP connections to your server. How to protect RDP connections to your server?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/1grid.co.za\/knowledge\/how-to-protect-rdp-your-connections-to-your-server\/","og_locale":"en_US","og_type":"article","og_title":"How to protect RDP connections to your server? -","og_description":"This article provides you with steps to secure RDP connections to your server. How to protect RDP connections to your server?","og_url":"https:\/\/1grid.co.za\/knowledge\/how-to-protect-rdp-your-connections-to-your-server\/","og_site_name":"1-grid Knowledge Base","article_publisher":"https:\/\/www.facebook.com\/1grid.co.za\/","article_modified_time":"2023-04-12T07:29:39+00:00","og_image":[{"url":"https:\/\/s3.amazonaws.com\/cdn.freshdesk.com\/data\/helpdesk\/attachments\/production\/33047822137\/original\/OGh7YUVnm1nAdwM-9qEwDySld9lPtjctUQ.png?1602244695"}],"twitter_card":"summary_large_image","twitter_site":"@1grid_hosting","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/1grid.co.za\/knowledge\/how-to-protect-rdp-your-connections-to-your-server\/","url":"https:\/\/1grid.co.za\/knowledge\/how-to-protect-rdp-your-connections-to-your-server\/","name":"How to protect RDP connections to your server? -","isPartOf":{"@id":"https:\/\/1grid.co.za\/knowledge\/#website"},"datePublished":"2022-02-16T13:23:48+00:00","dateModified":"2023-04-12T07:29:39+00:00","description":"This article provides you with steps to secure RDP connections to your server. How to protect RDP connections to your server?","breadcrumb":{"@id":"https:\/\/1grid.co.za\/knowledge\/how-to-protect-rdp-your-connections-to-your-server\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/1grid.co.za\/knowledge\/how-to-protect-rdp-your-connections-to-your-server\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/1grid.co.za\/knowledge\/how-to-protect-rdp-your-connections-to-your-server\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/1grid.co.za\/knowledge\/"},{"@type":"ListItem","position":2,"name":"How to protect RDP connections to your server?"}]},{"@type":"WebSite","@id":"https:\/\/1grid.co.za\/knowledge\/#website","url":"https:\/\/1grid.co.za\/knowledge\/","name":"1-Grid Domain Hosting Knowledge Base","description":"","publisher":{"@id":"https:\/\/1grid.co.za\/knowledge\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/1grid.co.za\/knowledge\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/1grid.co.za\/knowledge\/#organization","name":"1-Grid Domain Hosting Knowledge Base","url":"https:\/\/1grid.co.za\/knowledge\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/1grid.co.za\/knowledge\/#\/schema\/logo\/image\/","url":"https:\/\/1grid.co.za\/knowledge\/wp-content\/uploads\/2023\/01\/1-grid-logo-color.svg","contentUrl":"https:\/\/1grid.co.za\/knowledge\/wp-content\/uploads\/2023\/01\/1-grid-logo-color.svg","width":100,"height":100,"caption":"1-Grid Domain Hosting Knowledge Base"},"image":{"@id":"https:\/\/1grid.co.za\/knowledge\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/1grid.co.za\/","https:\/\/twitter.com\/1grid_hosting","https:\/\/www.instagram.com\/1grid_hosting\/","https:\/\/za.linkedin.com\/company\/1-grid"]}]}},"_links":{"self":[{"href":"https:\/\/1grid.co.za\/knowledge\/wp-json\/wp\/v2\/ht-kb\/25154","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/1grid.co.za\/knowledge\/wp-json\/wp\/v2\/ht-kb"}],"about":[{"href":"https:\/\/1grid.co.za\/knowledge\/wp-json\/wp\/v2\/types\/ht_kb"}],"author":[{"embeddable":true,"href":"https:\/\/1grid.co.za\/knowledge\/wp-json\/wp\/v2\/users\/21"}],"replies":[{"embeddable":true,"href":"https:\/\/1grid.co.za\/knowledge\/wp-json\/wp\/v2\/comments?post=25154"}],"version-history":[{"count":8,"href":"https:\/\/1grid.co.za\/knowledge\/wp-json\/wp\/v2\/ht-kb\/25154\/revisions"}],"predecessor-version":[{"id":32542,"href":"https:\/\/1grid.co.za\/knowledge\/wp-json\/wp\/v2\/ht-kb\/25154\/revisions\/32542"}],"wp:attachment":[{"href":"https:\/\/1grid.co.za\/knowledge\/wp-json\/wp\/v2\/media?parent=25154"}],"wp:term":[{"taxonomy":"ht_kb_category","embeddable":true,"href":"https:\/\/1grid.co.za\/knowledge\/wp-json\/wp\/v2\/ht-kb-category?post=25154"},{"taxonomy":"ht_kb_tag","embeddable":true,"href":"https:\/\/1grid.co.za\/knowledge\/wp-json\/wp\/v2\/ht-kb-tag?post=25154"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}