C
Chris
Guest
I'm working on a project for a not-for-profit organization. I've been
provided with a W2K3 server at a hosting company. I'm the administrator of
the server.
The server is in its own workgroup (i.e., non-AD) configuration. The server
is not behind any type of hardware firewall; there is no VPN in place, either.
I connect to the server from the Vista PC in my home office via RDP using an
extremely long and complex password. I also connect to the server from my
Windows XP SP2 laptop. I believe I have the newest version of the RDP client
on both clients. I installed SP2 and all of the latest updates on the server.
I have the Windows Firewall on the server configured to only respond to RDP
(i.e., port 3389) traffic originating from the static IP address of my home
office.
How secure is this implementation? Is RDP traffic secure enough to prevent
someone from 'sniffing' and exploiting my credentials? Since there is no SSL
or VPN in place, is RDP traffic (especially the login process) sufficiently
encrypted?
The article "Hacking RDP" and the readers' comments
(http://mcpmag.com/columns/article.asp?EditorialsID=1699) indicate that using
RDP in this fashion is relatively safe--but I don't want to rely on just that
reference! Thanks.
provided with a W2K3 server at a hosting company. I'm the administrator of
the server.
The server is in its own workgroup (i.e., non-AD) configuration. The server
is not behind any type of hardware firewall; there is no VPN in place, either.
I connect to the server from the Vista PC in my home office via RDP using an
extremely long and complex password. I also connect to the server from my
Windows XP SP2 laptop. I believe I have the newest version of the RDP client
on both clients. I installed SP2 and all of the latest updates on the server.
I have the Windows Firewall on the server configured to only respond to RDP
(i.e., port 3389) traffic originating from the static IP address of my home
office.
How secure is this implementation? Is RDP traffic secure enough to prevent
someone from 'sniffing' and exploiting my credentials? Since there is no SSL
or VPN in place, is RDP traffic (especially the login process) sufficiently
encrypted?
The article "Hacking RDP" and the readers' comments
(http://mcpmag.com/columns/article.asp?EditorialsID=1699) indicate that using
RDP in this fashion is relatively safe--but I don't want to rely on just that
reference! Thanks.