RDS, Remote Desktop Services, relies on RDP. For many years, Remote Desktop Protocol (RDP) has been an essential tool for remote access including RDS, allowing users to connect to Windows machines across networks. Ensuring the security of these connexions is paramount to safeguard sensitive data and prevent unauthorised access.

In this article, we delve into the differences between two crucial components of RDP security: RDP Security Layer and the Negotiate setting. We will also discuss TLS and other related security aspects before pointing to some of the great advantages brought by RDS-Tools Advanced Security to any RDS set-up.

Understanding the RDP Security Landscape

RDP operates on a client-server model, enabling users to control remote systems as if they were physically present. The security of RDP connexions involves two distinct aspects: how the connexion is established and how the connexion is secured.

Authentication and Establishing Connexions

Before initiating a remote desktop connexion, servers and clients must authenticate each other. This process is critical to preventing unauthorised access and reveals perhaps the protocol’s biggest weakness.

In brief, Negotiate and RDP Security Layer are two mechanisms used to achieve this authentication. The third is generally TLS. Security Layer is less secure than TLS, but not all devices support TLS, even though more and more do. Negotiate therefore provides a way for the server to choose, between Security Layer and TLS, the security process available to both server and client.

RDP Security Layer - Compatible Native Security

RDP Security Layer involves native RDP encryption for securing communications between the client and the RD Session Host server. Security Layer is native and all Windows machines should therefore support it. This method is straightforward and efficient, but it does not provide server authentication. Unfortunately, it is made less secure by this lack of authentication. I expand on why further down.

Transport Layer Security (TLS) - Security with Prior Authentication

TLS is the protocol used by HTTPS for encryption. It is the step up from SSL (Secure Sockets Layer). Its function is to check the identity of the server and client before establishing a connexion between them. This prior verification is what makes it so secure compared to Secure Layer.

Negotiate – Striking the Balance Between Security and Compatibility

Amidst these, the Negotiate setting is the default for RDP connexions. It enables negotiation between the client and server to determine the most secure authentication method supported by the client. If the client supports Transport Layer Security (TLS), version 1.0 or more, then TLS is used for server authentication. If TLS is not supported, then native RDP encryption is employed, even though server authentication is consequently not performed.

Security Layer: Encryption, but is it Enough

RDP Security Layer uses native RDP encryption to protect data during transmission. However, because it lacks server authentication, it is highly susceptible to man-in-the-middle attacks. Indeed, if the connexion has been established with a malicious party instead of the intended client or server and the connexion is therefore already compromised, no level of encryption will serve as protection.

It may be important to note that using the RDP Security Layer precludes the use of Network Level Authentication (NLA), another more secure connexion method.

Negotiate Setting: Flexibility and Basic Security

As a setting, Negotiate offers potential enhanced security by selecting the most secure authentication method supported by the client. If TLS is available, it is used for server authentication. If not, native RDP encryption is employed. For this setting to provide better security, it is essential to ensure TLS is supported on both the client and server sides.

Transport Layer Security: Encryption Between Verified Parties

By setting TLS as the security level, encryption is guaranteed. Bear in mind the connexion will not be established if TLS is not supported. Some clients may therefore not be able to remotely access certain servers due to one or the other not meeting requirements. Yet, that is a small price to pay for peace of mind.

Choosing the Right Security Layer for Your RDS Infrastructure

As you can see, selecting the appropriate security layer depends on your specific needs and environment. For heightened security, I recommend TLS, or at least Negotiate. No surprise that TLS has become generalised. This approach, combining robust encryption with server authentication, minimises vulnerabilities.

Best Practices for Securing RDP Connexions

To bolster the security of your RDP connexions, consider implementing these best practices:

  1. Use Strong Passwords: Employing complex passwords is key to thwart brute-force attacks.
  2. Firewall Restrictions: Configure firewalls to allow RDP access only from trusted IP addresses or ranges.
  3. Multi-Factor Authentication (MFA): Implement 2FA to add an extra layer of security, mitigating key-logging and unauthorised access.
  4. Enable Automatic Updates: Keep operating systems updated to patch known vulnerabilities and enhance security. Indeed, remember that OS and software providers do their best to keep abreast in this field in order to stay one step ahead of hackers and malicious attacks.

These are only some basic guidelines and you will find there are many more ways of strengthening your infrastructure against cyberattacks.

RDS-Advanced Security - Unmatched RDS Cyber Protection

For instance, here is our tool to ensure top-tier security for your Remote Desktop Services (RDS) infrastructure then our comprehensive cybersecurity solution. RDS Advanced Security is a robust toolbox. It combines cutting-edge features to create an impenetrable defence against external threats.

Key Features:

  • All-round Protection: Benefit from a suite of 9 security features that safeguard every aspect of your RDS infrastructure.
  • Remote Desktop Security: Implement advanced security protocols on your remote servers instantly upon installation.
  • IP Management: Easily manage whitelisted and blocked IP addresses for granular control.
  • Flexible Access Control: Define remote work parameters effortlessly, regulating access based on location, time, and device.

Benefits:

  • Adaptable Security: Adjust security levels to fit your organisation's unique requirements.
  • Seamless Remote Work: Ensure a secure transition to remote work as cyber threats surge.
  • Long-Term Value: Permanent licenses guarantee enduring protection, offering exceptional value.

Conclusion

The choice between RDP Security Layer, TLS and Negotiate has significant implications for the security of your remote desktop connexions. While RDP Security Layer offers simplicity and TLS safer communications, the Negotiate method provides a balanced approach by negotiating the most secure authentication method available.

By understanding this and your infrastructure, you are all set to implement the most secure settings for your enterprise. With the addition of the mentioned best practices, now is the time to ensure the safety of your RDP connexions and protect your sensitive data from potential threats. You can secure your RDS infrastructure comprehensively and effortlessly. Safeguard your remote servers with RDS Advanced Security starting with a free trial today.

Start your free trial today.

Download any RDS Tools software to start your 15-Day free trial.

Start for FREE »

Easy setup – No credit card required

Discover RDS Tools

The Ultimate Toolbox to better Serve your Microsoft RDS Clients.

  • RDS Advanced Security
  • RDS Remote Support
  • RDS Server Monitoring
Download a trial

Need to speak to sales?

The Ultimate Toolbox to better Serve your Microsoft RDS Clients.

Contact sales