What are common uses for remote desktop?
Laptop users at home with a slow link. They could establish a remote desktop connection to a PC in the office.
To configure or troubleshoot a computer.
What are some security considerations you must resolve when allowing remote access?
Remote Access permissions should be granted using least privilege principals
The connection must use encryption (like VPN)
Server software supporting the connection must be safe from vulnerabilities.
What is the run text for Remote Desktop?
mstsc.exe
What is VNC?
Virtual Network Computing.
It is a freeware product with similar functionality to RDP.
Apple Screen Sharing uses VNC.
Works over TCP port 5900.
What is NLA and what does it do?
Network Level Authentication.
Requires users to authenticate before establishing a full RDP session.
This protects the RDP server from attacks.
What can you use to run a RDP on Linux?
XRDP.
What is Remote Assistance?
AKA MSRA (Microsoft Remote Assistance)
Allows a user to ask for help from a technician or co-worker via an invitation file that is protected by a password.
The helper can open the file to connect over RDP and join the session.
There is a chat feature, and the helper can request control over the desktop.
Assigns a port dynamically from 49152 to 65535, so is difficult to configure a firewall securely to allow the connection.
What is the run text for Remote assistance?
msra.exe
What does the Quick Assist feature do?
An alt to Remote Assistance.
Works over HTTPS (443) port.
The helper must be signed in with a Microsoft account to offer assistance
The helper generates the password to provide the starter.
What is WinRM and what does it do?
Windows Remote Management.
Allows systems to exchange and access management information across a network.
The WinRM console can be used to execute management commands on the system remotely.
A SOAP (Simple Object Access Protocol) base program so it relies on HTTP/HTTPS connections to communicate between systems.
Microsoft’s implementation of the WS-Management protocol.
What are security concerns for WinRM?
Remote attackers executing their own commands against the network device.
What does WinRM use to encrypt traffic?
Kerbos.
How does Secure Shell SSH connect to a computer.
To a command interpreter (terminal).
What are 2 common ways to authenticate the SSH server?
Password authentication
Public key authentication
What is the difference between in-band and out-of-band management
What are 2 general classes of tools that provide enterprise desktop monitoring and remote access?
Remote monitoring and management (RMM)- Used to centralize device management. Generally designed for used by managed service provides (MSP). Will be able to distinguish client accounts and provide support for recording and reporting billable support activity
Desktop management/Mobile device management (MDM)-Designed for deployment by a single organization. Focuses primarily on access control and authorization.
What is SPICE?
Simple Protocol for Independent Computing Environments.
Provides a remote display system to monitor and interact with virtual machine environments across the internet.
Security of the machines is provided through options like Kerberos.
List some file transfer software OS vendors have developed.
Airdrop- Apple
Nearby Sharing- Microsoft’s version of Airdrop
Nearby Share- Bluetooth enabled sharing for Android devices.
What is a shortcut for quick assist?
CTRL + WINDOWS KEY + Q
What is RMM?
Remote Managing and monitoring.
Allows you to perform tasks remotely like analyzing activity, receiving automated alerts, tracking device health etc.
A tool commonly used by MSP (managed Service Providers)- 3rd party company that remotely manages a clients IT infrastructure.