Figure 1
Transport Layer Security (TLS)
A RDS session can use one of three security layers to protect the communication between the client and the RDS Session Host server:
For best security performance, you can request SSL / TLS encryption. To get there, you need a digital certificate, which is a certificate that can be issued by a CA or signed by itself.
In addition to selecting the security class, you can select the encryption layer for the connection. The options you can choose here are:
It should be noted that if you choose High or FIPS Compliant, clients that do not support these levels will not be able to connect.
Here's how to configure server authentication and encryption settings:
Remote workstation security in Windows Server 2008 R2 Picture 2
Figure 2
You can also use Group Policy to control these authentication and encryption settings, along with other aspects of RDS.
Group Policy
There are several Group Policy settings for RDS in Windows Server 2008 R2. These settings are located under Computer ConfigurationPoliciesAdministrative TemplatesWindows ComponentsRemote Desktop Services in the Group Policy Management Console for your domain, as shown in Figure 3.
Remote workstation security in Windows Server 2008 R2 Picture 3
Figure 3
As you can see, there are many policies to register, RDS clients and RD Session Host. Security related policies for the RD Session Host include:
Note:
Here you can find out whether a client supports Network Level Authentication: Open the RDC client and click on the icon in the upper left corner, then select ' about '. If NLA is supported, you will see 'Network Level Authentication Supported'.
Other Group Policy settings worth checking are located under the RD Connection Client button. They include:
You can also use Group Policy to configure FIPS consent, but you won't find that policy here with other RDS security policies. Instead, it's located in Computer ConfigurationWindows SettingsSecurity SettingsLocal PoliciesSecurity Options. In the right pane, scroll down to the section: 'System Cryptography: use FIPS compliant algorithms for encryption, hashing and signing.' When you activate this policy, it will only support Triple DES (3DES) encryption algorithm for RDS communication.
RD Web Access
For clients who have not installed the RDC client software, users can access the published applications with them using a web browser. Users type Url into the browser to access the published RDS resources with them. RD Web Access Server is an isolated server with the RD Session Host. You define which RD Web Access servers can connect to the RD Session Host server.
The web interface is configured with SSL and users must be authenticated with their certificates. Authenticated users will only be able to view remote RemoteApp programs that their accounts have access to because the published programs will be cut off, using the access control list (ACL). .
Web Access Server uses X.509 certificate to provide encryption. By default, a self-signed certificate will be used. For better security, you should have a certificate from a certain CA or your company's PKI.
RD Gateway
RD Gateway (RDG) is used to provide access to RD resources to users over the Internet. The Gateway server is located at the edge and it will filter incoming RDS requests according to the Network Policy Server (NPS). NPS uses two policies: Connection Authorization Policy (CAP) policy to list which users can access RDG and Resource Authorization Policy (RAP) used to specify the device. Which CAP users can connect to via RDG.
Conclude
Remote Desktop Services in Windows Server 2008 R2 has indeed expanded a lot of functionality compared to its predecessor, Terminal Services - but it also has some new security issues that need to be mentioned. The best security implementations in configuring components in RDS deployments such as the RD Session Host, RD Web Access Server, RD Gateway and clients - and by using Group Policy to configure controls will help you maintain get a safe environment, while still giving you many other benefits.