Shield Your RDP: Defend Against Hacks with These Quick Steps!"

Introduction:

Remote Desktop Protocol (RDP) provides a convenient way to access your Windows server remotely. However, ensuring the security of your system is paramount. One effective measure is to restrict RDP access to specific IP addresses, reducing the risk of unauthorized access. In this detailed guide, we will walk through the process step-by-step, using the Windows Defender Firewall settings.

🎥 Watch our video tutorial for step-by-step guidance! For detailed instructions and additional information, follow the article below. Stay informed and secure with Digirdp! 🚀

 

Step 1: Connect to Your Server via Remote Desktop

Before initiating any security configurations, ensure that you are already connected to your server through Remote Desktop. This is a critical step as it sets the foundation for implementing further security measures.

Step 2: Open Windows Defender Firewall

Access the Windows Defender Firewall settings by pressing the Windows key on your keyboard and typing "Windows Defender Firewall." Select the corresponding result to open the firewall settings, which is integral to controlling incoming network traffic.

Open Windows Defender Firewall

Step 3: Navigate to Inbound Rules

In the left pane of the Windows Defender Firewall window, locate and click on "Inbound Rules." This section houses the rules governing incoming traffic to your server.

Goto Advanced Navigate to Inbound RulesNavigate to Inbound Rules

Step 4: Locate Remote Desktop – User Mode (TCP-In) Rule

Scroll through the list of inbound rules until you find the "Remote Desktop – User Mode (TCP-In)" rule. This particular rule dictates the parameters for incoming RDP traffic. We will customize it to restrict access based on IP addresses.

Step 5: Double-Click the Rule to View Properties

Double-click on the "Remote Desktop – User Mode (TCP-In)" rule to open its properties window. Here, you will find various tabs that allow you to configure the rule's settings.

Locate Remote Desktop – User Mode (TCP-In) Rule

Step 6: Go to the "Scope" Tab

Navigate to the "Scope" tab within the properties window. This tab is crucial as it enables you to define the conditions under which the rule is applied.

 Go to the "Scope" Tab

Step 7: Select "These IP addresses" for Remote IP Access

Under the "Remote IP address" section, choose the option "These IP addresses" by selecting the corresponding radio button. This selection grants you the ability to specify which IP addresses are permitted to connect via RDP.

Select "These IP addresses" for Remote IP Access

Step 8: Add Your IPv4 Address

Click on the "Add" button to open a dialog box where you can input the IP addresses that are allowed to connect via RDP. If you're uncertain about your IPv4 address, visit https://ipinfo.io to retrieve this information.

Add Your IPv4 Address

Step 9: Apply the Changes

After adding your IP address, click "OK" to close the dialog box. Then, click "Apply" in the main properties window to save the changes. This ensures that the configured settings take effect immediately.

Apply the Changes

Conclusion:

Congratulations, you've successfully restricted Windows RDP access to specific IP addresses, significantly fortifying the security of your server or computer. Regularly review and update the list of allowed IP addresses as needed to adapt to changing requirements and maintain a robust security posture.

By implementing these security measures, you contribute to creating a safer computing environment and substantially reduce the risk of potential security threats and unauthorized access. Always stay vigilant and proactive in safeguarding your systems against evolving security challenges.

Author
Profile

B. MISHRA

DevOps Engineer | Automating, Scaling & Optimizing | Writing about tech when I feel like it