| Setting/Area |
Action |
Why It Matters |
| Network Level Authentication (NLA) |
Require NLA for all connections (Computer Configuration > Admin Templates > Windows Components > Remote Desktop Services > Remote Desktop Session Host > Security > Require user authentication for remote connections). |
Protects against unauthorized access before session creation. |
| Strong Passwords and MFA |
Enforce strong password policies and implement MFA (Multi-Factor Authentication). |
Drastically reduces the chance of brute-force or credential stuffing attacks. |
| Restrict RDP Access |
Use firewalls, VPNs, or Network Security Groups (NSGs) to restrict RDP access to trusted IP addresses only. |
Limits attack surface area. Never expose RDP directly to the public internet. |
| Account Lockout Policies |
Set lockout thresholds (Account Policies > Account Lockout Policy). Example: 5 failed attempts, 15 min lockout. |
Prevents brute force attacks on RDP login. |
| Audit and Logging |
Enable detailed RDP session logging and failed login audit logs (Advanced Audit Policy Configuration > Logon/Logoff). |
Helps you detect unusual or suspicious activity. |
| Limit Admin Rights |
Only allow specific users/groups remote desktop access through the “Allow log on through Remote Desktop Services” setting. |
Principle of least privilege minimizes damage if credentials are stolen. |
| TLS Encryption for RDP |
Force RDP encryption to use TLS 1.2 or higher (Remote Desktop Session Host Configuration or Group Policy). |
Encrypts session data fully and disables older, weaker encryption. |
| Disable Clipboard and Drive Redirection |
Disable if unnecessary (Computer Configuration > Admin Templates > Windows Components > Remote Desktop Services > Remote Desktop Session Host > Device and Resource Redirection). |
Prevents exfiltration or infection through redirected devices. |
| Group Policy: RDP Session Security Layer |
Set the "Security Layer" setting to SSL (TLS 1.2) only (Computer Configuration > Administrative Templates > Windows Components > Remote Desktop Services > Remote Desktop Session Host > Security). |
Ensures the RDP session cannot fall back to less secure protocols like RDP Security Layer. |
| Session Timeout and Disconnection Policies |
Force automatic disconnection/logoff for idle or disconnected sessions. |
Reduces risk from abandoned open sessions. |
| RDP Gateway (Optional) |
Deploy RDP Gateway server if users need to access internal RDS hosts externally. |
Adds an extra authentication and inspection layer. |
| Use Certificates for RDP |
Install a valid SSL certificate for RDP host instead of self-signed certs. |
Improves trust and prevents man-in-the-middle (MITM) attacks. |