While remote access solutions are not bad per se, you’ll want to keep a close eye on the network to ensure that you don’t have any rogue remote access solutions running. Let’s assume that your local domain is “stolpi.local”, you can set up a query for all devices that run RDP but are not on your domain as follows:Īlive:t and protocol:rdp and not domain:stolpi.local How to Find Other Rogue Remote Access Solutions on Your Network What you should be seeing is a lot of machines that are on your domain and then a long tail of machines that are not part of your domain: In your Rumble Console, go to Explore, then scroll down to the Domain Membership Report and select Report Only RDP: It’s typically tough to find those, but with Rumble you can. However, RDP can also put you at risk if active on a machine that’s not in your domain. Remote Desktop Protocol (RDP) is a useful tool when enabled on a machine that’s properly managed on the domain (that is if you’re properly managing local accounts). AD-Controlled RDP is Great, but Unmanaged RDP is a Risk Factor This rounds off Rumble’s broad support for monitoring remote access solutions. As of release 1.15.3, Rumble Network Discovery now detects the TeamViewer protocol on your network in addition to the existing coverage for RDP, VNC, SPICE, and PC Anywhere.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |