3

My client failed her PCI compliance audit. The server supports Remote Desktop (Terminal Service) but only provides encryption and not authentication. This exposes the server to Man-In-The-Middle attacks.

The supposed solution is to force SSL as the transport layer for RDP.

Anyone know how to do this?

The server runs Windows 2003.

Crashalot
  • 167
  • 3
  • 11

3 Answers3

5

http://support.microsoft.com/kb/895433

If the server has a cert from a trusted CA / Enterprise CA, skip to the section:

Step 2: Configure TLS authentication and encryption

Skyhawk
  • 14,149
  • 3
  • 52
  • 95
  • hi yummy, i installed an SLL certificate using the following instructions, http://support.microsoft.com/kb/816794#3. but the certificate does not appear when i click "edit" from the "RDP-tcp Properties" dialog (when specifying a certificate for the SSL connection). any clues? – Crashalot Apr 13 '10 at 20:28
1

Upgrade to Windows Server 2008. Seriously - new RDP protocol, and TLS security is standard (at least I always get asked about whether to accept the unknown certificate between our domains - I have two domains that are not otherwise linked).

Skyhawk
  • 14,149
  • 3
  • 52
  • 95
TomTom
  • 50,857
  • 7
  • 52
  • 134
1

This is exactly what the addition of Network Level Authentiation to RDP solves. I believe MS added it in Server 2008.

EEAA
  • 108,414
  • 18
  • 172
  • 242