{"id":1906,"date":"2021-07-14T03:56:11","date_gmt":"2021-07-14T10:56:11","guid":{"rendered":"https:\/\/www.ssls.com\/blog\/?p=1906"},"modified":"2023-09-27T15:31:05","modified_gmt":"2023-09-27T22:31:05","slug":"what-is-remote-desktop-protocol-rdp","status":"publish","type":"post","link":"https:\/\/www.ssls.com\/blog\/what-is-remote-desktop-protocol-rdp\/","title":{"rendered":"What is Remote Desktop Protocol&nbsp;(RDP)?"},"content":{"rendered":"\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/www.ssls.com\/blog\/wp-content\/uploads\/SSL_Blog_RDP.png\" alt=\"\" class=\"wp-image-1714\"\/><\/figure>\n\n\n\n<p>Remote Desktop Protocol (RDP) is a protocol that allows remote access from one computing device to another over a network connection. A proprietary protocol developed by Microsoft, RDP is available on most versions of Windows.<\/p>\n\n\n\n<!--more-->\n\n\n\n<h2 class=\"wp-block-heading\">How RDP works<\/h2>\n\n\n\n<p>When RDP is set up between two computers, a person on one computing device (such as their laptop, smartphone, or tablet) can access and edit the files and applications of another.&nbsp;<br><\/p>\n\n\n\n<p>Two separate apps are required to enable RDP: an RDP server app and an RDP client app.&nbsp;<\/p>\n\n\n\n<p>The server app needs to be installed on the device you wish to connect to and control, while the client app should be installed on the device you want to control the server from. RDP server apps are available to Windows devices only, while the client apps are available for Windows devices, in addition to most Mac operating systems, Unix, Linux, and Android.<br><\/p>\n\n\n\n<p>Once RDP is set up, a dedicated network channel is established between the client and the server via TCP (one of the main Internet protocols for most traffic online). All the data sent over this channel, from mouse clicks to the desktop display, are encrypted for added <a href=\"https:\/\/www.ssls.com\/blog\/what-is-multi-factor-authentication-mfa\/\">security<\/a>. However, the network transfer combined with <a href=\"https:\/\/www.ssls.com\/blog\/what-is-web3-and-how-does-it-work\/\">encryption<\/a> can often make for a slow, laggy experience when using RDP.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What RDP is commonly used for<\/h2>\n\n\n\n<p>There are several uses for RDP, including:<br><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Remote work: <\/strong>If employees are working from home or traveling, they can set up RDP between their office device and their home device to access their work device as if they were there in person.<\/li><li><strong>Remote support: <\/strong>IT departments can connect to other computers on their company network via RDP, typically for software maintenance and troubleshooting purposes.&nbsp;<\/li><li><strong>File sharing: <\/strong>RDP can also be used to access files on a company network.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Risks of RDP<\/h2>\n\n\n\n<p>Even if you\u2019ve never heard of it, RDP is very common, particularly in companies that use Windows systems across the board. RDP is a very convenient protocol to set up for the reasons outlined above, but it also comes with some security risks.&nbsp;<br><\/p>\n\n\n\n<p>One of the RDP\u2019s biggest weaknesses is that administrators may not always enable multi-factor authentication (MFA). In this case, the RDP connection is password-protected, and users often use the same password for their Windows login and perhaps numerous other logins. If the company doesn\u2019t enforce a strong password policy, RDP connections may be susceptible to credential harvesting, stuffing, and brute force attacks.&nbsp;<br><\/p>\n\n\n\n<p>Many companies also use out-of-date software, which makes networks even more vulnerable to hacking. In this instance, hackers can potentially access the host computer or network and install malware such as ransomware. There have also been cases of hackers selling RDP access information <a href=\"https:\/\/www.bankinfosecurity.com\/hackers-exploit-weak-remote-desktop-protocol-credentials-a-10433\">on the dark web<\/a>.&nbsp;<br><\/p>\n\n\n\n<p>These risks can be avoided by setting up MFA, strengthening password policies, and ensuring software is continually updated.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Alternatives to RDP<\/h2>\n\n\n\n<p>The main limitation of RDP is that you can only use it to connect to a Windows desktop. If you need to connect to another operating system\u2019s desktop, you\u2019re out of luck where RDP is concerned. Fortunately, similar tools are available to other operating systems that use different protocols to do the same thing. Some paid options include the cloud-based <a href=\"https:\/\/www.dameware.com\/dameware-remote-everywhere?a_bid=c96e3f0e&amp;CMP=BIZ-PAP-CMPRTCH-DW_remote-DRE-LM&amp;a_aid=BIZ-PAP-CMPRTCH\">Solarwinds Dameware<\/a>, and <a href=\"https:\/\/edovia.com\/en\/screens-ios\/\">Screens for iOS<\/a>, while some free options are <a href=\"https:\/\/www.teamviewer.com\/en\/\">TeamViewer<\/a> and <a href=\"https:\/\/remotedesktop.google.com\/access\/?pli=1\">Chrome Remote Desktop<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Wrap up<\/h2>\n\n\n\n<p>RDP is a valuable tool, particularly for large enterprises that use Windows devices and companies with remote workers. However, the potential security risks coupled with the fact that not everyone uses Windows means that it isn\u2019t an ideal option for everyone. Fortunately, there are numerous paid and free alternatives out there to make remote desktop access available to everyone, no matter what their device or operating system.<br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Remote Desktop Protocol (RDP) is a protocol that allows remote access from one computing device to another over a network connection. A proprietary protocol developed by Microsoft, RDP is available on most versions of Windows.<\/p>\n","protected":false},"author":9,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1906","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.ssls.com\/blog\/wp-json\/wp\/v2\/posts\/1906","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ssls.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ssls.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ssls.com\/blog\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ssls.com\/blog\/wp-json\/wp\/v2\/comments?post=1906"}],"version-history":[{"count":3,"href":"https:\/\/www.ssls.com\/blog\/wp-json\/wp\/v2\/posts\/1906\/revisions"}],"predecessor-version":[{"id":2744,"href":"https:\/\/www.ssls.com\/blog\/wp-json\/wp\/v2\/posts\/1906\/revisions\/2744"}],"wp:attachment":[{"href":"https:\/\/www.ssls.com\/blog\/wp-json\/wp\/v2\/media?parent=1906"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ssls.com\/blog\/wp-json\/wp\/v2\/categories?post=1906"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ssls.com\/blog\/wp-json\/wp\/v2\/tags?post=1906"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}