AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |
Back to Blog
![]() ![]() ![]() Users may also refer to the security blog on “BlueKeep” vulnerability ( /my_url/en/blog/19052301) for other remedial actions. Microsoft has continued that trend, building many improvements into the versions of the RDS and RDC software and RDP protocol that are included in Windows Server 2012/2012 R2 and the Windows 8/8.1 client operating systems. For workstations having Windows 7 SP1 or Windows Server 2008 R2 SP1 installed, the vulnerabilities only affect if either RDP 8.0 or RDP 8.1 is installed.Īs Microsoft has already released security patches to address the vulnerabilities, HKCERT recommends all users to apply up-to-date security patches from official software provider to avoid unnecessary risks. Remote Desktop Services has been steadily growing more robust, more reliable, more secure and easier to use over the years. The two new vulnerabilities affect Windows 7 SP1, Windows Server 2008 R2 SP1, Windows Server 2012, Windows 8.1, Windows Server 2012 R2, as well as all supported versions of Windows 10, including server versions. Right-click Workstation Authentication, and then click Duplicate Template. Right-click Certificate Templates, and then click Manage. In the Details pane, expand the computer name. The goal is to established remote desktop to the server. Here are the steps for creating the Server Authentication certificate from the template: Open CERTSRV.MSC and configure certificates. HKCERT urges the public once again to pay attention to the vulnerabilities occurring within RDS, and to install the up-to-date patches immediately to mitigate the risk. We have configured a remote access (HTML5 VPN) from Sophos UTM Firewall to Windows Server 2012 R2. After that, click Add User or Group and manually add the users you’d like to grant Remote Desktop access to. It’s our recommendation to remove both of the groups already listed in this window, Administrators and Remote Desktop Users. Similar to the “BlueKeep” vulnerability, the new vulnerabilities can be exploited to engineer a worm-like outbreak in the Internet, poising a serious threat to cyber security. Double-click on the Allow log on through Remote Desktop Services policy listed on the right. ![]() Microsoft has just released patches in its August Monthly Security Update for 2 newly discovered vulnerabilities in Remote Desktop Services (RDS). ![]()
0 Comments
Read More
Leave a Reply. |