Access Denied: Protecting Workstations from Remote Access

Make sure no one can use Remote Assistance, Remote Desktop, or Terminal Services to remotely access sensitive data.

Randy Franklin Smith

December 16, 2002

1 Min Read
ITPro Today logo

We want to make sure that no one can use Remote Assistance, Remote Desktop, or Windows 2000 Server Terminal Services to remotely access the workstations of certain users who have access to highly sensitive data or to financial transactions. What's the simplest way to disable all these features?

You can disable the Terminal Services service, which all the features you mentioned require. However, a user who's a member of the workstation's local Administrators group can reenable and start the service. To prevent that scenario, you can tighten Terminal Services' ACL, as I explained in "Auditing Users Who Might Be Starting and Stopping Services," May 2002, http://www.secadministrator.com, InstantDoc ID 24669. Alternatively, you can assign the Deny logon through Terminal Services right to the Everyone group. Assigning this right to Everyone overrides anyone who has the Allow logon through Terminal Services right.

However, for a more effective solution, I suggest you use an IP Security (IPSec) policy. For more information about how to use an IPSec policy, see "Protect Private Ports with IPSec," April 2002, http://www.secadministrator.com, InstantDoc ID 24273.

Sign up for the ITPro Today newsletter
Stay on top of the IT universe with commentary, news analysis, how-to's, and tips delivered to your inbox daily.

You May Also Like