How can I securely wrap RDP sessions inside SSH to avoid NTLM exposure?

0
16
Asked By CuriousTechie84 On

I'm dealing with some Windows servers and appliances that aren't joined to Active Directory and likely won't be in the future since they're part of our operational technology (OT) environment. When I connect via Remote Desktop Protocol (RDP) to these servers, they use NTLM for authentication, which is necessary because Kerberos requires a domain controller. While the risk is fairly low since they're all on-premises, I'd prefer not to have NTLM hashes flying around our network. I'm looking for advice on how I can wrap these RDP sessions in SSH to secure them further. I'm okay with an extra step for establishing the SSH tunnel as long as the connection remains stable.

5 Answers

Answered By VirtualAccessPro On

We’re implementing Guacamole for similar access. It allows secure connections since the Guacamole server is the only point accessing the RDP ports directly, and it’s exposed only through HTTPS.

Answered By AccessAndy On

How are your OT nodes connected to the rest of your environment? You might want to explore something like Bitvise Tunnelier for creating secure connections.

Answered By CyberSecDude On

Consider using an RD Gateway set up in a DMZ for secure remote desktop connections to your OT servers. It’s been my go-to solution for years, coupled with network segmentation and firewalls between OT and AD.

Answered By RDP_Enthusiast91 On

You can definitely run RDP over IPSEC. It offers a solid layer of security for your connections.

Answered By NetworkGuru23 On

One straightforward way to encrypt traffic on Windows is by using IPSEC in the Windows firewall. It can help secure your RDP sessions quite effectively without too much hassle.

Related Questions

LEAVE A REPLY

Please enter your comment!
Please enter your name here

This site uses Akismet to reduce spam. Learn how your comment data is processed.