Use Remote Access Technologies Flashcards
lesson 19A (33 cards)
Remote Desktop Connection client (mstsc.exe).
Configuring Remote Desktop server settings.
Using Remote Assistance.
Confirming the SSH server’s host key.
Remote desktop
enables users to work on a different computer over a network by running a terminal server, often used for remote work or IT troubleshooting via VPN access.
Remote access security
requires least privilege permissions, encrypted connections, secure server authentication, and vulnerability management, especially for internet-exposed ports.
Remote Desktop Protocol (RDP)
In windows, for terminal server and client functionality. To connect, open Remote Desktop Connection or run mstsc.exe, enter the server’s IP address or FQDN, and verify the certificate for security.
To authenticate on an RDP session
use Domain\Username for domain accounts or .\Username/Host\Username for local accounts. RDP encryption ensures credentials and session data remain secure from network interception.
RDP
The mstsc client is available
for Linux, macOS, iOS, and Android, enabling devices on these platforms to establish RDP connections to Windows servers for remote access.
Virtual Network Computing (VNC)
is an alternative to RDP for remote access. macOS uses Screen Sharing, which relies on VNC and allows connections via any VNC client. VNC operates over TCP port 5900, but not all versions support secure connections—macOS Screen Sharing ensures encryption.
Remote Desktop servers
require access control, Network Level Authentication (NLA) for security, Restricted Admin Mode to protect credentials, and can run on TCP port 3389, with open-source alternatives like XRDP for Linux.
Microsoft Remote Assistance (MSRA)
allows users to request help via an invitation file, while Quick Assist (CTRL+START+Q) offers an alternative using TCP/443 with encryption, requiring a Microsoft account for secure access.
Secure Shell (SSH)
enables remote command-line access using TCP port 22 and encryption. Servers authenticate via a public/private key pair and host key fingerprint to prevent on-path attacks. Key management can be handled manually or with enterprise tools.
SSH host key pair
SSH uses a host key pair to establish encryption, with authentication via password or public key, ensuring secure remote access.
Network visibility
ensures authorized hosts operate securely, relying on remote monitoring and management tools rather than manual inspections. These technologies help technicians oversee configurations and detect anomalies across the network efficiently.
**Remote monitoring and management (RMM)
tools** help managed service providers (MSPs) oversee client IT systems, track activity, and report billable support efficiently.
Desktop management
including Unified Endpoint Management (UEM) and Mobile Device Management (MDM) suites, helps organizations enforce access control and authorization for secure device administration. Let me know if you want to explore their features further!
locally installed agent
gathers status, log, and inventory data for a management server, integrating with help desk systems. Most suites support Windows, Linux, macOS, iOS, and Android devices for comprehensive oversight.
agent with Endpoint Detection and Response (EDR) capabilities
enhances security by scanning for threats, detecting anomalies, and responding to potential breaches. It helps organizations proactively identify, isolate, and mitigate security risks across managed endpoints.
Automated push deployment
streamlines upgrades, updates, security definitions, app installations, and script execution while ensuring license compliance across managed devices.
Wake on LAN (WOL)
enables remote network boot functionality, allowing administrators to power on devices remotely. Advanced management tools can also facilitate system firmware access, firmware updates, and OS installations for streamlined maintenance and deployment.
Access control enforcement
ensures that devices failing OS version, update, or health policy compliance are prevented from connecting to the network, reducing security risks and unauthorized access.
Remote management suites
often include live chat, remote desktop, and remote shell access, enabling technicians to interact with users and directly troubleshoot systems without physical access.
software agent
requires the OS to be active for communication with the management server, but out-of-band (OOB) management via Intel vPro or AMD PRO allows remote power control and system access even when the OS is offline.