Restricting Remote Desktop Access To Specific IP Addresses

Asking Linux 

Since most Windows Servers worldwide use Remote Desktop, it is a favored target for hacker / automated bots attacks: It is not uncommon for bots to attack RDP port of a Windows Server within minutes of a Windows Server coming online for the first time.

You can protect your Windows Server from such attacks by changing the Remote Desktop Port and / or limiting access to the Remote Desktop Services to specific IP addresses (for example, from a VPN connection). In this tutorial we explain how to do this.


Step 1

Connect to your Windows Server via Remote Desktop or the VPS console.


Step 2

Click the Windows Start button, type ‘firewall‘ and click ‘Windows Defender Firewall with Advanced Security‘ in the search results.


Step 3

Click left on ‘Inbound Rules‘ and scroll down to ‘Remote Desktop‘. Then double click on the line ‘Remote Desktop – User Mode (TCP-In)‘. Have you changed the RDP port? Then double-click the name of the firewall rule you specified in step 11 above.


Step 4

Select the ‘Scope‘ tab, ‘These IP addresses‘ and click ‘Add‘.


Step 5

Enter the IP address from which you want to allow RDP connections (this can be a range that you define via a subnet) and click ‘Ok‘.


Step 6

Finally click ‘Apply‘ and ‘Ok‘ to implement the changes. Repeat steps 3 through 6, but this time in step 3 open the line for ‘Remote Desktop – User Mode (UDP-In)‘.

Recommended Posts

How to Start Using a Web Hosting Account

Starting with a web hosting account is an essential step in launching your online presence. Whether you’re setting up a personal blog, an e-commerce website, or a professional portfolio, a hosting account serves as the foundation. Here’s a comprehensive guide to help you get started: Step 1: Choose the Right Hosting Plan Before diving into […]

Asking Linux