中文版本: 《远程桌面安全最佳实践》
This is a working baseline, not a compliance manual. By the end you'll have a remote desktop setup that resists the attacks people actually run, not the hypothetical ones from a textbook.
The Threat Model (Briefly)
Three realistic adversaries to plan against:
- Opportunistic attackers scanning the internet for exposed services and weak credentials. Volume game.
- Insider misuse — a contractor whose access wasn't revoked, or a compromised employee laptop.
- Account takeover via phishing or password reuse. Most common in 2024-2025.
You don't have to defend against nation-state APT to be secure. You have to defend against the three above.
The Five Settings That Prevent 95% of Incidents
1. End-to-End Encryption
Verify your tool uses true E2EE — the vendor's servers cannot decrypt your session. Without this, you're trusting the vendor's entire infrastructure, employees, and jurisdiction. See How E2EE Works in Remote Desktop for what to look for.
2. Two-Factor Authentication, Everywhere
TOTP minimum. Hardware keys (FIDO2/WebAuthn) if your tool supports them. Apply to:
- Account login
- Per-device unattended access
- Admin / management portal
Most remote desktop breaches in 2023-2024 traced back to single-factor logins.
3. Strong Per-Device Passwords (Not Shared)
If 5 machines share the same unattended-access password, all 5 are compromised the moment one is. Each device gets a unique password, stored in a password manager. Rotate annually.
4. Automatic Session Lock on Disconnect
This single setting prevents most "shoulder surfing on the remote machine" incidents. When the remote desktop session ends, the OS should lock immediately. Verify this works after every tool update — it gets disabled by accident.
5. Audit Logging You Actually Read
Enable logs for:
- Every connection (who, when, from where, to which machine)
- Every file transfer
- Every admin action
Then send those logs somewhere external (SIEM, S3, anywhere off the affected machine). An attacker's first move is to wipe local logs.
Network-Level Controls
If you're past the basics:
- Allowlist source networks for high-value machines. Production servers only accept connections from your VPN or office IPs.
- Disable file transfer for support sessions unless explicitly enabled for that session.
- Time-bound contractor access with automatic revocation at the contract end date.
- No port forwarding, ever. See Remote Desktop Across NAT/Firewall for why.
Compliance-Adjacent
If you're handling regulated data (health, finance, EU personal data):
- Data residency: confirm your tool's signaling and relay servers are in jurisdictions you can defend.
- BAA / DPA: get a written agreement from the vendor for HIPAA or GDPR.
- Session recording: required for some standards. Make sure your tool supports it without breaking E2EE.
Detail in Is Your Remote Desktop HIPAA / SOC 2 Compliant?.
Incident Response Prep
Two questions to answer before you have an incident:
- How do I revoke a compromised device's access in under 5 minutes? Practice it. If you don't know the answer, you're not ready.
- Where are my logs? If they're only on the machine that got compromised, they're gone.
Common Mistakes
Things I see organizations get wrong:
- Disabling 2FA "temporarily" for a contractor. It's never temporary.
- Sharing the unattended-access password across the team. Use proper per-user accounts.
- Letting the remote machine auto-login on boot. Now your unattended-access tool isn't gating anything.
- Forgetting to remove access when someone leaves. Have an offboarding checklist.
The 10-Minute Audit
Run this quarterly:
- List every machine with unattended access on. Anyone still using each one?
- List every account with admin access. Still needed?
- Pull last 30 days of session logs. Any anomalies (off-hours access, unusual source IPs)?
- Verify 2FA still enabled on every account.
- Test that you can revoke a device in 5 minutes.
What to Read Next
- How encryption actually works: End-to-End Encryption in Remote Desktop
- Compliance angle: Is Your Remote Desktop HIPAA / SOC 2 Compliant?
- Why port forwarding is dangerous: Remote Desktop Across NAT/Firewall
- Setting up correctly from day 1: How to Set Up Remote Desktop Access for Your Team