Windows: RDP Remote Desktop IP Restriction

So lately, many low lives from the third world countries love to try RDP into a computer by bruteforce since it's likely that the security against such tactics isn't strong enough in RDP.

I've met a couple of such attacks. They found a password that works by bruteforce, RDP in, encrypt all documents and then left a window message demanding for ransom in bitcoins costing at least $8k.

So, I finally decided to put some restriction on this. Took a while to get this, which was why I delayed until now. Though it's not hard. The idea is to grant only certain IPs to RDP in.

Solution:

  1. Go to the control panel->Administrative Tools
  2. Windows Firewall with Advanced Settings
  3. Inbound Rules
  4. Remote Desktop (TCP-In)
  5. Go to the Properties->Scope tab
  6. Add the IP (or IP range) in the Remote IP addresses section

I've also learned that this Windows Firewalls settings is required at a domain level, not just (or quite) private or public.

  • Open Control Panel -> Windows Defender Firewall
  • Click Advanced settings
  • Adjust the default action for each profile:
enter image description here

After setting several IP ranges, tested, awesome!

A netstat -an test also show that some IPs that were trying the 3389 port got disconnected/disappeared once I applied the inbound rules with Domain Profile Firewall State "ON".

This entry was posted in Technical. Bookmark the permalink.

Leave a Reply

Your email address will not be published. Required fields are marked *

ERROR: si-captcha.php plugin: GD image support not detected in PHP!

Contact your web host and ask them to enable GD image support for PHP.

ERROR: si-captcha.php plugin: imagepng function not detected in PHP!

Contact your web host and ask them to enable imagepng for PHP.

This site uses Akismet to reduce spam. Learn how your comment data is processed.