Remote desktop access for administrator accounts

MattLamite 6 Reputation points
2022-12-28T06:32:41.64+00:00

Bonjour,

As a junior system administrator, I would like to ask:

  1. Is it safe to allow RDP access from domain accounts with admin rights to servers and computers?
  2. If no, what would be the good practice if my daily tasks require admin rights on remote computers?

merci beaucoup!

Windows for business | Windows Client for IT Pros | User experience | Remote desktop services and terminal services
Windows for business | Windows Server | User experience | Other
Windows for business | Windows Server | Devices and deployment | Configure application groups
0 comments No comments
{count} votes

1 answer

Sort by: Most helpful
  1. MotoX80 36,401 Reputation points
    2022-12-28T14:26:20.51+00:00

    At the company that I worked for; we had 2 domain accounts. The first was our "normal" account that we logged on to our laptop/desktop with and had access to email and instant messaging. That account had no special access to servers. We had a second "MyName-ADM" account that had administrator access to the servers. We did not share the local Administrator account. We actually disabled that. All admins logged in with their own ADM domain account. (That way we could determine who last "touched" a server when problems arose.)

    We found that our biggest vulnerability was ransomware that got into the network via emails. As hard as we tried to block them in Exchange and educate users about clicking on links, they still got in. The "ADM" accounts did not have access to email.

    We took security a step further and put servers behind network firewalls. We actually had multiple server subnets that could not access other server subnets. For example, a web server would only have ports 80 and 443 open to the subnet that hosted user laptops/desktops. I could not access the C$ share on a server from my laptop or from many other servers. This was done at the network level, not with the Windows firewall.

    I don't remember if we allowed RDP access from our laptops or not. I think we did allow that so that the application support teams who needed admin access on the servers could log on. They too had ADM accounts.

    Most server administration was done from what we called a "jump server". It was just a terminal server on a separate subnet that had full network access to all of the server subnets. So from my laptop, I would RDP to the jump server and from there I could use mmc, Powershell, and VB script to do remote admin tasks. (Like querying all servers for disk space usage.)

    Scale might be an issue for you. We had dedicated server, network, and security teams because we had thousands of devices that we had to support. You may not have the need or resources to implement the network isolation that we did.

    If you do nothing else, ensure that you implement an offsite/offline backup solution. If a server does get hit with ransomware, you can just restore the encrypted files. If your backup server gets encrypted or your datacenter burns down, you have a big problem. A cloud-based backup solution would one idea.

    Hope this gives you some ideas.

    0 comments No comments

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.