Hi, There
You can enforce this with GPO, but without firewalls it’s limited. There’s a simple approach for you to try it out:
1. Restrict RDP logins
- In GPO >
Computer Configuration>Windows Settings>Security Settings>Local Policies>User Rights Assignment>Allow log on through Remote Desktop Services - Remove general users and only allow the PAM service account or a PAM group.
- This blocks direct logins for regular users.
2. Restrict RDP by source IP (needs firewall)
- Enable Windows Defender Firewall via GPO.
- Create an inbound rule allowing RDP (port 3389) only from the PAM server’s IP.
- This ensures RDP only works via PAM.
Note: Without enabling firewall, you can only block via accounts, not IP. For full control, combine both.