Secure Remote Desktop: How to Protect RDP from Brute Force Attacks

Practical manual to secure Remote Desktop (RDP) on Windows Server. Learn how to block brute force attacks and isolate your infrastructure.

9 March 20263 min readSecBox Team
Secure Remote Desktop: How to Protect RDP from Brute Force Attacks

In summary: How to protect Remote Desktop (RDP) on Windows? Remote Desktop (RDP) is the preferred entry point for hackers. To protect it, follow these 3 fundamental steps: 1. Never expose port 3389 directly to the Internet. 2. Implement Multi-Factor Authentication (MFA). 3. Use a secure VPN (like SecBox Shield) to create an encrypted tunnel before attempting to access the server. 60% of ransomware exploits unprotected RDP.

Microsoft Remote Desktop Protocol (RDP) is an indispensable tool for remote Windows server management. However, if left exposed to the Internet without proper precautions, it becomes a constant target for automated "brute force" attacks.


The Dangers of Exposed RDP

A Windows server with port 3389 open to the world receives thousands of unauthorized access attempts every single hour. Attackers use botnets to test common username and password combinations (administrator, admin, user123). Once the password is obtained, the attacker can disable the antivirus, encrypt data, and demand a ransom.

Why changing the port is not enough?

Many sysadmins think they can "hide" the RDP service by changing the default port (e.g., from 3389 to 4455). This technique, called security by obscurity, is useless against modern scanners like Shodan or Censys, which identify the RDP protocol regardless of the port used in seconds.


RDP Hardening Manual: Technical Checklist

1. Enable Network Level Authentication (NLA)

NLA forces the user to authenticate before the RDP session is actually established, reducing the attack surface for vulnerabilities like BlueKeep.

How to do it:

  1. Open System Properties.
  2. Remote tab.
  3. Check "Allow connections only from computers running Remote Desktop with Network Level Authentication".

2. Account Lockout Policy

To counter brute force, the server must lock the account after a certain number of failed attempts.

PowerShell Command:

Set-WinUserAccountLockout -Threshold 5 -Duration 30 -ResetWindow 30

This command locks the user for 30 minutes after 5 incorrect attempts.

3. Windows Firewall Restriction

Do not allow RDP connections from "Any". If possible, allow access only from known static IP addresses.


The Ultimate Solution: SecBox Shield

All the measures described above are useful, but they don't eliminate the risk 100%. The only way to be 100% secure is to make the server invisible.

With SecBox Shield:

  1. RDP Stealth: Port 3389 is completely closed to the outside. The server does not respond to any connection attempts.
  2. VPN Tunnel: To access the server, the collaborator must activate the SecBox VPN with MFA (Multi-Factor Authentication).
  3. Isolation: Only once authenticated via VPN does the server become reachable.

Learn how SecBox Shield protects your RDP

#rdp#remote desktop#windows server#security#brute force#sme
Back to Blog

Related Articles