security - How to secure remote desktop access to windows azure instances -
I have successfully installed my Windows Azure Web role, but ideally I want to lock access so that it only Is not it safe to be protected by password? For example, restrict RDP access to specific IP ranges, require client certificates, etc.
I know that you are advised not to enable remote desktop at all times but to enable it to troubleshoot. But if this security is enabled to troubleshoot the problem then it still remains (also annoying that till I can not remember anything, I will not enable / disable RDP access without re-publication. can).
Thanks
-
Edit on November 2013: You can use ACL to lock specific port categories for RDP using PowerShell. The new Ezoor Portal allows you to access the inside of the portal It allows you to do it with your PowerShell:
-
You can use the OS software window You can use a firewall
-
Go to another port instead of the default 3389. In the endpoint management portal, you can create an internal port 3389 internal port (i.e., 2400) points It makes a small use of RDP for those smokers for RDP
-
The above mentioned behavior can be added above or removed very soon. You can enable the RDP on the server , But no traffic will be allowed until the join / enable till the end. Virtual Machine You can use a script to copy the above behavior Using a web / worker role) can also change the RDP port, but I could not do that with PowerShell script, you may have an admin page that runs PowerShell Script in the background (running RDP / Turn on). But I think there is a big rise here, unless you really want to stop the RDP for compliance.
Edit: Additional information since 2012 :)
Comments
Post a Comment