{"id":59656,"date":"2018-10-02T13:46:52","date_gmt":"2018-10-02T18:46:52","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=59656"},"modified":"2018-10-02T15:23:14","modified_gmt":"2018-10-02T20:23:14","slug":"proactive-approach-rdp-attacks","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/proactive-approach-rdp-attacks\/","title":{"rendered":"Proactive Approach to Thwarting RDP Attacks"},"content":{"rendered":"<h4>What is an RDP Attack?<\/h4>\n<p><a href=\"https:\/\/techtalk.pcpitstop.com\/2018\/09\/13\/rdp-attacks\/\">Remote Desktop Protocol (RDP) attacks<\/a> have been a popular way for hackers to breach the security of a device or company network.\u00a0 An RDP attack takes place when an unauthorized person or entity is accessing a network through the device\u2019s RDP ports.\u00a0 The attack may be an actual person using brute force to hack into the RDP port, or it could be an automated technology, also using brute force to access the RDP port.\u00a0 Brute force is a term used when someone, or something, is guessing user credentials over and over again until they are able to gain access.<\/p>\n<h4>Best Defense &#8212; Disabling Ports<\/h4>\n<p>In September, we <a href=\"https:\/\/techtalk.pcpitstop.com\/2018\/09\/13\/rdp-attacks\/\">wrote<\/a> to home users regarding this threat, and how a home user can disable their RDP ports to proactively thwart these attacks.\u00a0 Since, the PC Matic Pro and MSP teams have also added an <a href=\"https:\/\/techtalk.pcpitstop.com\/2018\/09\/14\/new-feature-rdp-vulnerabilities-report\/\">Endpoint Vulnerabilities tab to the MSP and Pro portals.<\/a>\u00a0 This report will show all devices that have Remote Desktop enabled and allows for a one-stop shop for IT admins to close RDP ports that have remained unnecessarily opened.<\/p>\n<h4>How to Mitigate Attack Risk While Leaving Ports Open<\/h4>\n<p>For those who opt out of disabling the port, there is another way to mitigate your risk.\u00a0 Users are able to\u00a0<span style=\"font-weight: 400;\">put a limit on the number of incorrect login attempts that can happen in a set period of time. Below, we\u2019ll detail two ways that you can accomplish this process depending on if you\u2019re using Windows 10 Pro or Windows 10 Home. <\/span><\/p>\n<h5>Windows 10 Pro<\/h5>\n<ol>\n<li><span style=\"font-weight: 400;\"> To begin, start typing in the Windows Search bar at the bottom of your screen for \u201cAdministrative Tools\u201d. Double click it from the results. <\/span><\/li>\n<\/ol>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full wp-image-59668\" src=\"https:\/\/techtalk.pcpitstop.com\/wp-content\/uploads\/WinPro1.png\" alt=\"\" width=\"1400\" height=\"788\" srcset=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/WinPro1.png 1400w, https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/WinPro1-768x432.png 768w, https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/WinPro1-730x410.png 730w\" sizes=\"(max-width: 1400px) 100vw, 1400px\" \/><\/p>\n<ol start=\"2\">\n<li><span style=\"font-weight: 400;\"> Within the Administrative Tools, look for Local Security Policy. You will only find Local Security Policy if you are on Windows 10 Pro. If you don\u2019t see it in the list, move down this page and follow the process for Windows 10 Home. <\/span><\/li>\n<\/ol>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-59666\" src=\"https:\/\/techtalk.pcpitstop.com\/wp-content\/uploads\/WinPro2.png\" alt=\"\" width=\"1919\" height=\"1080\" srcset=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/WinPro2.png 1919w, https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/WinPro2-768x432.png 768w, https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/WinPro2-730x410.png 730w\" sizes=\"(max-width: 1919px) 100vw, 1919px\" \/><\/p>\n<ol start=\"3\">\n<li><span style=\"font-weight: 400;\"> Inside Local Security Policy, expand Account Policies at the top and click on Account Lockout Policy. You should see the three entries we\u2019re showing on the right. Don\u2019t worry if your security settings look different, that\u2019s what we\u2019re going to change. <\/span><\/li>\n<\/ol>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-59665\" src=\"https:\/\/techtalk.pcpitstop.com\/wp-content\/uploads\/WinPro3.png\" alt=\"\" width=\"1920\" height=\"1079\" srcset=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/WinPro3.png 1920w, https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/WinPro3-768x432.png 768w, https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/WinPro3-730x410.png 730w\" sizes=\"(max-width: 1920px) 100vw, 1920px\" \/><\/p>\n<ol start=\"4\">\n<li><span style=\"font-weight: 400;\"> Double Click on Account Lockout Threshold on the right side. We\u2019re now going to set this number to 3. This setting is the number of times that someone can incorrectly guess your password before it is restricted. Click OK at the bottom to apply. <\/span><\/li>\n<\/ol>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-59664\" src=\"https:\/\/techtalk.pcpitstop.com\/wp-content\/uploads\/WinPro4.png\" alt=\"\" width=\"1920\" height=\"1079\" srcset=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/WinPro4.png 1920w, https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/WinPro4-768x432.png 768w, https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/WinPro4-730x410.png 730w\" sizes=\"(max-width: 1920px) 100vw, 1920px\" \/><\/p>\n<ol start=\"5\">\n<li><span style=\"font-weight: 400;\"> Now double click on Account lockout duration. We\u2019re also going to set this number to 3 minutes. This setting is to determine how long your computer will be locked for after there are 3 incorrect guesses. Click OK at the bottom to apply. <\/span><\/li>\n<\/ol>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-59663\" src=\"https:\/\/techtalk.pcpitstop.com\/wp-content\/uploads\/WinPro5.png\" alt=\"\" width=\"1920\" height=\"1079\" srcset=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/WinPro5.png 1920w, https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/WinPro5-768x432.png 768w, https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/WinPro5-730x410.png 730w\" sizes=\"(max-width: 1920px) 100vw, 1920px\" \/><\/p>\n<ol start=\"6\">\n<li><span style=\"font-weight: 400;\"> Once you set the duration, it will also ask if you want to set the Reset account lockout time for the same value. You can click OK here to apply a 3 minute time to that setting as well. Now we can review our final settings. If you incorrectly type your password in 3 times within 3 minutes, the computer will lock and allow no attempts for a 3 minute period. <\/span><\/li>\n<\/ol>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-59662\" src=\"https:\/\/techtalk.pcpitstop.com\/wp-content\/uploads\/WinPro6.png\" alt=\"\" width=\"1920\" height=\"1080\" srcset=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/WinPro6.png 1920w, https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/WinPro6-768x432.png 768w, https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/WinPro6-730x410.png 730w\" sizes=\"(max-width: 1920px) 100vw, 1920px\" \/><\/p>\n<h5>Windows 10 Home<\/h5>\n<ol>\n<li><span style=\"font-weight: 400;\">The process for changing this setting in Windows 10 Home takes a little bit more work, but we\u2019ll detail it to follow along. Start by typing \u201ccmd\u201d in the search bar at the bottom. Now right click on the entry for Command Prompt and choose Run as administrator. This is an important step. <\/span><\/li>\n<\/ol>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-59669\" src=\"https:\/\/techtalk.pcpitstop.com\/wp-content\/uploads\/WinHome1.png\" alt=\"\" width=\"1400\" height=\"788\" srcset=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/WinHome1.png 1400w, https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/WinHome1-768x432.png 768w, https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/WinHome1-730x410.png 730w\" sizes=\"(max-width: 1400px) 100vw, 1400px\" \/><\/p>\n<ol start=\"2\">\n<li><span style=\"font-weight: 400;\"> To bring up the current settings we\u2019re going to type \u201cnet accounts\u201d and press enter. Now you\u2019ll see the three Lockout settings that we\u2019ll be adjusting are set currently to 3. We\u2019ll be changing them to 4 to demonstrate that process. <\/span><\/li>\n<\/ol>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-59658\" src=\"https:\/\/techtalk.pcpitstop.com\/wp-content\/uploads\/WinHome2.png\" alt=\"\" width=\"1031\" height=\"569\" srcset=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/WinHome2.png 1031w, https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/WinHome2-768x424.png 768w\" sizes=\"(max-width: 1031px) 100vw, 1031px\" \/><\/p>\n<ol start=\"3\">\n<li><span style=\"font-weight: 400;\"> To change the first value, type: \u201cnet accounts \/lockoutthreshold:4\u201d and press enter. You should then see the command completed successfully below. If there is an error, make sure that you opened the Command Prompt as an administrator in step 1. <\/span><\/li>\n<\/ol>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-59657\" src=\"https:\/\/techtalk.pcpitstop.com\/wp-content\/uploads\/WinHome3.png\" alt=\"\" width=\"1018\" height=\"542\" srcset=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/WinHome3.png 1018w, https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/WinHome3-768x409.png 768w\" sizes=\"(max-width: 1018px) 100vw, 1018px\" \/><\/p>\n<ol start=\"4\">\n<li><span style=\"font-weight: 400;\"> To change the next setting, type: \u201cnet accounts \/lockoutduration:4\u201d and press enter. This will set our duration of 4 minutes if someone tries and fails to login 4 times. <\/span><\/li>\n<\/ol>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-59659\" src=\"https:\/\/techtalk.pcpitstop.com\/wp-content\/uploads\/WinHome4.png\" alt=\"\" width=\"1009\" height=\"542\" srcset=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/WinHome4.png 1009w, https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/WinHome4-768x413.png 768w\" sizes=\"(max-width: 1009px) 100vw, 1009px\" \/><\/p>\n<ol start=\"5\">\n<li><span style=\"font-weight: 400;\"> To change the last setting, type: \u201cnet accounts \/lockoutwindow:4\u201d and press enter. This will set a window of 4 minutes for login attempts. If there are four failed login attempts within four minutes, the computer will be locked for four minutes. <\/span><\/li>\n<\/ol>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-59660\" src=\"https:\/\/techtalk.pcpitstop.com\/wp-content\/uploads\/WinHome5.png\" alt=\"\" width=\"1001\" height=\"531\" srcset=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/WinHome5.png 1001w, https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/WinHome5-768x407.png 768w\" sizes=\"(max-width: 1001px) 100vw, 1001px\" \/><\/p>\n<ol start=\"6\">\n<li><span style=\"font-weight: 400;\"> Now we can very that all of our settings have been changed. Type \u201cnet accounts\u201d again and press enter. You\u2019ll see that each Lockout setting now has the value of 4 that we set in the previous steps. You can always adjust the number of login attempts in step 3, the number of minutes the device will lock for in step 4, or the window of time for login attempts in step 5 to any value you choose. We believe that anywhere between 3 and 10 is a good place to be. <\/span><\/li>\n<\/ol>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-59661\" src=\"https:\/\/techtalk.pcpitstop.com\/wp-content\/uploads\/WinHome6.png\" alt=\"\" width=\"1007\" height=\"534\" srcset=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/WinHome6.png 1007w, https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/WinHome6-768x407.png 768w\" sizes=\"(max-width: 1007px) 100vw, 1007px\" \/><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>What is an RDP Attack? Remote Desktop Protocol (RDP) attacks have been a popular way for hackers to breach the security of a device or company network.\u00a0 An RDP attack takes place when an unauthorized person or entity is accessing a network through the device\u2019s RDP ports.\u00a0 The attack may be an actual person using [&hellip;]<\/p>\n","protected":false},"author":54,"featured_media":55127,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[183],"tags":[4787,5563,5555,4622],"class_list":["post-59656","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tips","tag-brute-force","tag-rdp","tag-rdp-attacks","tag-remote-access"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Proactive Approach to Thwarting RDP Attacks<\/title>\n<meta name=\"description\" content=\"RDP attacks are becoming the hackers&#039; go-to method for worming into networks and devices. Find out what is the best option for you to mitigate your risks...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/proactive-approach-rdp-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Proactive Approach to Thwarting RDP Attacks\" \/>\n<meta property=\"og:description\" content=\"RDP attacks are becoming the hackers&#039; go-to method for worming into networks and devices. Find out what is the best option for you to mitigate your risks...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/proactive-approach-rdp-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2018-10-02T18:46:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-10-02T20:23:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/lockBG.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"730\" \/>\n\t<meta property=\"og:image:height\" content=\"410\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kayla Elliott\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kayla Elliott\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/proactive-approach-rdp-attacks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/proactive-approach-rdp-attacks\\\/\"},\"author\":{\"name\":\"Kayla Elliott\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\"},\"headline\":\"Proactive Approach to Thwarting RDP Attacks\",\"datePublished\":\"2018-10-02T18:46:52+00:00\",\"dateModified\":\"2018-10-02T20:23:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/proactive-approach-rdp-attacks\\\/\"},\"wordCount\":821,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/proactive-approach-rdp-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/lockBG.jpg\",\"keywords\":[\"brute force\",\"RDP\",\"RDP attacks\",\"remote access\"],\"articleSection\":[\"tips\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/proactive-approach-rdp-attacks\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/proactive-approach-rdp-attacks\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/proactive-approach-rdp-attacks\\\/\",\"name\":\"Proactive Approach to Thwarting RDP Attacks\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/proactive-approach-rdp-attacks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/proactive-approach-rdp-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/lockBG.jpg\",\"datePublished\":\"2018-10-02T18:46:52+00:00\",\"dateModified\":\"2018-10-02T20:23:14+00:00\",\"description\":\"RDP attacks are becoming the hackers' go-to method for worming into networks and devices. Find out what is the best option for you to mitigate your risks...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/proactive-approach-rdp-attacks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/proactive-approach-rdp-attacks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/proactive-approach-rdp-attacks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/lockBG.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/lockBG.jpg\",\"width\":730,\"height\":410,\"caption\":\"Computer Virus Software\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/proactive-approach-rdp-attacks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Proactive Approach to Thwarting RDP Attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\",\"name\":\"Kayla Elliott\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/kayla\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Proactive Approach to Thwarting RDP Attacks","description":"RDP attacks are becoming the hackers' go-to method for worming into networks and devices. Find out what is the best option for you to mitigate your risks...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/proactive-approach-rdp-attacks\/","og_locale":"en_US","og_type":"article","og_title":"Proactive Approach to Thwarting RDP Attacks","og_description":"RDP attacks are becoming the hackers' go-to method for worming into networks and devices. Find out what is the best option for you to mitigate your risks...","og_url":"https:\/\/www.pcmatic.com\/blog\/proactive-approach-rdp-attacks\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2018-10-02T18:46:52+00:00","article_modified_time":"2018-10-02T20:23:14+00:00","og_image":[{"width":730,"height":410,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/lockBG.jpg","type":"image\/jpeg"}],"author":"Kayla Elliott","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Kayla Elliott","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/proactive-approach-rdp-attacks\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/proactive-approach-rdp-attacks\/"},"author":{"name":"Kayla Elliott","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db"},"headline":"Proactive Approach to Thwarting RDP Attacks","datePublished":"2018-10-02T18:46:52+00:00","dateModified":"2018-10-02T20:23:14+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/proactive-approach-rdp-attacks\/"},"wordCount":821,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/proactive-approach-rdp-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/lockBG.jpg","keywords":["brute force","RDP","RDP attacks","remote access"],"articleSection":["tips"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/proactive-approach-rdp-attacks\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/proactive-approach-rdp-attacks\/","url":"https:\/\/www.pcmatic.com\/blog\/proactive-approach-rdp-attacks\/","name":"Proactive Approach to Thwarting RDP Attacks","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/proactive-approach-rdp-attacks\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/proactive-approach-rdp-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/lockBG.jpg","datePublished":"2018-10-02T18:46:52+00:00","dateModified":"2018-10-02T20:23:14+00:00","description":"RDP attacks are becoming the hackers' go-to method for worming into networks and devices. Find out what is the best option for you to mitigate your risks...","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/proactive-approach-rdp-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/proactive-approach-rdp-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/proactive-approach-rdp-attacks\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/lockBG.jpg","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/lockBG.jpg","width":730,"height":410,"caption":"Computer Virus Software"},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/proactive-approach-rdp-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Proactive Approach to Thwarting RDP Attacks"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db","name":"Kayla Elliott","url":"https:\/\/www.pcmatic.com\/blog\/author\/kayla\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/59656","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/54"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=59656"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/59656\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/55127"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=59656"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=59656"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=59656"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}