Changing the RDP port on your server to hide access

Everybody uses RDP. Attackers and bots, curiously, also know that everybody uses RDP. If you are working with perimeter servers that are potentially connected to the internet, having RDP enabled can be especially dangerous because it is quite easy to leave your server in a state where it is open from outside your network. This gives anyone the ability to start guessing passwords or trying to brute force their way into your server; or they can just be a way to give you some denial-of-service headaches by throwing thousands of login attempts at that server.

Even aside from the worries of potential access from the public Internet, you may want to ensure that regular users aren't trying to poke around ...

Get Windows Server 2012 R2 Administrator Cookbook now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.