Latest Updates

We cover every landmark event in remote support, hot releases, and insights from ace experts.

categories
Updated on in

Detailed Guide to Microsoft Remote Desktop Protocol

helga
Helga York Article author
Understanding Remote Desktop Protocol

What is Remote Desktop Protocol (RDP)?

Remote Desktop Protocol (RDP) was developed by Microsoft as a proprietary protocol, enabling remote access to other computers. This connection is usually established via remote desktop TCP port 3389.

RDP allows different types of users (from enterprise-level businesses to single individuals) to access and control a distant machine/hardware device over encrypted channels. Network administrators and tech support pros often utilize RDP to troubleshoot system problems, log in to servers, manage setting configuration, and handle numerous other tasks remotely.

Examples of useful RDP implementation include work-from-home or traveling team infrastructures that require access to their work machines, or admins providing system maintenance (be it RDP for macOS, Unix systems, Windows, iOS, etc.).

Remote Desktop Protocol is an extension of the T-120 protocol standards line. A protocol with multichannel capabilities is capable of creating individual virtual channels that transmit the following data:

  • • Presentation data
  • • Serial device communication
  • • Licensing information
  • • Highly encrypted data (like keyboard and mouse activity)

RDP is an adjunct of the core T.Share protocol and numerous options are built-in to Remote Desktop Protocol. One such example being architectural features that enable multiparty sessions (often referred to as “Multipoint”.)

    How does RDP work?

    how does rdp work

    RDP works by transmitting an output device (such as a monitor), from a remote computer to a client computer. Additionally, the client machine’s input devices (like a mouse and keyboard) are transmitted to the remote (server) computer.

    While within a Remote Desktop Protocol session, communication between the two machines is fairly one-sided — as a majority of the data is transferred from the server to the client.

    Note: By default, all communication conducted during RDP sessions is encrypted with RC4 Block Cipher (by RSA).


    RDP protocol usage and explanation

    What is the purpose of Remote Desktop Protocol? To understand the concept of RDP, imagine what it’s like to operate a drone (or a remote-controlled car.) In other words, users can manipulate and control a device from a distance.

    Except, whereas a remote-controlled car uses radio waves to maintain a connection, RDP uses network and internet connections to access computers and other devices (like a laptop or mobile phone.)

    Being that Remote Desktop Protocol enables remote connections, users most frequently use it to troubleshoot device issues from afar (like a tech support agent helping a customer).
    Now that cloud computing and virtualization are commonplace, RDP is implemented daily by users of all business and tech-knowledge levels. If you’ve ever booted up and connected to a virtual machine (VM) via the cloud, your company likely utilizes RDP (or a similar protocol.)

    No matter whether users connect to a VM or a remote machine, an internet connection is required when using Remote Desktop Protocol.


    What can you do with Remote Desktop Protocol?

    rdp use cases

    RDP is an interoperable protocol that establishes secure connections between servers, clients, and VMs. This means RDP helps protect remote connections from many data security risks. RDP also supports numerous Windows operating systems and devices, offering powerful physical security via remote data storage.

    Below are some notable RDP features:

    • • Smart card authentication
    • • Bandwidth reduction
    • • Multiple display capabilities
    • • Temporarily disconnect without logging off
    • • Support for RemoteFX virtualized GPU (Graphics Processing Unit)
    • • 128-bit (RC4) encryption to protect against mouse/keyboard data vulnerability
    • • Audio redirection from local desktops to client computers
    • • Local file redirection to client desktops
    • • Remote printing capabilities (print to a local printer from a remote computer)
    • • Apps can access local ports during remote sessions
    • • Clipboard sharing between server and client machines
    • • Run apps from a remote desktop on a local desktop
    • • Transport Layer Security support
    • • RemoteApp improvements
    • • Fast connection support
    • • Session shadowing support

    RDP supports up to 64,000 independent channels for data transmission. Data can be encrypted via 128-bit keys, and the bandwidth reduction feature optimizes data transfer rates on low-speed connections.


    Remote Desktop Protocol pros and cons

    Using Remote Desktop Protocol provides numerous advantages, as well as disadvantages. Below we’ll cover the pros and cons of RDP.

    RDP advantages include:

    RDP disadvantages include:

    Data security on devices (unlike when using cloud servers or alternative, less-secure devices);

    Potential latency issues for remote employees with slow/poor internet connection;

    Doesn’t require VPN;

    RDP security concerns (like susceptibility to computer worms, BlueKeep, malware, and hash attacks, meaning it’s not ideal for long-term use).

    Enables remote work options for companies with legacy on-premises IT infrastructure.

    Generally, RDP is a fantastic and convenient tool for remote work access/management, especially for organizations implementing on-premises IT setups.


    Alternatives to Remote Desktop Protocol

    RDP is the most commonly used protocol for remote desktop access/control. However, remote access software tools can function via many different protocol options, like ICA (Independent Computing Architecture), VNC (Virtual Network Computing), and SSH (Secure Shell).

      Citrix Independent Computing Architecture

      citrix

      Citrix Independent Computing Architecture (Citrix ICA) is a proprietary protocol for application server systems. Developed by Citrix systems, Citrix ICA isn’t restricted to any particular platform, providing specifications for transmitting data between server and client machines. It also includes a server software component, client software component, and network protocol component.

      Comparing Citrix and RDP, the latter one is an ideal option for users seeking to publish applications with minimal graphic requirements remotely (abiding they have access to an adequate bandwidth).

      On the other hand, many users find that Citrix offers features that are quite similar to Remote Desktop Protocol, but it beats RDP in terms of expedited user experience and overall performance.

      Virtual Network Computing

      virtual network computing

      Virtual Network Computing is a cross-platform screen sharing tool developed to control another computer remotely. Meaning a computer’s screen, keyboard, and mouse are operational from a distance (via remote users from a secondary device), but with the same fluidity as if the remote user was physically working on the local computer.

      VNC works on a server/client model, and once the server (local machine being accessed remotely) and the viewer (user accessing the local machine from a distance) connect, the server transmits a copy of the remote desktop’s screen to the remote viewer.

      Being a pixel-based protocol, VNC transmits image changes over a network, meaning that VNC’s performance vs RDP (which is a semantic protocol) is much slower. At the same time, this makes VNC a better option for cross-platform sharing.

      Secure Shell

      secure shell

      Due to the demands of a rapidly growing remote workforce, it has become increasingly important to provide secure access to corporate servers from any physical location. Two communication protocols used to securely authenticate access to remote servers are Remote Desktop (RDP) and SSH.

      Comparing SSH vs Remote Desktop reveals many similarities as well as some substantial differences. SSH is more secure out of the box and its key pairs are harder to crack than RDP login credentials. Complementary tools such as a VPN are required to fully protect RDP connections.

      RDP is easier to use than SSH so is often adopted by organizations that lack technical resources. One feature that RDP offers is a graphical user interface (GUI) that makes it simple for novice computer users to navigate.


      VPN – making RDP even better

      vpn

      Most users assume that RDP and VPN are (almost) the same thing. This is usually because both tools provide users with a safe and secure remote access experience. However, that’s not quite true.

      Virtual Private Networks utilize highly-advanced tunneling and encryption methods that establish secure internet connections amongst users and their network. This means that business networks can connect to one another, allowing remote workers to access important data (files, programs, etc) without fear of unauthorized users gaining access.

      While the latest versions of RDP provide vastly enhanced security protocols, it is the best practice to use RDP and VPN together as this combination ensures maximum and security when accessing the computers and server remotely.


      Summing Up

      We hope this remote desktop explanation has provided you with a great deal more insight not only into what RDP is but why it’s such a valuable tool for anyone to implement.

      For many businesses trying to adjust in the post-COVID era, reliable remote access tools are requirements as much as they are conveniences.