Hello,
Here’s another handy fix for resolving RDP vulnerabilities remotely.
The script is a bit rubbish as I’ve not used CredSSP (I was in a rush) so you’ll need to run PowerShell as a admin and you’ll need a CSV with the servers in:
csv format:
Server
server1
server2
server3
Import-Csv "c:\temp\RDP_Vun.csv"| ForEach-Object { write-host "" write-host "====================================" write-host "Computer: $_.server" write-host "====================================" write-host "-----------------------------------" write-host "Fix RDP Vunrability" write-host "-----------------------------------" # Remote Desktop Services: Enable NLA Requirement (Get-WmiObject -Computer $_.server -class "Win32_TSGeneralSetting" -Namespace root\cimv2\terminalservices -Filter "TerminalName='RDP-tcp'").UserAuthenticationRequired (Get-WmiObject -Computer $_.server -class "Win32_TSGeneralSetting" -Namespace root\cimv2\terminalservices -Filter "TerminalName='RDP-tcp'").SetUserAuthenticationRequired(1) # Remote Desktop Services: Require 'High' level of encryption (Get-WmiObject -Computer $_.server -class "Win32_TSGeneralSetting" -Namespace root\cimv2\terminalservices -Filter "TerminalName='RDP-tcp'").SetEncryptionLevel(3) # Remote Desktop Services: Set Security Layer to SSL (Get-WmiObject -Computer $_.server -class "Win32_TSGeneralSetting" -Namespace root\cimv2\terminalservices -Filter "TerminalName='RDP-tcp'").SetSecurityLayer(2) }
Leave a Reply