4.9 - CompTIA A+ Core 2

Methods/tools

RDP

  • Remote Desktop Protocol: A protocol that allows users to connect to another computer over a network, enabling remote access and control. Clients are available for macOS, Linux, and Windows, although hosts can only be Windows Pro/Enterprise machines.

VPN

  • Virtual Private Network: A technology that creates a secure and encrypted connection over a less secure network, such as the Internet, allowing users to send and receive data as if their devices were directly connected to a private network.

  • VPN concentrator: A device responsible for encrypting/decrypting with a VPN. Often integrated with a firewall.

Virtual network computer (VNC)

  • Virtual network computer (VNC): A technology that allows users to remotely control another computer over a network connection, providing access to the desktop environment and applications of the remote machine. Uses the Remote Frame Buffer (RFB) protocol for operations.

Secure Shell (SSH)

  • Secure shell (SSH): Provides encrypted console communication over TCP port 22. To secure, disable certain accounts (e.g., root), consider removing all password-based authentication, and limit SSH access by IP address (via a firewall).

Remote monitoring and management (RMM)

  • Remote monitoring and management (RMM): Technologies that allow IT personnel and managed service providers (MSPs) to remotely monitor PCs and other devices. May offer features like OS patching, remote logins, and anomaly monitoring.

  • RMM security: Limit who can connect to the RMM service. Also, use robust accounting/logging to see who connects to which devices and what they’re doing.

Simple Protocol for Independent Computing Environments (SPICE)

  • Simple Protocol for Independent Computing Environments (SPICE): Open-source solution that allows remote display of a virtual machine - VM-centric remote desktop infrastructure.

Windows Remote Management (WinRM)

  • Windows Remote Management (WinRM): Microsoft’s implementation of the WS-Management Protocol, enabling remote management of Windows-based systems by running CLI commands/scripts on a remote Windows server.

Third-party tools

Screen-sharing software

  • Screen-sharing software: Allows users to see and control a remote device. Examples include GoToMyPC and TeamViewer.

Videoconferencing software

  • Video conferencing software: Applications that allow multi-user meetings with video and audio. Examples include Zoom and WebEx.

File transfer software

  • File transfer software: Applications that allow storage/sharing documents in the cloud (over the Internet/remotely). Examples included DropBox and Google Drive.

Desktop management software

  • Desktop management software: Software used to manage end-user devices and operating systems - examples include Critix Endpoint Manager and ManageEngine Desktop Central

Security considerations of each access method