Guest \(James Posted August 31, 2007 Posted August 31, 2007 When you remote desktop into a workstation, is there any footprint of your activity left on the workstation from which you performed the remote desktop connection. For instance, when you browse the net, there are cookies, cached files, etc. Would these be present on the workstation from which you started the remote desktop session? Would there be any other files of your activity present on the workstation from which you started the remote desktop session?
Guest -Draino- Posted August 31, 2007 Posted August 31, 2007 Re: Remote desktop security "(James" <jamesrussell2832@yahoo.com> wrote in message news:lrNBi.110291$rX4.45804@pd7urf2no... > When you remote desktop into a workstation, is there any footprint of your > activity left on the workstation from which you performed the remote > desktop connection. > > For instance, when you browse the net, there are cookies, cached files, > etc. > > Would these be present on the workstation from which you started the > remote desktop session? NO > Would there be any other files of your activity present on the workstation > from which you started the remote desktop session? YES...event viewer might have something D > >
Guest Rick Rogers Posted August 31, 2007 Posted August 31, 2007 Re: Remote desktop security Hi James, "(James" <jamesrussell2832@yahoo.com> wrote in message news:lrNBi.110291$rX4.45804@pd7urf2no... > When you remote desktop into a workstation, is there any footprint of your > activity left on the workstation from which you performed the remote > desktop connection. No, not really other than the event of the remote logon itself. > For instance, when you browse the net, there are cookies, cached files, > etc. No, those are cached locally on the system that was accessed. > Would these be present on the workstation from which you started the > remote desktop session? Nope. > Would there be any other files of your activity present on the workstation > from which you started the remote desktop session? As mentioned, just the remote event itself. Be aware, however, that if you are doing this from a work environment where systems are monitored, there will be logs from the network firewall that will show a network admin what you were accessing and and how long you were doing it. They may even have a record of keystrokes used depending on how much in depth the company is monitoring its users. Basically, if you are doing something that is against your company's usage policy (and I'm not saying you are, but) it will be easy for any decent network admin to prove it. -- Best of Luck, Rick Rogers, aka "Nutcase" - Microsoft MVP http://mvp.support.microsoft.com/ Windows help - http://www.rickrogers.org My thoughts http://rick-mvp.blogspot.com > >
Guest \(James Posted August 31, 2007 Posted August 31, 2007 Re: Remote desktop security Thanks for your honest answers Rick. This won't be from work. More, I'm just curious how secure this is, one can never be to careful nowadays. "Rick Rogers" <rick@mvps.org> wrote in message news:ODVCNo76HHA.2752@TK2MSFTNGP06.phx.gbl... > Hi James, > > "(James" <jamesrussell2832@yahoo.com> wrote in message > news:lrNBi.110291$rX4.45804@pd7urf2no... >> When you remote desktop into a workstation, is there any footprint of >> your activity left on the workstation from which you performed the remote >> desktop connection. > > No, not really other than the event of the remote logon itself. > >> For instance, when you browse the net, there are cookies, cached files, >> etc. > > No, those are cached locally on the system that was accessed. > >> Would these be present on the workstation from which you started the >> remote desktop session? > > Nope. > >> Would there be any other files of your activity present on the >> workstation from which you started the remote desktop session? > > As mentioned, just the remote event itself. Be aware, however, that if you > are doing this from a work environment where systems are monitored, there > will be logs from the network firewall that will show a network admin what > you were accessing and and how long you were doing it. They may even have > a record of keystrokes used depending on how much in depth the company is > monitoring its users. Basically, if you are doing something that is > against your company's usage policy (and I'm not saying you are, but) it > will be easy for any decent network admin to prove it. > > -- > Best of Luck, > > Rick Rogers, aka "Nutcase" - Microsoft MVP > http://mvp.support.microsoft.com/ > Windows help - http://www.rickrogers.org > My thoughts http://rick-mvp.blogspot.com > >> >> >
Recommended Posts