Jump to content

Remote desktop security


Recommended Posts

Guest \(James
Posted

When you remote desktop into a workstation, is there any footprint of your

activity left on the workstation from which you performed the remote desktop

connection.

 

For instance, when you browse the net, there are cookies, cached files, etc.

 

Would these be present on the workstation from which you started the remote

desktop session?

Would there be any other files of your activity present on the workstation

from which you started the remote desktop session?

  • Replies 3
  • Created
  • Last Reply

Popular Days

Guest -Draino-
Posted

Re: Remote desktop security

 

 

"(James" <jamesrussell2832@yahoo.com> wrote in message

news:lrNBi.110291$rX4.45804@pd7urf2no...

> When you remote desktop into a workstation, is there any footprint of your

> activity left on the workstation from which you performed the remote

> desktop connection.

>

> For instance, when you browse the net, there are cookies, cached files,

> etc.

>

> Would these be present on the workstation from which you started the

> remote desktop session?

 

NO

 

> Would there be any other files of your activity present on the workstation

> from which you started the remote desktop session?

 

YES...event viewer might have something

 

D

>

>

Guest Rick Rogers
Posted

Re: Remote desktop security

 

Hi James,

 

"(James" <jamesrussell2832@yahoo.com> wrote in message

news:lrNBi.110291$rX4.45804@pd7urf2no...

> When you remote desktop into a workstation, is there any footprint of your

> activity left on the workstation from which you performed the remote

> desktop connection.

 

No, not really other than the event of the remote logon itself.

> For instance, when you browse the net, there are cookies, cached files,

> etc.

 

No, those are cached locally on the system that was accessed.

> Would these be present on the workstation from which you started the

> remote desktop session?

 

Nope.

> Would there be any other files of your activity present on the workstation

> from which you started the remote desktop session?

 

As mentioned, just the remote event itself. Be aware, however, that if you

are doing this from a work environment where systems are monitored, there

will be logs from the network firewall that will show a network admin what

you were accessing and and how long you were doing it. They may even have a

record of keystrokes used depending on how much in depth the company is

monitoring its users. Basically, if you are doing something that is against

your company's usage policy (and I'm not saying you are, but) it will be

easy for any decent network admin to prove it.

 

--

Best of Luck,

 

Rick Rogers, aka "Nutcase" - Microsoft MVP

http://mvp.support.microsoft.com/

Windows help - http://www.rickrogers.org

My thoughts http://rick-mvp.blogspot.com

>

>

Guest \(James
Posted

Re: Remote desktop security

 

Thanks for your honest answers Rick. This won't be from work. More, I'm

just curious how secure this is, one can never be to careful nowadays.

 

 

"Rick Rogers" <rick@mvps.org> wrote in message

news:ODVCNo76HHA.2752@TK2MSFTNGP06.phx.gbl...

> Hi James,

>

> "(James" <jamesrussell2832@yahoo.com> wrote in message

> news:lrNBi.110291$rX4.45804@pd7urf2no...

>> When you remote desktop into a workstation, is there any footprint of

>> your activity left on the workstation from which you performed the remote

>> desktop connection.

>

> No, not really other than the event of the remote logon itself.

>

>> For instance, when you browse the net, there are cookies, cached files,

>> etc.

>

> No, those are cached locally on the system that was accessed.

>

>> Would these be present on the workstation from which you started the

>> remote desktop session?

>

> Nope.

>

>> Would there be any other files of your activity present on the

>> workstation from which you started the remote desktop session?

>

> As mentioned, just the remote event itself. Be aware, however, that if you

> are doing this from a work environment where systems are monitored, there

> will be logs from the network firewall that will show a network admin what

> you were accessing and and how long you were doing it. They may even have

> a record of keystrokes used depending on how much in depth the company is

> monitoring its users. Basically, if you are doing something that is

> against your company's usage policy (and I'm not saying you are, but) it

> will be easy for any decent network admin to prove it.

>

> --

> Best of Luck,

>

> Rick Rogers, aka "Nutcase" - Microsoft MVP

> http://mvp.support.microsoft.com/

> Windows help - http://www.rickrogers.org

> My thoughts http://rick-mvp.blogspot.com

>

>>

>>

>


×
×
  • Create New...