Remote access allows connecting to systems and resources from remote locations securely.
What is Remote Access?
Remote access is the ability to connect to systems, applications, or resources from remote locations through communication networks.
Types of Remote Access
By Protocol
- **RDP": Remote Desktop Protocol
- **VNC": Virtual Network Computing
- **SSH": Secure Shell
- **Telnet": Terminal Network (obsolete)
By Application
- **TeamViewer": Commercial software
- **AnyDesk": Lightweight software
- **Chrome Remote Desktop": Google
- **Microsoft Remote Desktop": Microsoft
By Infrastructure
- **VPN": Virtual Private Network
- **Citrix": Application virtualization
- **VDI": Virtual Desktop Infrastructure
- **Cloud": Cloud-based access
Common Tools
AnyDesk
- **Features": Lightweight, fast, multiplatform
- **Use": Technical support, remote work
- **Security": End-to-end encryption
- **License": Free for personal use
TeamViewer
- **Features": Advanced features
- **Use": Technical support, presentations
- **Security": Two-factor authentication
- **License": Commercial
RDP (Remote Desktop Protocol)
- **Features": Native to Windows
- **Use": Access to Windows servers
- **Security": Integrated authentication
- **License": Included in Windows
VNC (Virtual Network Computing)
- **Features": Multiplatform
- **Use": Access to Linux/Unix desktops
- **Security": Optional encryption
- **License": Open source
Configuration
RDP on Windows
SSH on Linux
VNC on Linux
Security
Authentication
- **Passwords": Strong passwords
- **Keys": SSH keys
- **2FA": Two-factor authentication
- **Certificates": Digital certificates
Encryption
- **TLS/SSL": Transport encryption
- **SSH": SSH encryption
- **VPN": Encrypted tunnels
- **End-to-End": End-to-end encryption
Access Controls
- **Firewall": Firewall rules
- **IP Whitelisting": IP whitelist
- **Time Restrictions": Time restrictions
- **User Permissions": User permissions
Use Cases
Technical Support
- **Help Desk": Help desk
- **Remote Support": Remote support
- **Troubleshooting": Problem resolution
- **Maintenance": Remote maintenance
Remote Work
- **Home Office": Work from home
- **Mobile Workers": Mobile workers
- **Field Service": Field service
- **Disaster Recovery": Disaster recovery
Administration
- **Server Management": Server management
- **Network Administration": Network administration
- **System Monitoring": System monitoring
- **Backup Management": Backup management
Best Practices
Security
- **Strong Authentication": Strong authentication
- **Encryption": Communication encryption
- **Access Control": Access control
- **Monitoring": Session monitoring
Configuration
- **Timeouts": Session timeouts
- **Logging": Activity logging
- **Audit": Regular audits
- **Updates": Security updates
Operation
- **Documentation": Access documentation
- **Training": User training
- **Incident Response": Incident response
- **Compliance": Regulatory compliance
Related Concepts
- VPN - Related concept
- Firewall - Related concept
- Active Directory - Related concept
- Credentials - Related concept
- SIEM - Related concept
- SOAR - Related concept
- EDR - Related concept
- Dashboards - Related concept
- Logs - Related concept
- CISO - Related concept
- Incident Response - Related concept
- Security Breaches - Related concept