Follow these tips to work faster when using Remote Desktop to manage computers and interact with users.
Select computers in any window
Any computer in any window (report windows, task windows, computer lists, watch windows) can be the target of a task. E.g., if you will be looking at ten computer screens and you require sending a text message to one of them, choose the screen with a solo click, then choose Communication> Send Message.
Drag items to configuration and interaction dialogs
If a configuration or interaction dialog contains a list of files or other items such as computers, you can drag similar items onto the list to add them to it.
Customize the Remote Desktop Toolbar
Add items to the toolbar for the most frequent tasks. Choose whether you want to display the toolbar items as text, icons, or both.
Create lists from reports or other lists
If you want to create a list from the results of a report, you just have to sort the computers in the report by the desired column, select the desired computers, and create a new list from the selection. If you do double-click on the list sign, another window will be opened containing the computers in the list. You will be able to easily then subordinate the list, or drag computers from the fresh list to other lists.
Save tasks and templates to save time
Save your tasks and duplicate them. With a few modifications, you can have several similar tasks for specific uses. You can also use job templates to save settings from one dialog box to another, applying the same settings to multiple jobs.
Control computers with slow network connections
When you will be controlling or observing a client computer making use of a slow Ethernet or Wi-Fi connection, screen sharing updates use to be slower. In order to speed up screen updates, use a solid color like black or gray for the screen desktop you are viewing or sharing. You can also set the image quality to the lowest acceptable setting for the monitoring and observation features. Also, decrease the make use of animation on remote computers. For example, you can use Dock preferences to turn off animation, magnification, and auto-hide for the Dock.
What to do?
Buy RDP and guessing the password shouldn’t be a problem anymore: it’s nothing new, nor is it particularly sophisticated. Yet it feels a whole cybercriminal ecosystem.
In theory, to solve this RDP problem, it is enough for all users to avoid using really bad passwords. But the reality shows they don’t, and you shouldn’t expect them to at some point. The count of RDP servers liable to improve force attacks won’t be edited by intense and unexpected development in user password selection. It is therefore the responsibility of the system administrators to resolve this problem.
While administrators can take various steps to harden RDP servers, including two-factor authentication, the best protection against the double threat of detection of passwords and vulnerabilities is to simply disconnect the RDP. Internet. Disable RDP when it is not absolutely necessary or make it accessible only through a virtual private network (VPN), if available.