eezy Article Tags

server x 1
rdp x 1
exchange-2010 x 1
journaling x 1
mailbox x 1
change x 1
windows-2008-r2 x 1
port x 1
copy x 1
system.addin x 0
tclientsock x 0
text-replacement x 0
timeago x 0
traceswitch x 0
turkish x 0
uiprogressbar x 0
unrealscript x 0
usersettings x 0
verysleepy x 0
visualhg x 0
wcf-http x 0
webservice x 0
windows-live-sync x 0
worker-processes x 0
xauth x 0
xquery-sql x 0
zlib x 0
8086 x 0
actor x 0
ajax-push x 0




changeportrdpwindows-2008-r2

Recommend this article


[Remote]
Code #: 10098
Created on: 12/27/2011

Change RDP 3389 port on Windows 2008 Server

(0 customer reviews)
Tutorial on how to change registry via regedit from 3389 port to your custom port AND on how to create custom firewall rule in Windows 2008 Server.


Make a Comment ;)
73
[2]
Fun
9
[0]
Dull
13516
[5]
seen by
Login [#] by ITeezy members

Description:

To change the port you will need to:


1. Change registry at HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\TerminalServer\WinStations\RDP-Tcp\PortNumber from 3389 to your port number

2. Allow your port number within Windows 2008 Firewall (and specify scope of IP addresses that can access the server via RDP - this is optional but good security practice).

3. Restart the RDP service or reboot the server


See pics for details:

Lunch regedit via Start > Run :

Modify PortNumber in HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\TerminalServer\WinStations\RDP-Tcp\ from 3389 to your custom number in our case to 1970:


Go to Manage Console:

Disable current Remote Desktop firewall rule:


Create new Rule:






  
  

Allow only one or few more IP addresses to connect via Remote Desktop:



It should look like this:

Restart Remote Desktop Service (plus dependent services): 


OR you can just reboot the whole server 



In regards to security the setup is not security through obscurity but it prevents automated bots from discovering your servers open port and performing brute force password guessing on it. Also if you setup the scope properly with IP addresses or IP ranges the port will not even come up on standard port scan. There is nmap tool (now with GUI) that can sort of deduce the port but it is still useless unless you are expert network penetration expert. 

As far as maintaining the information about the change of port I recommend you look into NOC software like Nagios. This will tell other admins about what you have done, what the port number for RDP is and who is allowed to access it. 

All done!  



Revised on: 2/11/12 11:16 PM




Hey dud login or join; else you will not be able to post!
or Create Account or Login
You need to register as provider to be able to join this article!

Comments:


Recent views from:
                  More details