OIT permanently blocks access to remote desktop service port tcp/3389

OIT permanently blocks access to remote desktop service port tcp/3389

To prevent unauthorized access to campus computers, OIT Security and Compliance has permanently blocked remote desktop access to service port tcp/3389. A short-term block was put into effect recently to address a critical vulnerability in Microsoft Remote Desktop Service that allowed a hacker remote administrator access to an unpatched machine.

The permanent block will protect campus users from compromised accounts and lockouts from brute force password attacks that occurred recently on campus.

Campus users who need to use the remote desktop service from off-campus should connect via NC State’s Virtual Private Networking (VPN) service. The university’s Virtual Computer Lab (VCL) environment is exempted from this block due to compensating controls that have been implemented.

For more information, see the SysNews post or the recent OIT News Release.