On-Premises
Cloud
Remote Access Plus is a remote desktop administration solution that can remotely control endpoints. In this document, we will provide you with some tips and tricks to harden your Remote Access Plus security.
Remote Access Plus immediately releases the security patches for identified security issues. Follow this Knowledge Base page to stay updated with the latest security patches. Furthermore, please subscribe to our Data Breach Notification to receive notifications on any security incident without delay.
Note: It is highly recommended to
1) Update your Remote Access Plus server to the latest build.
2) Grant access to the Remote Access Plus folder only to authorized users.
Securing the login access to the Remote Access Plus server, can prevent security issues involving roles and permissions.
To fortify the login access, go to the Admin tab, and click Security Settings.
The default admin account should be removed after the first login.
All communication between the Remote Access Plus server and the agents will take place using the HTTPS protocol after enabling this option.
Note: In addition, disable the 7020 port in firewall in your network
It is recommended to configure Remote Access Plus with a trusted third party certificate to ensure secured connections between the agents and the server.
Having a second level of verification for technicians ensures that unauthorized access is prevented.
Setting a complex password policy allows users to configure unique passwords that are tough to crack. The more complex a password policy is, the more combinations there will be.
The agent monitors and executes the configurations and tasks deployed to a particular endpoint. That's why it is necessary to forbid users from uninstalling the agent.
Preventing the users from stopping the Agent service ensures that the endpoint stays in contact with the server every 90 minutes.
HTTPS protocol for both LAN and WAN agents ensures that the communication between the agents and the server is always encrypted.
Enable this option to secure the communication during Remote Control sessions and File Transfer operations.
For improved security, it is recommended to use the newest version of TLS, instead of the older ones.
Note: Users cannot manage devices running on legacy OS platforms (Windows XP, Vista, Server 2003 and Server 2008) after disabling the older version of TLS.
It is highly recommended for Remote Access Plus users to follow the guidelines in this document. In particular, the Security Settings. This proves to be a quick and effective move against cyber threats. Moreover, the steps provided for every module will help strengthen the security even further.
Remote Access Plus Cloud is a remote desktop administration solution that can remotely control endpoints. In this document, we will provide you with some tips and tricks to harden your Remote Access Plus Cloud security.
Remote Access Plus CLoud immediately releases the security patches for identified security issues. Follow this Knowledge Base page to stay updated with the latest security patches. Furthermore, please subscribe to our Data Breach Notification by following these steps: Navigate to the Admin tab-> Click Privacy Settings-> Submit your email address in the data breach notification form to receive notifications on any security incident without delay.
Note: It is highly recommended to:
1) Use sound firewall protection and antivirus software and keep them up-to-date to receive timely notifications/alarms.
2) Delete unused accounts: Go to the Admin tab -> User Adminstration -> Delete the unused user account.
3) Install distribution server in a separate machine with no other third part software installed in it. Only authorized users must have access to this machine.
4) Enable Multi-Factor Authentication: Go to the Admin tab -> User Administration -> Secure Authentication -> Enable TFA.
5) Configure complex password policy: Go to the Admin tab -> User Administration -> Secure Authentication -> Configure Password Policy.
To fortify the login access, go to the Admin tab, and click Security Settings.
The agent monitors and executes the configurations and tasks deployed to a particular endpoint. That's why it is necessary to forbid users from uninstalling the agent.
Preventing the users from stopping the Agent service ensures that the endpoint stays in contact with the server every 90 minutes.
It is highly recommended for Remote Access Plus users to follow the guidelines in this document. This proves to be a quick and effective move against cyber threats. Moreover, the steps provided for every module will help strengthen the security even further.