Jul 01 2021 06:16 AM
Jul 01 2021 06:16 AM
Case as follows:
We have some smart users who just figure out the name of the WVD session host from a remote app they use.
What they do next is just fire off mstsc.exe to that session host and then they have access to the full desktop of the session host.
How can we prevent this ?
Jul 01 2021 10:20 AM
Jul 01 2021 01:07 PM
Jul 06 2021 02:11 AM
@Deleted Another suggestion would be to add an inbound rule to your Network Security Group for your AVD (if you have one) which would only allow RDP port 3389 connections from a limited number of I.P addresses (your admin machines for example). Your RD-client RemoteApp connections would be unaffected by this rule.
Jul 06 2021 02:53 PM