Nowadays, there is no buddy left in IT who doesn’t work on a remote computer. This shows how enormously the IT industries rely on the RDP service. This service has eased the life of IT professionals. It has given me the freedom to manage the work from a central location. However, it has some caveats if we don’t manage it in a secure way. This service has raised several concerns to IT admins. The most prominent one is security. Considering the rising cybersecurity incidents, organizations need to manage the RDP services under the security umbrella. One of the most secure and easiest ways to manage network communications is encryption. Most of you know about HTTP(S) and how HTTP is secured using SSL/TLS encryption protocol. In the same way, RDP communications can also be secured using the SSL/TLS encryption protocol. To enable SSL/TSL encryption, we need to import RDP certificates on all the workstations and servers like HTTPS certificates. To have an RDP certificate, we should have an internal Certificate Authority deployed on the network with an RDP certificate template to issue RDP certificates for workstations and servers. Let’s look into how to create a template for an RDP certificate in this article.
Issue the ‘certsrv’ command on the CLI
Right-click on the ‘Certificate Template’.
Fill in the Template Name, Validity, and Renewal Period in the general setting tab
Choose ‘Windows Server 2003‘ in the Capability Authority dropdown and Windows XP/ Server 2003 in the ‘Certificate recipient‘ dropdown
Set the Purpose to the ‘Signature and Encryption‘ and check the ‘Allow private key to be exported.
Set these three settings in the cryptography settings tab.
Provider Category: Legacy Cryptography Service Provider
Algorithm name: Determined by CSP
Minimum Key Size: 1024 or 2048 as per Organisation security requirement.
Select the ‘Request must use one of the following providers‘Click on ‘Microsoft RSA SChannel Cryptographic Provider
The Key Attestation tab should look like the one below
It should be like this
Go to ‘Extensions‘Edit the ‘Application Policies‘.
Remove the Server Authentication and Client Authentication Policies to the Application Policy.Click Add -> New
Enter ‘Remote Desktop Authentication‘ in the name and ‘1.3.6.1.4.1.311.54.1.2′ in the Object identifier
Application policy should look like this
Select ‘Supply in the request‘
Your Issuance requirements should be like this
After creating the certificate template issue the template.1. Right Click on Certificate Template
2. Click New
3. Click Create Template to issue
The RDP certificates can be distributed across the organizations using GPO policies. We will try covering the GPO settings in another post as we don’t have the GPO configured at the time of creating this post.
Thanks for reading this post. We believe we have answered the question ‘how to create a template for an RDP certificate on an internal certificate authority. In the next post, we will show how to get the RDP certificate from the CA, and how to deploy the certificate and bind it to the RDP services.
You may also like these articles:
Arun KL is a cybersecurity professional with 15+ years of experience in IT infrastructure, cloud security, vulnerability management, Penetration Testing, security operations, and incident response. He is adept at designing and implementing robust security solutions to safeguard systems and data. Arun holds multiple industry certifications including CCNA, CCNA Security, RHCE, CEH, and AWS Security.
“Knowledge Arsenal: Empowering Your Security Journey through Continuous Learning”
"Cybersecurity All-in-One For Dummies" offers a comprehensive guide to securing personal and business digital assets from cyber threats, with actionable insights from industry experts.
BurpGPT is a cutting-edge Burp Suite extension that harnesses the power of OpenAI's language models to revolutionize web application security testing. With customizable prompts and advanced AI capabilities, BurpGPT enables security professionals to uncover bespoke vulnerabilities, streamline assessments, and stay ahead of evolving threats.
PentestGPT, developed by Gelei Deng and team, revolutionizes penetration testing by harnessing AI power. Leveraging OpenAI's GPT-4, it automates and streamlines the process, making it efficient and accessible. With advanced features and interactive guidance, PentestGPT empowers testers to identify vulnerabilities effectively, representing a significant leap in cybersecurity.
Tenable BurpGPT is a powerful Burp Suite extension that leverages OpenAI's advanced language models to analyze HTTP traffic and identify potential security risks. By automating vulnerability detection and providing AI-generated insights, BurpGPT dramatically reduces manual testing efforts for security researchers, developers, and pentesters.
Microsoft Security Copilot is a revolutionary AI-powered security solution that empowers cybersecurity professionals to identify and address potential breaches effectively. By harnessing advanced technologies like OpenAI's GPT-4 and Microsoft's extensive threat intelligence, Security Copilot streamlines threat detection and response, enabling defenders to operate at machine speed and scale.