After a web server is deployed on the Internet, some remote desktop connections are enabled to facilitate remote operations. This is very insecure. Many hackers use this port to initiate attacks after scanning to the server to enable port 3389. To reduce the risk and use Remote Desktop Connection, a simple method is to modify the port 3389 of the Remote Desktop Connection.
The default port of the Remote Desktop Terminal Service is 3389. to prevent malicious connection, you need to change the default port. Open the Registry Editor (Run regedit) and expand "HKEY_LOCAL_MACHINE/system/
CurrentControlSet/control/Terminal Server/WDS/rdpwd/tDS/tcp "branch. The" portnumber "key value under it corresponds to the port number. modify it. After the preceding settings are complete, expand "HKEY_LOCAL_MACHINE/system/CurrentControlSet/Control
The/Terminal Server/winstations/RDP-TCP Branch also changes the "portnumber" key value.
For example, we can change the port to 8080, or to 443 or another port, which can mislead hackers into believing that this is the proxy server port or HTTPS port.
How can we connect to the Remote Desktop after the port is modified? In fact, it is very easy to follow the IP address with a colon and then the port. For example, 192.168.2.131: 443