![]() ![]() In addition, it is a good idea to log RDP logins and check them regularly for security-relevant anomalies. If RDP is used, connections from outside should - if possible - be restricted to certain network areas or addresses. "In general, the RDP service should be deactivated when there is no need for it. The German Federal Office for Information Security (BSI) recommends: Among the best-known and most serious vulnerabilities were Bluekeep and DejaBlue. The GoldBrute botnet attacked up to 1.5 million systems in 20192. Systems that can be accessed via RDP are regularly attacked. This function is occasionally used by staff or students to enable remote access to a workstation. This is a remote access option to a Windows computer. In some cases, they can be accessed from the internet via RDP (Remote Desktop Protocol). ![]() The situation is similar with workstations. In the past, there have been repeated reports about the vulnerability of IPMI. ![]() The protection of IPMI is only possible to a limited extent and is therefore usually achieved by limiting access on the network side. The interface used is permanently installed in the mainboard of the system used and thus allows access to the system bypassing all security measures of the operating system. IPMI is also available when the server is switched off. Via this management interface it is possible, among other things, to change the server configuration, install new software or even a new operating system. This is an out-of-band management interface that is used across manufacturers. Technical background IPMIįor server systems, access via IPMI (Intelligent Platform Management Interface) is active in various cases. This means that employees can still access their workstations.Įxternal access to IPMI will no longer be possible in future. As there was a security risk for the University of Oldenburg with these procedures, we have, among other things, blocked the access possibilities from the outside in accordance with the recommendations of the Federal Office for Information Security.Įxternal access to a computer via RDP (Windows Remote Desktop Protocol) is only possible after prior dial-in via VPN access. In the past, various servers and clients of the University of Oldenburg were accessible from the internet via administrative interfaces (RDP and IPMI).
0 Comments
Leave a Reply. |