RDS GW+RDP vs VPN RDP

Soldato
Joined
30 Sep 2005
Posts
16,547
Hi Everyone,

I'll try and not over complicate this, but may be tricky lol

We have a group of users at work who require access to their works desktops from home. My IT engineer wants to go with option 2, but two security consultancy firms and an MSP say option 1.

Option 1

Works laptops installed with a VPN. User given a VPN login which only allows RDP port to their works desktop. No other ports are allowed. The remote desktop has its local firewall configured to only allow RDP for that specific user on an IP address coming from the VPN connection. The works laptops have a policy to disable RDP drives and clipboards.

Option 2

Users login to the public RDS gateway service using personal devices. The RDS sessions have an RDP shortcut to their desktop machine. They are basically using RDS as a way to leap frog through the network to their machines. RDS sessions have drives and clipboards disabled. The remote desktops as above are locked down to that user, with a group of IPs for the RDS servers.

Both options have MFA enabled.
 
Associate
Joined
18 Aug 2020
Posts
145
Location
Watford, UK
Ancient battle - convenience vs cost.

1 is more costly in setup time, spend and user convenience. But has a secure dedicated hardware and software, which is good.
2 is simplier, but less secure. Also lack of VPN encryption end-to-end. Cheaper cause you dont have to use work laptop.
 
Soldato
Joined
18 Oct 2002
Posts
8,120
Location
The Land of Roundabouts
Personal preference but i avoid a byod approach at all cost! so option 1, you control the hardware end to end and can ensure compliance is maintained (updates, encryption, antivirus etc).

If you have a full on intune / conditional access implementation and your users agree to enrolling there personal devices option 2 could be ok - at a push!
 
Soldato
OP
Joined
30 Sep 2005
Posts
16,547
Thanks guys,

There's no issue about time/costs etc etc. It's just whatever is most secure. My opinion was that it was option 1, but I'm being told it's a massive security risk and option 2 is best (despite literally everyone else telling me the opposite).

Always good to get a second (third/fourth) opinion.

I just don't understand why he thinks this.
 
Last edited:
Associate
Joined
13 Oct 2009
Posts
238
Location
Cumbria
The RDP traffic should be encrypted end-to-end, but also it'll be wrapped again between the client and the RDS Gateway using HTTPS. You'd have the option of disabling the weaker protocols/cyphers on the Gateway.

The only problem with the default RDS web/gateway setup is that there's nothing to stop them from accessing it from any PC. If you use the VPN option, then you could install a user cert and use that as part of the MFA.

The only time I'd consider the VPN less secure is if it gave full network access to the LAN. I see that's already been thought of though.
 
Soldato
Joined
3 Jun 2005
Posts
3,065
Location
The South
The only problem with the default RDS web/gateway setup is that there's nothing to stop them from accessing it from any PC.

That removes control of that portion of the "chain" but it wouldn't make RDS/option 2 inherently less secure than the first option would it?

I've yet to experience a rolling out of BYOD that has been successful and not a complete and utter cluster that ended up being more problematic than simply handing out work devices. So personally i wouldn't opt for it. But i'm sure it does work, plus off-site work devices has it's own challenges.

@TheOracle - With option 2, has the IT Engineer discussed the plan around employees not having or not wanting to use personal devices? I assume you would offer work devices in that scenario and essentially deal with a combination of the two solutions and all the additional costs and management of that?
 
Soldato
OP
Joined
30 Sep 2005
Posts
16,547
That removes control of that portion of the "chain" but it wouldn't make RDS/option 2 inherently less secure than the first option would it?

I've yet to experience a rolling out of BYOD that has been successful and not a complete and utter cluster that ended up being more problematic than simply handing out work devices. So personally i wouldn't opt for it. But i'm sure it does work, plus off-site work devices has it's own challenges.

@TheOracle - With option 2, has the IT Engineer discussed the plan around employees not having or not wanting to use personal devices? I assume you would offer work devices in that scenario and essentially deal with a combination of the two solutions and all the additional costs and management of that?

They are happy to use their own machines, however we also have a stack of new laptops they can have.

It's looking like option 1 I think.
 
Soldato
Joined
18 Oct 2002
Posts
4,533
Ancient battle - convenience vs cost.

1 is more costly in setup time, spend and user convenience. But has a secure dedicated hardware and software, which is good.
2 is simplier, but less secure. Also lack of VPN encryption end-to-end. Cheaper cause you dont have to use work laptop.

RDS GW is not less secure in any way, if anything, it's far more secure as the users end device does not need to be included on the inside network.

To answer the question, any decent remote working solution will have a mixture of connectivity options.

For a VDI/ RDSH I would always, always opt for a rdgw (or whatever user access gateway forms part of the solution... Vmware, Ms, or citrix). They are purpose built for the role, usually act as a proxy so only 443 encrypted traffic is accessible externally, integrate exceptionally well with proper load-balancers (f5, netscaler, etc), are all compatible with MFA and other perimeter network security devices, and usually far simpler to set up and maintain, and don't potentially give your average Joe user more access to other internal resources than necessary. Also, less moving parts to troubleshoot from an operational perspective.

For the end user, they're infinitely more simple. Browse to a url, authenticate, use desktop.

For VPN connectivity, I'd say it should only be given to end users in very specific situations; usually for upper management because ceo/cfo/cto believe vdi is beneath them, or devs & IT as it makes sense for them to have wider access. For Bob from admin... No, never. It's not the 00s anymore.
 
Last edited:
Associate
Joined
10 Feb 2021
Posts
608
RDS GW is not less secure in any way, if anything, it's far more secure as the users end device does not need to be included on the inside network.

To answer the question, any decent remote working solution will have a mixture of connectivity options.

For a VDI/ RDSH I would always, always opt for a rdgw (or whatever user access gateway forms part of the solution... Vmware, Ms, or citrix). They are purpose built for the role, usually act as a proxy so only 443 encrypted traffic is accessible externally, integrate exceptionally well with proper load-balancers (f5, netscaler, etc), are all compatible with MFA and other perimeter network security devices, and usually far simpler to set up and maintain, and don't potentially give your average Joe user more access to other internal resources than necessary. Also, less moving parts to troubleshoot from an operational perspective.

For the end user, they're infinitely more simple. Browse to a url, authenticate, use desktop.

For VPN connectivity, I'd say it should only be given to end users in very specific situations; usually for upper management because ceo/cfo/cto believe vdi is beneath them, or devs & IT as it makes sense for them to have wider access. For Bob from admin... No, never. It's not the 00s anymore.

Couldn't agree more with this. Been using RDS for years, and not had any issues. Simple to use for the end users.

LoL at the people saying "shouldn't trust MS with security"...while most likely making that post from a Windows 10 machine... , as with almost anything... properly configured Microsoft solutions can be as insecure or secure as you want them to be.
 
Back
Top Bottom