Worktable with a user and laptop on a blue background
Source: thesecmaster.com

Remote Desktop Protocol (RDP) is an essential tool for IT administrators to remotely manage servers and desktops. However, by default, RDP uses weak encryption and is susceptible to man-in-the-middle attacks. Administrators use RDP certificates to secure weak RDP connections. We have published a blog post, “Step By Step Procedure To Fix The RDP Certificate Error On Windows Servers” There, we showed how to get RDP certificate and how to bind that certificate to a Windows server. Deploying RDP certificates on a server or a small number of servers could be manageable, but what if, in larger environments, it’s laborious, isn’t it? Administrators can use Group Policy Objects (GPOs) to deploy RDP certificates.

RDP certificates utilize the Transport Layer Security (TLS) protocol to authenticate and encrypt RDP connections. The certificates are issued by an internal Public Key Infrastructure (PKI) or Certificate Authority (CA). When RDP clients connect to servers, the server presents the RDP certificate, which the client validates against the CA. This prevents attackers from intercepting the connection.

In this step-by-step tutorial, we will walk through the process of deploying RDP certificates using GPOs on a Windows domain environment. We will cover:

  • Configuring a CA template for RDP authentication
  • Publishing the template on the CA
  • Creating and linking a GPO to deploy the template
  • Verifying certificate enrollment and RDP connections

By the end of this guide, you will have learned how to enhance the security of RDP in your organization using PKI certificates and group policy. Let’s get started!

Table of contents

· Prerequisites to Deploy RDP Certificates using GPO
· How to Deploy RDP Certificates Using GPO?
· Conclusion

Prerequisites to Deploy RDP Certificates using GPO

  • Windows Server with Active Directory Domain Services installed
  • Windows Server with Certificate Authority role installed
  • Administrative access to Domain Controller
  • Administrative access to Certificate Authority
  • Administrative access to Group Policy Management

How to Deploy RDP Certificates Using GPO?

Following these steps will allow you to securely deploy RDP certificates using group policy.

Time needed: 2 hours

How to Deploy RDP Certificates Using GPO?

  1. Install the Certificate Authority (CA) Role

The first step is to install the Certificate Authority role on a Windows Server. This will be the CA that issues and manages certificates for your organization.

On the server you want to be the root CA, open Server Manager and click “Add roles and features”. On the Server Roles step, check the box for Active Directory Certificate Services. Complete the wizard to install the role.

After installation, open the Certification Authority console. Right-click on the server name and click “Configure Active Directory Certificate Services on the destination server”. Choose the Root CA configuration and complete the wizard.

Your CA is now ready start issuing certificates.

Follow these blog posts to learn how to set up different types of Certificate Authorities:

What Are The Different Types Of Certificate Authority
Choosing the Right CA Type- Types of Certificate Authorities in ADCS
Step -By-Step Procedure To Set Up An Enterprise Root CA On Windows Server
Step -By-Step Procedure To Set Up A Standalone Root CA On Windows Server
Step-By-Step Procedure To Set Up An Enterprise Issuing CA In ADCS

2. Create a Certificate Template for RDP Authentication

We need to create a certificate template on the CA specifically for RDP authentication. This will allow computers to request certificates for this purpose.

In the Certification Authority console, right-click on Certificate Templates and click Manage. In the Certificate Templates console, right-click on the Computer template and click Duplicate Template.

On the General tab, give the template a name like “RDP Authentication” and change other properties like validity period if desired.

On the Extensions tab, click Edit. Remove the Client Authentication extension and click Add > New. Name the new extension “Remote Desktop Authentication” and give it an object identifier of “1.3.6.1.4.1.311.54.1.2”. This identifies it as an RDP auth certificate.

On the Security tab, add the computers and groups you want to be able to enroll for this template. On the Cryptography tab, set a suitable key length like 2048 or higher.
Click OK to create the template.

Step By Step Procedure To Fix The RDP Certificate Error On Windows Servers
How to Create a Template for RDP Certificate in a Local Certificate Authority?

3. Publish the Template to the CA

In order for computers to request the new template, we need to publish it to the CA.

In the Certification Authority console, right-click Certificate Templates and click New > Certificate Template to Issue. Select your new RDP template and click OK to publish it.

How to Create a Template for RDP Certificate in a Local Certificate Authority?

4. Create a GPO to Deploy the Template

We now need to configure a Group Policy Object that will be linked to the Active Directory Container where the hosts we want to be able to request the certificate template.

Start by creating a new GPO or selecting an existing GPO, right-click, and choose Edit.

Navigate to Computer Configuration -> Policies -> Administrative Templates -> Windows Components -> Remote Desktop Services -> Remote Desktop Session Host -> Security.
Select the Server authentication certificate template policy.

Click on Enable, and under Certificate Template Name, enter the name of the certificate template created earlier.

For example, “RDP Authentication”.

Click OK to set the server auth certificate template.

This will deploy the selected template to computers the GPO is applied to.

Create a GPO to Deploy the Template
Create a GPO to Deploy the Template

5. Enable Server authentication certificate template policy

Enable Server authentication certificate template policy
Enable Server authentication certificate template policy

6. Configure RDP to Use SSL/TLS

While still editing the GPO, go to Computer Configuration > Policies > Administrative Templates > Windows Components > Remote Desktop Services > Remote Desktop Session Host > Security.

Double-click on the “Require use of specific security layer for remote (RDP) connections” policy. Enable it and select SSL from the drop-down menu.

Configure RDP to Use SSL_TLS
Configure RDP to Use SSL_TLS

7. Link GPO to OU

Link the GPO to the OU containing your servers / desktops that need RDP certificates. They will auto enroll when Group Policy is updated.

To force an immediate update, run “gpupdate /force” on a client computer. Or reboot it.

Link GPO to OU
Link GPO to OU

8. Force update the group policy on the server

Force update the group policy on the server
Force update the group policy on the server

9. Verify Certificate Enrollment

To confirm that certificates have been enrolled successfully, open the Certification Authority console, right-click on Issued Certificates, and click Find Certificates. Search for your RDP template name.

You should see certificates issued to your computers. The templates column will show “RDP Authentication,” for example.

Verify Certificate Enrollment
Verify Certificate Enrollment

10. Verify RDP Connectivity

Finally, test connecting to a server via RDP using a TLS connection. You should not receive any certificate errors if you enrolled successfully.

Check that the connection is encrypting traffic under the General tab by clicking the Settings button in the RDP client. That’s it.

Conclusion

Following these steps will allow you to securely implement RDP in your environment using PKI certificates and group policy. Key benefits include:

  • Encrypted RDP connections preventing MITM attacks
  • Mutual authentication between client and server
  • No need to manually manage certificates
  • Seamless end-user experience

RDP provides essential remote access for IT administration. Hardening it with certificates and GPO takes things to the next level. This enhances security and reduces risk without impacting functionality.

Let us know in the comments if you have any questions! We are happy to help with implementing this in your own infrastructure. We hope this post helps you know how to deploy RDP certificates using GPOs on a Windows domain environment. Thanks for reading this post. Please share this post and help secure the digital world. Visit our website thesecmaster.com, and our social media page on Facebook, LinkedIn, Twitter, Telegram, Tumblr, Medium, and Instagram and subscribe to receive updates like this.

This post is originally published at thesecmaster.com

We thank everybody who has been supporting our work and request you check out thesecmaster.com for more such articles.

--

--

TheSecMaster
TheSecMaster

Published in TheSecMaster

This is a place where we cover topics related to Cyber Security, Risk and Vulnerabilities, Malware, Digital forensics, Dark Web, Cyber Attacks, and Best practices. We also try covering various platforms like Cloud, Virtualization, Containers, and Operating System platforms.