I want to RDP to my Blue Iris PC, but only within my LAN. RDP opens port 3389 on the “target” PC, and I’ve read that having this port open is not great security practice, because all LAN devices can see this open port, including those that could be malicious/compromised. If understand correctly, it’s not the port# that is the issue, but rather the service associated with a given port (in this case RDP).
Microsoft website has an article showing Windows Firewall config to allow RDP connections only when connections are secure and from a whitelisted IP address. I haven’t yet tried these firewall tweaks with RDP, because I’m wondering if the gurus on this site think that the tweaks are sufficient.
Or are there other concerns with RDP in this use case? (The additional load on the server CPU is not something I’m worried about.)
Thanks!
Microsoft website has an article showing Windows Firewall config to allow RDP connections only when connections are secure and from a whitelisted IP address. I haven’t yet tried these firewall tweaks with RDP, because I’m wondering if the gurus on this site think that the tweaks are sufficient.
Or are there other concerns with RDP in this use case? (The additional load on the server CPU is not something I’m worried about.)
Thanks!
Last edited: