TL;DR: Treat public RDP as an exception. Put RDP behind a VPN or RD Gateway, enforce phishing-resistant MFA, allowlist source IPs, and monitor aggressively.
TOC
The 2025 reality
Always-on internet scanning means any exposed 3389/TCP gets hit—often within minutes. Less exposure, more layers, and better identity controls are your best risk reducers.
Do this first (30 minutes)
- Close public 3389 at the edge. If you must keep it, set strict source IP allowlists.
- Front RDP with RD Gateway + MFA. Use NPS/Entra ID (or equivalent) and avoid SMS factors.
- Force Network Level Authentication (NLA) and modern encryption. Disable weak ciphers.
Reference architecture that works
User → VPN (or ZTNA) → RD Gateway (with MFA) → Target host via RDP. This removes direct internet exposure and centralizes auditing and policy.
Hardening checklist
- Perimeter: default deny, allowlist only known sources.
- Identity: MFA everywhere for admins; rotate credentials and block legacy protocols.
- Session policy: disable drive/clipboard/device redirection unless required.
- Accounts: lockout thresholds and alerts on brute-force patterns.
- OS: keep RDP/RPC patches current; limit local admins; enable firewall on hosts.
Monitor like you mean it
- Alert on spikes in failed sign-ins or any direct 3389 hits from the internet.
- Centralize logs (gateway + hosts). Review weekly; respond to anomalies.
Want a Japan-hosted Windows VPS prepped for RD Gateway + MFA? Contact us—ask for the hardened baseline and firewall templates.


