Remote desktop security

  • Thread starter Thread starter \(James
  • Start date Start date
J

\(James

When you remote desktop into a workstation, is there any footprint of your
activity left on the workstation from which you performed the remote desktop
connection.

For instance, when you browse the net, there are cookies, cached files, etc.

Would these be present on the workstation from which you started the remote
desktop session?
Would there be any other files of your activity present on the workstation
from which you started the remote desktop session?
 
"(James" <jamesrussell2832@yahoo.com> wrote in message
news:lrNBi.110291$rX4.45804@pd7urf2no...
> When you remote desktop into a workstation, is there any footprint of your
> activity left on the workstation from which you performed the remote
> desktop connection.
>
> For instance, when you browse the net, there are cookies, cached files,
> etc.
>
> Would these be present on the workstation from which you started the
> remote desktop session?


NO


> Would there be any other files of your activity present on the workstation
> from which you started the remote desktop session?


YES...event viewer might have something

D
>
>
 
Hi James,

"(James" <jamesrussell2832@yahoo.com> wrote in message
news:lrNBi.110291$rX4.45804@pd7urf2no...
> When you remote desktop into a workstation, is there any footprint of your
> activity left on the workstation from which you performed the remote
> desktop connection.


No, not really other than the event of the remote logon itself.

> For instance, when you browse the net, there are cookies, cached files,
> etc.


No, those are cached locally on the system that was accessed.

> Would these be present on the workstation from which you started the
> remote desktop session?


Nope.

> Would there be any other files of your activity present on the workstation
> from which you started the remote desktop session?


As mentioned, just the remote event itself. Be aware, however, that if you
are doing this from a work environment where systems are monitored, there
will be logs from the network firewall that will show a network admin what
you were accessing and and how long you were doing it. They may even have a
record of keystrokes used depending on how much in depth the company is
monitoring its users. Basically, if you are doing something that is against
your company's usage policy (and I'm not saying you are, but) it will be
easy for any decent network admin to prove it.

--
Best of Luck,

Rick Rogers, aka "Nutcase" - Microsoft MVP
http://mvp.support.microsoft.com/
Windows help - www.rickrogers.org
My thoughts http://rick-mvp.blogspot.com

>
>
 
Thanks for your honest answers Rick. This won't be from work. More, I'm
just curious how secure this is, one can never be to careful nowadays.


"Rick Rogers" <rick@mvps.org> wrote in message
news:ODVCNo76HHA.2752@TK2MSFTNGP06.phx.gbl...
> Hi James,
>
> "(James" <jamesrussell2832@yahoo.com> wrote in message
> news:lrNBi.110291$rX4.45804@pd7urf2no...
>> When you remote desktop into a workstation, is there any footprint of
>> your activity left on the workstation from which you performed the remote
>> desktop connection.

>
> No, not really other than the event of the remote logon itself.
>
>> For instance, when you browse the net, there are cookies, cached files,
>> etc.

>
> No, those are cached locally on the system that was accessed.
>
>> Would these be present on the workstation from which you started the
>> remote desktop session?

>
> Nope.
>
>> Would there be any other files of your activity present on the
>> workstation from which you started the remote desktop session?

>
> As mentioned, just the remote event itself. Be aware, however, that if you
> are doing this from a work environment where systems are monitored, there
> will be logs from the network firewall that will show a network admin what
> you were accessing and and how long you were doing it. They may even have
> a record of keystrokes used depending on how much in depth the company is
> monitoring its users. Basically, if you are doing something that is
> against your company's usage policy (and I'm not saying you are, but) it
> will be easy for any decent network admin to prove it.
>
> --
> Best of Luck,
>
> Rick Rogers, aka "Nutcase" - Microsoft MVP
> http://mvp.support.microsoft.com/
> Windows help - www.rickrogers.org
> My thoughts http://rick-mvp.blogspot.com
>
>>
>>

>
 
Back
Top