Security - Do you protect your Remote Desktop connections with Multi Factor Authentication (MFA)?

Last updated by Kaique "Kiki" Biancatti [SSW] 5 months ago.See history

Protecting your Remote Desktop connections is crucial in today's cybersecurity landscape. One effective way to enhance security is by using Azure MFA (Multi-Factor Authentication) in conjunction with the Azure MFA NPS (Network Policy Server) extension. This setup ensures that even if an attacker obtains a user's credentials, they still need a second form of authentication to gain access, significantly reducing the risk of unauthorized access.

Video: Identity Architecture: MFA with RADIUS | Microsoft Entra ID (8 min)

Why Use Azure MFA to Protect Servers?
  • Enhanced Security: By adding an additional layer of authentication, you mitigate the risk of credential theft.
  • Compliance: Many regulatory frameworks require multi-factor authentication to protect sensitive data.

You can follow along Microsoft's documentation to implement this at your company and follow the summary below, if you already fill the prerequisites:

  1. Enable the NPS role on a domain-joined server

There needs to be a new server for RADIUS authentication in your environment, solely for MFA prompts. Generally, you don't want MFA for all your RADIUS authentication, so you'll need to create a new one, as it's not possible to have a single server with non-MFA and MFA in it. Once the extension is installed, it's going to analyza every request.

  1. Register users for MFA

If users are already registered for MFA in your tenant, then this will work. If not, you need to register them for MFA and ensure it works before proceeding.

  1. Install the Azure MFA NPS Extension

This entails running the .exe from Microsoft and running a PowerShell script to connect it to your Azure tenant.

  1. Configure your NPS extension

You can configure advanced options at this stage and what happens with users that are not enrolled for MFA.

  1. Troubleshoot

If necessary, Microsoft provides scripts and tools to check if your extension is working correctly. You should expect an MFA prompt on your phone every time you connect to a server if this setup was successful.

Finally, implementing Azure MFA for your Remote Desktop connections significantly enhances your security posture. By following the steps above, you can ensure that your remote access solutions are protected against unauthorized access, providing peace of mind and compliance with industry standards.

Kiki Biancatti
We open source.Loving SSW Rules? Star us on GitHub. Star
Stand by... we're migrating this site to TinaCMS