For security reasons I have to restrict/disable file transfer via RDP (port 3389) from and to Remote Machines (Windows 10). Is the file transfer tunneled through port 3389, or can I safely prevent a file transfer by blocking port 139/445 SMB? A GPO would be too uncertain for me at this point.
Asked
Active
Viewed 1.4k times
1
-
Do you mean you want to prevent transfers to and from TSClient drives? – RobbieCrash Oct 16 '20 at 11:44
-
Use firewalld/iptables/nftables if you are using a Linux server to block the port or drop the traffic. – Sysadmin Oct 16 '20 at 12:54
-
Pity you got no real answers to this question. I want to block clipboard + file transfer for some users only, so the GPO approach would not work for me as well. I also hope we could distinguish that on the firewall. Did you find a solution in the meantime? – Philippp Feb 25 '22 at 17:50
1 Answers
4
I assume you are asking how to block copy/paste files from local PC to remote desktop (Windows 10) through RDP window directly. If yes, please config the group policy in remote desktop server (Windows 10).
- Launch "gpedit.msc", the Local Group Policy Editor will open.
- Navigate to "Computer Configuration" > "Administrative Templates" > "Windows Components" > "Remote Desktop Services" > "Remote Desktop Session Host" > "Device and Resource Redirection".
- Set "Do not allow Clipboard redirection" to "Enabled", Set "Do not allow drive redirection" to "Enabled".
If you also want to block SMB share file transfer, block client access these ports of server (Windows 10).
- UDP 137
- UDP 138
- TCP 139
- TCP 445

yanqian
- 141
- 3