Remote desktop security

J

\(James

When you remote desktop into a workstation, is there any footprint of your
activity left on the workstation from which you performed the remote desktop
connection.

For instance, when you browse the net, there are cookies, cached files, etc.

Would these be present on the workstation from which you started the remote
desktop session?
Would there be any other files of your activity present on the workstation
from which you started the remote desktop session?
 
D

-Draino-

(James said:
When you remote desktop into a workstation, is there any footprint of your
activity left on the workstation from which you performed the remote
desktop connection.

For instance, when you browse the net, there are cookies, cached files,
etc.

Would these be present on the workstation from which you started the
remote desktop session?
NO


Would there be any other files of your activity present on the workstation
from which you started the remote desktop session?

YES...event viewer might have something

D
 
R

Rick Rogers

Hi James,

(James said:
When you remote desktop into a workstation, is there any footprint of your
activity left on the workstation from which you performed the remote
desktop connection.

No, not really other than the event of the remote logon itself.
For instance, when you browse the net, there are cookies, cached files,
etc.

No, those are cached locally on the system that was accessed.
Would these be present on the workstation from which you started the
remote desktop session?
Nope.

Would there be any other files of your activity present on the workstation
from which you started the remote desktop session?

As mentioned, just the remote event itself. Be aware, however, that if you
are doing this from a work environment where systems are monitored, there
will be logs from the network firewall that will show a network admin what
you were accessing and and how long you were doing it. They may even have a
record of keystrokes used depending on how much in depth the company is
monitoring its users. Basically, if you are doing something that is against
your company's usage policy (and I'm not saying you are, but) it will be
easy for any decent network admin to prove it.

--
Best of Luck,

Rick Rogers, aka "Nutcase" - Microsoft MVP

Windows help - www.rickrogers.org
My thoughts http://rick-mvp.blogspot.com
 
J

\(James

Thanks for your honest answers Rick. This won't be from work. More, I'm
just curious how secure this is, one can never be to careful nowadays.
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Top