<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: VPN remote desktop connection deep inspection in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-remote-desktop-connection-deep-inspection/m-p/375395#M89180</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/159497"&gt;@MRamadanAHafiez&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;You can't. Once an RDP connection is established it forms an encrypted tunnel to the endpoint, and there's no way for the firewall to decrypt that and actually look at what's happening. In most secure environments, you would disable the ability to do any sort of file transfer via RDP for this very reason.&lt;/P&gt;</description>
    <pubDate>Sun, 20 Dec 2020 05:54:37 GMT</pubDate>
    <dc:creator>BPry</dc:creator>
    <dc:date>2020-12-20T05:54:37Z</dc:date>
    <item>
      <title>VPN remote desktop connection deep inspection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-remote-desktop-connection-deep-inspection/m-p/375036#M89138</link>
      <description>&lt;P&gt;Hello Bros,&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; In our deployment we had to give access for few employees to ms-rdp to their work PCs to do remote work staff.&lt;/P&gt;&lt;P&gt;recently we started to receive some complains regarding connections for all rdp's and other collaboration services through the VPN.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;while we were trying to investigate the ms-rdp rules logs, we found that we have no more details in the logs available to understand what was going on, logs are so meaningless, for example:&lt;/P&gt;&lt;P&gt;we knew by internal investigation that one of the rdp employees were tring to copy large amout of data which ofcourse caused the link utilized and badly affected all other VPN services.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have made rdp to my PC and coped large file, tested the logs, ironically, no logs telling there were file transfere at all.&lt;/P&gt;&lt;P&gt;the quesstion is guys, what missing and need to be done regarding this ms-rdp rules enabled more deep packet inspection?&lt;/P&gt;&lt;P&gt;Software Version 9.0.9-h1&lt;/P&gt;&lt;P&gt;TIA:MR&lt;/P&gt;</description>
      <pubDate>Thu, 17 Dec 2020 20:27:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-remote-desktop-connection-deep-inspection/m-p/375036#M89138</guid>
      <dc:creator>MRamadanAHafiez</dc:creator>
      <dc:date>2020-12-17T20:27:38Z</dc:date>
    </item>
    <item>
      <title>Re: VPN remote desktop connection deep inspection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-remote-desktop-connection-deep-inspection/m-p/375395#M89180</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/159497"&gt;@MRamadanAHafiez&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;You can't. Once an RDP connection is established it forms an encrypted tunnel to the endpoint, and there's no way for the firewall to decrypt that and actually look at what's happening. In most secure environments, you would disable the ability to do any sort of file transfer via RDP for this very reason.&lt;/P&gt;</description>
      <pubDate>Sun, 20 Dec 2020 05:54:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-remote-desktop-connection-deep-inspection/m-p/375395#M89180</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2020-12-20T05:54:37Z</dc:date>
    </item>
  </channel>
</rss>

