<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Block 3rd Party RDP Apps in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/block-3rd-party-rdp-apps/m-p/3747071#M8947</link>
    <description>&lt;P&gt;Thanks for the responses.&amp;nbsp; I should have worded my question a little better.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So the goal is to block any third party application used to obtain a remote desktop session.&amp;nbsp; Things like Teamviewer, ScreenConnect, PC Anywhere (is that still around), GoToMyPC and do so at the edge.&amp;nbsp; We have already blocked 3389, but those applications don't use that port and some use random port or tunnel over https as pointed out.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I wasn't sure if ASA had the ability to do this native or not.&amp;nbsp; I wanted to make sure it cannot before I recommend a new product like Firepower or another security appliance / software.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 15 Nov 2018 02:53:36 GMT</pubDate>
    <dc:creator>sabinj</dc:creator>
    <dc:date>2018-11-15T02:53:36Z</dc:date>
    <item>
      <title>Block 3rd Party RDP Apps</title>
      <link>https://community.cisco.com/t5/network-security/block-3rd-party-rdp-apps/m-p/3746870#M8944</link>
      <description>&lt;P&gt;I have a request from management to block 3rd party remote desktop applications at the firewall.&amp;nbsp; I'm wondering if this can be done on an ASA, possibly through the Service Policy Rules...&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ASA-5545 version 9.2(4)27&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any advice would be appreciated.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:28:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-3rd-party-rdp-apps/m-p/3746870#M8944</guid>
      <dc:creator>sabinj</dc:creator>
      <dc:date>2020-02-21T16:28:19Z</dc:date>
    </item>
    <item>
      <title>Re: Block 3rd Party RDP Apps</title>
      <link>https://community.cisco.com/t5/network-security/block-3rd-party-rdp-apps/m-p/3746900#M8945</link>
      <description>&lt;P&gt;If you are referring RDP then it will be port 3389 to block.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;if not you need to capture the logs in FW what is the application port using, then start building the access rules to block that port.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Do you have any example&amp;nbsp; of&amp;nbsp;3rd Party RDP Apps ?&lt;/P&gt;</description>
      <pubDate>Wed, 14 Nov 2018 20:47:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-3rd-party-rdp-apps/m-p/3746900#M8945</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2018-11-14T20:47:00Z</dc:date>
    </item>
    <item>
      <title>Re: Block 3rd Party RDP Apps</title>
      <link>https://community.cisco.com/t5/network-security/block-3rd-party-rdp-apps/m-p/3746932#M8946</link>
      <description>&lt;P&gt;Yes, you can a primitive way is to block RDP (3389) as mentioned, in practice this should be the case anyway, as only the required traffic should be permitted.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also be aware, other ports can be used. RDS can tunnel over HTTPS, for example.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;A better solution is to use FirePower, as this has the ability to do application fingerprinting.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Martin&lt;/P&gt;</description>
      <pubDate>Wed, 14 Nov 2018 21:21:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-3rd-party-rdp-apps/m-p/3746932#M8946</guid>
      <dc:creator>Martin Carr</dc:creator>
      <dc:date>2018-11-14T21:21:39Z</dc:date>
    </item>
    <item>
      <title>Re: Block 3rd Party RDP Apps</title>
      <link>https://community.cisco.com/t5/network-security/block-3rd-party-rdp-apps/m-p/3747071#M8947</link>
      <description>&lt;P&gt;Thanks for the responses.&amp;nbsp; I should have worded my question a little better.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So the goal is to block any third party application used to obtain a remote desktop session.&amp;nbsp; Things like Teamviewer, ScreenConnect, PC Anywhere (is that still around), GoToMyPC and do so at the edge.&amp;nbsp; We have already blocked 3389, but those applications don't use that port and some use random port or tunnel over https as pointed out.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I wasn't sure if ASA had the ability to do this native or not.&amp;nbsp; I wanted to make sure it cannot before I recommend a new product like Firepower or another security appliance / software.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 15 Nov 2018 02:53:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-3rd-party-rdp-apps/m-p/3747071#M8947</guid>
      <dc:creator>sabinj</dc:creator>
      <dc:date>2018-11-15T02:53:36Z</dc:date>
    </item>
    <item>
      <title>Re: Block 3rd Party RDP Apps</title>
      <link>https://community.cisco.com/t5/network-security/block-3rd-party-rdp-apps/m-p/3748743#M8948</link>
      <description>&lt;P&gt;I guess your ASA is not next generation? Firepower is included with newer models.&amp;nbsp;This has to ability to do L7 application filtering (i.e. AVC).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Martin&lt;/P&gt;</description>
      <pubDate>Sat, 17 Nov 2018 23:27:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-3rd-party-rdp-apps/m-p/3748743#M8948</guid>
      <dc:creator>Martin Carr</dc:creator>
      <dc:date>2018-11-17T23:27:51Z</dc:date>
    </item>
    <item>
      <title>Re: Block 3rd Party RDP Apps</title>
      <link>https://community.cisco.com/t5/network-security/block-3rd-party-rdp-apps/m-p/3748798#M8949</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;With the native ASA you cannot identity the L7 application to block. or else you need to identify the ports which the application is using and block it. If your ASA have firepower service then you can block the L7 applications, or else you need to go with ASA with firepower or FTD.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;Abheesh&lt;/P&gt;</description>
      <pubDate>Sun, 18 Nov 2018 10:27:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-3rd-party-rdp-apps/m-p/3748798#M8949</guid>
      <dc:creator>Abheesh Kumar</dc:creator>
      <dc:date>2018-11-18T10:27:23Z</dc:date>
    </item>
    <item>
      <title>Re: Block 3rd Party RDP Apps</title>
      <link>https://community.cisco.com/t5/network-security/block-3rd-party-rdp-apps/m-p/3748950#M8950</link>
      <description>&lt;P&gt;You need to write application/service access-rules, you cant do that on asa. best option would be - if you have firepower then use firepower or else you have to use internal SEIM device to block such traffic. i recommend to use SEIM to do that.&lt;/P&gt;</description>
      <pubDate>Mon, 19 Nov 2018 01:21:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-3rd-party-rdp-apps/m-p/3748950#M8950</guid>
      <dc:creator>venkat_n7</dc:creator>
      <dc:date>2018-11-19T01:21:28Z</dc:date>
    </item>
  </channel>
</rss>

