Managing Remote Desktop

Practice Labs Module
1 hour 2 minutes

The Managing Remote Desktop module provides you with the instructions and devices to develop your hands-on skills in the following topics.

Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *

Already have an account? Sign In »



The Managing Remote Desktop module provides you with the instructions and devices to develop your hands-on skills in the following topics.

Lab time: It will take approximately 1 hour to complete this lab

Exam Objectives

The following exam objectives are covered in this lab:

  • CAS-002 1.3: Given a scenario, analyze network and security components, concepts and architectures
  • CAS-002 2.2: Given a scenario, execute risk mitigation planning, strategies and controls
  • CAS-002 4.2: Given a scenario, select the appropriate control to secure
  • communications and collaboration solutions

Exercise 1 - Working with RDP

Remote Desktop is a built-in remote management tool in Windows 10. This tool allows you to connect to another computer’s desktop using the Remote Desktop Protocol (RDP).

When connected to another computer’s desktop via RDP, you can further investigate problems reported by the users and make the necessary remediation to fix any errors. By default, Administrators are allowed to RDP a Windows device and take over the system control using the tool. This means that any user currently signed on to Windows will be disconnected from his current session, should the administrator proceed to sign on via RDP. By default, Remote Desktop feature in Windows 10 is enabled.

In this exercise, you will work with RDP and connect computers remotely.

Exercise 2 - Administering Windows with PowerShell Remoting

Windows PowerShell has the ability to remotely manage a Windows computer by enabling a feature called PowerShell remoting. This feature can be useful when using a GUI-based tool is not viable due to low network bandwidth situation between two locations.

A service called Windows Remote Management (WinRM) makes a Windows device capable of being managed remotely. You need to set the appropriate firewall rules on both sides of the network or hosts to make PowerShell remoting possible. When connected via PowerShell remoting, you can run cmdlets and scripts like you are running those commands interactively on the local computer. However, the Windows Firewall exception for the WinRM listener will fail if any of the network cards are configured to have a public type. The firewall will refuse to create exceptions on public network cards. Hence, you must change the network card type to either private or domain. Alternatively, you can disable the public network connections for establishing PowerShell remoting.

In this exercise, you will configure and enable Windows PowerShell remoting between PLABWIN10 and PLABWIN801. You will remotely access PLABWIN801 from PLABWIN10 and transmit commands to PLABWIN801. As a pre-requisite to this task, you will first disable public network connections in PLABWIN10 and PLABWIN801 machines for establishing PowerShell remoting.

Learning Partner
Comprehensive Learning

See the full benefits of our immersive learning experience with interactive courses and guided career paths.