Managing Remote Desktop

Practice Labs Module
1 hour

The module provide you with the instructions and devices to develop your hands-on skills in the following topics.

Join over 3 million cybersecurity professionals advancing their career
Sign up with

Already have an account? Sign In »



The module provide you with the instructions and devices to develop your hands-on skills in the following topics.

** Lab time:** It will take approximately 1 hour to complete this lab.

Exam Objectives

The following exam objectives are covered in this lab:

  • Apply secure design principles to network architecture (e.g., IP & non-IP protocols, segmentation)
  • Secure network components
  • Design and establish secure communication channels
  • Prevent or mitigate network attacks

Exercise 1 - Working with RDP

Remote Desktop is a built-in remote management tool in Windows 10. This tool allows you to connect to another computer’s desktop using the Remote Desktop Protocol (RDP).

When connected to another computer’s desktop via RDP, you can further investigate problems reported by the users and make the necessary remediation to fix any errors. By default, Administrators are allowed to RDP a Windows device and take over the system control using the tool. This means that any user currently signed on to Windows will be disconnected from his current session, should the administrator proceed to sign on via RDP. By default, Remote Desktop feature in Windows 10 is enabled.

In this exercise, you will work with RDP and connect computers remotely.

Exercise 2 - Administering Windows with PowerShell Remoting

Windows PowerShell has the ability to remotely manage a Windows computer by enabling a feature called PowerShell remoting. This feature can be useful when using a GUI-based tool is not viable due to low network bandwidth situation between two locations.

A service called Windows Remote Management (WinRM) makes a Windows device capable of being managed remotely. You need to set the appropriate firewall rules on both sides of the network or hosts to make PowerShell remoting possible. When connected via PowerShell remoting, you can run cmdlets and scripts like you are running those commands interactively on the local computer. However, the Windows Firewall exception for the WinRM listener will fail if any of the network cards are configured to have a public type. The firewall will refuse to create exceptions on public network cards. Hence, you must change the network card type to either private or domain. Alternatively, you can disable the public network connections for establishing PowerShell remoting.

In this exercise, you will configure and enable Windows PowerShell remoting between PLABWIN10 and PLABWIN801. You will remotely access PLABWIN801 from PLABWIN10 and transmit commands to PLABWIN801. As a pre-requisite to this task, you will first disable public network connections in PLABWIN10 and PLABWIN801 machines for establishing PowerShell remoting.