We have received the below mentioned error message while connecting the 2008 R2 SP1 server thru RDP
####
We have installed the MS recommended patch to overcome this issue and this didn't really helped in our scenario.
Resolution :
We have changed Remote desktop security settings and issue has been resolved
Note : RDP security layer with Low encryption level is not recommended .
#################################
https://technet.microsoft.com/en-us/magazine/ff458357.aspx
Secure RDS (Remote Desktop Services) Connections with SSL
By default, RD Session Host sessions use native RDP encryption. However,
RDP does not provide authentication to verify the identity of an RD
Session Host server. You can enhance the security of RD Session Host
sessions by using Secure Sockets Layer (SSL) Transport Layer Security
(TLS 1.0) for server authentication and to encrypt RD Session Host
communications. The RD Session Host server and the client computer must
be correctly configured for TLS to provide enhanced security.
The three available security layers are:
- SSL (TLS 1.0) SSL (TLS 1.0) will be used for server authentication and for encrypting all data transferred between the server and the client.
- Negotiate
The most secure layer that is supported by the client will be used. If
supported, SSL (TLS 1.0) will be used. If the client does not support
SSL (TLS 1.0), the RDP Security Layer will be used. This is the default
setting.
- RDP Security Layer Communication
between the server and the client will use native RDP encryption. If you
select RDP Security Layer, you cannot use Network Level Authentication.
A certificate is needed to authenticate an RD Session Host server when
SSL (TLS 1.0) is used to secure communication between a client and an RD
Session Host server during RDP connections. You can select a
certificate that you have already installed on the RD Session Host
server, or you can use the default self-signed certificate. You can
enable SSL for Remote Desktop connections using the RDP-Tcp Properties
dialog box, which is accessed from the Remote Desktop Session Host
Configuration snap-in.
For Remote Desktop connections, data encryption protects data by
encrypting it on the communications link between the client and the
server. Encryption protects against the risk of interception of the
client/server communication.
By default, Remote Desktop connections are encrypted at the highest
level of security available (128-bit). However, some older versions of
the Remote Desktop Connection client application do not support this
high level of encryption. If a high level of encryption is needed to
support legacy clients, the encryption level of the connection can be
configured to send and receive data at the highest encryption level
supported by the client. There are four levels of encryption available:
- Low
Data sent from the client to the server is encrypted using 56-bit
encryption. Data sent from the server to the client is not encrypted.
- Client Compatible
Encrypts client/server communication at the maximum key strength
supported by the client. Use this level when the terminal server is
running in an environment containing mixed or legacy clients. This is
the default encryption level.
- High Encrypts
client/server communication using 128-bit encryption. Use this level
when the clients accessing the terminal server also support 128-bit
encryption. When encryption is set at this level, clients that do not
support this level of encryption will not be able to connect.
- FIPS Compliant
All client/server communication is encrypted and decrypted with the
Federal Information Processing Standards (FIPS) encryption algorithms.
FIPS 140-1 (1994) and its successor, FIPS 140-2 (2001), describe U.S.
government requirements for encryption.
The RDP-Tcp Properties dialog box, which is accessed from the Remote
Desktop Session Host Configuration snap-in, allows you to configure the
encryption level.
RD Session Host authentication and encryption settings can also be configured by applying the following Group Policy settings:
- Set Client Connection Encryption Level
- equire Use Of Specific Security Layer For Remote (RDP) Connections
- Server Authentication Certificate Template
- Require User Authentication For Remote Connections By Using Network Level Authentication
These Group Policy settings are located in the following container:
Computer Configuration\Policies\Administrative Templates\Windows
Components\Remote Desktop Services\Remote Desktop Session Host\Security
FIPS can be specified as the encryption level by applying the System Cryptography: Use
FIPS Compliant Algorithms For Encryption, Hashing And Signing Group Policy setting
located in the following container:
Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\Security Options