What protocol would you use for remote access to get a console with an encrypted connection?

What is SSH?

SSH or Secure Shell is a network communication protocol that enables two computers to communicate (c.f http or hypertext transfer protocol, which is the protocol used to transfer hypertext such as web pages) and share data. An inherent feature of ssh is that the communication between the two computers is encrypted meaning that it is suitable for use on insecure networks.

SSH is often used to "login" and perform operations on remote computers but it may also be used for transferring data.

How do I use SSH?

You use a program on your computer (ssh client), to connect to our service (server) and transfer the data to/from our storage using either a graphical user interface or command line. There are many programs available that enable you to perform this transfer and some operating systems such as Mac OS X and Linux have this capability built in.

SSH clients will typically support SCP (Secure Copy) and/or SFTP (SSH File Transfer Protocol) for transferring data; we tend to recommend using SFTP instead of SCP but both will work with our service.

Will I have to use the command line?

No, there are many very good programs with graphical interfaces such as WinSCP for Windows and Cyberduck for Mac OS X. Please see the access guide for your operating system (Windows, Mac OS X and Linux) for more information.

Why did Research Data Services choose SSH?

SSH enables us to provide a service with encrypted access for the widest range of operating systems (Windows XP-10, Max OS X and Linux); this would not be possible if we provided Windows networked drives (which utilise the SMB/CIFS communication protocol). SSH is reliable and secure and is often used in the High Performance Computing community for this reason.

RDSS Access Guide

Help & Support

For further help and assistance you can contact

Ben Is Helpful

Windows Remote Desktop Protocol (RDP) is widely used by system administrators trying to provide remote operators access. In a shocking oversight this connection does not use strong encryption by default. This post will walk through the steps required to force TLS encryption on all RDP connections.

Windows Remote Desktop Protocol (RDP) is widely used by system administrators trying to provide remote operators access to internal systems and servers. In a shocking oversight this connection does not use strong encryption by default.

This post will walk through the steps required to force TLS encryption on all RDP connections.

Step 1: Open the Root Console

open the search bar and type "mmc" or run mmc.exe from the Run application.

Select the top application, which will open the system console.

What protocol would you use for remote access to get a console with an encrypted connection?

Step 2: Open the Group Policy Editor Snap-in

Open File > Add/Remove Snap-in... and select Global Policy Editor.

What protocol would you use for remote access to get a console with an encrypted connection?

Select "Group Policy Editor" and "Add" the selected snap-in.

What protocol would you use for remote access to get a console with an encrypted connection?

Select "Local Computer" - this should be the default - and select "Finish" > "Ok."

What protocol would you use for remote access to get a console with an encrypted connection?

Step 3: Navigate to the RDP Session Security Policies

In the sidebar Navigate to Local Computer Policy > Computer Configuration > Administrative Templates > Windows Components > Remote Desktop Services > Remote Desktop Session Hosts > Security. Then select "Set client encryption level" and edit that policy

What protocol would you use for remote access to get a console with an encrypted connection?

Step 4: Require the Highest native Encryption possible.


Edit the "Set client encryption level" policy.

What protocol would you use for remote access to get a console with an encrypted connection?

Here are the notes for the different options that Microsoft Provides

If you enable this policy setting, all communications between clients and RD Session Host servers during remote connections must use the encryption method specified in this setting. By default, the encryption level is set to High. The following encryption methods are available:
High: The High setting encrypts data sent from the client to the server and from the server to the client by using strong 128-bit encryption. Use this encryption level in environments that contain only 128-bit clients (for example, clients that run Remote Desktop Connection). Clients that do not support this encryption level cannot connect to RD Session Host servers.
Client Compatible: The Client Compatible setting encrypts data sent between the client and the server at the maximum key strength supported by the client. Use this encryption level in environments that include clients that do not support 128-bit encryption.
Low: The Low setting encrypts only data sent from the client to the server by using 56-bit encryption.

An important note: This only pertains to the connections that use the native RDP encryption. As of writing this, the protocol involved for RDP traffic is RC4. That should frighten you.

Step 5: A better idea -> Force TLS instead

Edit the "Require use of specific security layer for remote (RDP) connections" policy.

What protocol would you use for remote access to get a console with an encrypted connection?

Here are the notes from Microsoft on this policy:

This policy setting specifies whether to require the use of a specific security layer to secure communications between clients and RD Session Host servers during Remote Desktop Protocol (RDP) connections.
If you enable this policy setting, all communications between clients and RD Session Host servers during remote connections must use the security method specified in this setting. The following security methods are available:
Negotiate: The Negotiate method enforces the most secure method that is supported by the client. If Transport Layer Security (TLS) version 1.0 is supported, it is used to authenticate the RD Session Host server. If TLS is not supported, native Remote Desktop Protocol (RDP) encryption is used to secure communications, but the RD Session Host server is not authenticated. Native RDP encryption (as opposed to SSL encryption) is not recommended.
RDP: The RDP method uses native RDP encryption to secure communications between the client and RD Session Host server. If you select this setting, the RD Session Host server is not authenticated. Native RDP encryption (as opposed to SSL encryption) is not recommended.
SSL (TLS 1.0): The SSL method requires the use of TLS 1.0 to authenticate the RD Session Host server. If TLS is not supported, the connection fails. This is the recommended setting for this policy.

At the very least Microsoft admits that the Native RDP encryption is not recommended.

With that you've forced TLS. In the next post we will go over how to check that the TLS encryption you've set in this post is actually running as expected.


Remote access has become a necessity to organizations operating ICS. Your time matters, and your systems should work. Invest in a remote access system built from the ground up for industrial control networks, uniquely secured with moving target defense, with no compromises on security.

Ask us questions or get your demo at https://dispel.io

What are the three major components of the SSH protocol?

SSH has three components: transport layer protocol (TLP), user authentication protocol, and connection protocol.

Is SSH encrypted?

All SSH traffic is encrypted. Whether users are transferring a file, browsing the web or running a command, their actions are private. While it is possible to use SSH with an ordinary user ID and password as credentials, SSH relies more often on public key pairs to authenticate hosts to each other.

What is the SSH protocol?

SSH or Secure Shell is a network communication protocol that enables two computers to communicate (c.f http or hypertext transfer protocol, which is the protocol used to transfer hypertext such as web pages) and share data.

Which protocol enables the secure transfer of data from a remote PC to a server by creating a VPN across at TCP IP network?

PPTP (Point-to-Point Tunneling Protocol) is a network protocol that enables the secure transfer of data from a remote client to a private enterprise server by creating a VPN across TCP/IP-based data networks. PPTP supports on-demand, multiprotocol, virtual private networking over public networks, such as the internet.