Download ##VERIFIED## Remote Desktop Connection For Mac

0 views
Skip to first unread message

Lupita Calvi

unread,
Jan 25, 2024, 4:35:55 PM1/25/24
to enoreran

I'm running Citrix 7.18. I have two delivery groups (Remote Desktop & App Server) that are both using a single storefront. I have published several apps from the app server and can access them from remote desktop through Citrix web and also have access to them on my local desktop through Citrix Workspace. I have a couple of scenarios happening when I launch an app but can't figure out what's causing it.

When I log into the web storefront I can launch Remote Desktop and see my published apps in a folder on my desktop. When I launch an app it causes Citrix to initiate a second Remote Desktop session within my current Remote Desktop session along with the app. The app does open fine but in the background I've got a second Remote Desktop session partially launched and an Access Denied popup. I click OK on the popup and the second Remote Desktop session disappears but the app remains open. This only happens after launching the first app once I login to Remote Desktop. If I launch other apps after they seem fine.

download remote desktop connection for mac


Downloadhttps://t.co/vGN2VEXOhx



I have my Citrix Workspace on my local computer pointed to the storefront and can access my published apps folder on my desktop. From here, when I launch an app, a remote desktop session opens instead of just the app. Unlike launching the published app in Remote Desktop as mentioned above, I don't see an Access Denied popup. The RD fully loads and I have to close it, leaving just the app open.

Closing out this one. This turned out to be a quirky issue with the ICA file. While setting up this environment I've tried different configurations and, while everyting was setup correctly, the profile I was logging in as was opening published apps using the wrong ICA file. I switched my receiver settings to put shortcuts on desktop instead of having the shortcuts in a desktop folder and all worked.

I just tried remoting to my work PC from home and got the "identity cannot be verified" prompt like the one below. I marked the "Don't ask me again for connections to this computer" box, and then accidentally clicked No (do not connect) instead of Yes. Now when I try to connect it asks me for my password, but then it does not connect and it goes back to the RDC login prompt.

1) Remove the Default.rdf from Documents folder. It will be hidden
2) Remove the RDP connection folder using regedit in the following folder
HKEY_CURRENT_USER\Software\Microsoft\Terminal Server Client\Servers
3) Run mmc.exe. Add Snap In -> Cerificates -> Computer Account -> Local Computer -> Finish
Expand the Added Certificate -> Remote Desktop folder and remove the certificate issued.
4) Do Step 3 in remote desktop as well

When I try to connect to a remote desktop, a message appears which says something like "Make sure you trust this PC, connecting to untrusted computer might harm your PC". Why would it harm my PC? I can understand that if I am sharing local resources or something like that, but if I am just connecting to a remote desktop how would that harm my computer? isn't it like sandboxed? how will the remote desktop access my PC?

It would be fairly reasonable to assume that the majority of security risks would be undertaken by running a RDP server (what Microsoft calls Remote Desktop Services), and there were some quite infamous exploits of it in the past, for example vulnerability to the pass-the-hash or MiTM attacks on non-encrypted connections. We probably still all remember disabling Remote Assistance and removing associated port exceptions in firewalls as one of the first things we did upon installing Windows XP, for example. But risks involved in using a RDP client (or Remote Desktop Connection in Microsoft's terminology) don't seem so self-obvious.

User activity tracking and keylogging: In essence, untrusted RDP server could log all your activity on the server, including websites you browse to, files you download, documents you accessed and were changing, passwords you entered to access remote services through the RDP server, basically keep track of your complete user session.

Infection of client through remote hosted files: Any files you download from the server hosting a RDP session could be tampered with, or infected with malware. You could falsely assume trust in any of these files, thinking since you put them there during your previous RDP session that they weren't tampered with or infected in the meantime, transfer them to your RDP client and open/execute/...

Man-in-the-middle: Similar to user activity tracking, only this time the attacker is active on the RDP server you connect to and is listening in on your RDP client to RDP server connection, RDP server to remote LAN / WAN connections, or possibly both. On top of being able to inspect contents of exchanged network packets, man-in-the-middle is also able to change their contents. The RDP session can be encrypted using TLS, effectively preventing eavesdropping on it, but that isn't necessarily the case with where else you connect to (remote LAN or WAN) using the RDP server.

Remote Desktop Connection (RDC, also called Remote Desktop, formerly known as Microsoft Terminal Services Client, or mstsc) is the client application for Remote Desktop Services. It allows a user to remotely log in to a networked computer running the terminal services server. RDC presents the desktop interface (or application GUI) of the remote system, as if it were accessed locally.

A basic RDP client will, by default, share the clipboard through the RDP session (because it is very convenient). This alone allows the remote server to obtain a copy of everything you select and "copy" on your client, be they text excerpts, files... which is a glaring security issue when the remote host is hostile. Similarly, an hostile server may inject hostile code in the copy&paste mechanism: if you do a copy&paste of a file from a directory on your desktop system to another directory on your desktop system, then the hostile server may intercept the copy and alter the file in transit, thus injecting a virus (if the file is executable in some way).

A remote desktop connection allows someone else to fully access a computer. From the other side, the accessed computer could try to send any kind of suspicious and/or malicious data packages using the established "trusted" remote desktop connection.

In malware analysis (for example), one would never connect to an untrusted and potentially infected system without taking the appropriate precautions like using a VM which can be deleted afterwards when it becomes apparent that the infected system you are analyzing is indeed infected and spreads it's nasty stuff using any available network connection. In your case, that would be the remote desktop connection you're about to "trust" when clicking that OK button.

Always keep in mind that a remote desktop connection is - in it's core - nothing else than a bi-directional network connection between two computers. Therefore, all network-related risks are relevant here.

You can't imagine how many non-benign packets I've seen transported over remote desktop connections while I analyzed systems. Those would have instantly infected your system and in most cases you probably wouldn't notice it before harm is done. Trust me, that's the last thing you want to happen...

In case you missed it: on June 11, 2013, Microsoft had to call out a particularly important patch (MS12-037) which addressed (among other things) a critical flaw in the remote desktop protocol of all Windows operating systems (RDP). If you want to be as secure as possible, make sure you've applied the latest updates and security patches to your system.

Just be aware in bridged mode, the modem/gateway device does not authenticate, does not manage, has no ability to perform any firewall protection, and does not allow for remote access into the modem/gateway device. This will limit us to providing full support to remotely diagnose if you should experience service issues.

- I have a modem and router combo from my ISP before the orbi (if that makes a difference, it's a virgin canada valerie modem, same as the bell canada 3500 modem from what I'm told). It's connected to the orbi (orbi is in router mode) through an ethernet cable. Yes, this does make a difference because it creates a "Double NAT" which will block connections before they reach the Orbi router.

Those internet "Is my port open" sites only work if some device accepts the connection. They have to receive some sort of return packet. When "nothing happens", they mark the port closed.

IT departments are responsible for managing and controlling access to an ever-growing inventory of on-site and off-site servers, computers and devices. Yet relying on multiple remote connection tools and password managers is inefficient, frustrating and unsecure. Instead of being treated to streamlined clarity, IT pros, sysadmins and help desk technicians struggle with ongoing chaos. The solution is to centralize remote connection technologies, remote machine data, password management, and access control on a platform that is secure, scalable, and refreshingly simple to use.

"I manage over 120 servers on 10 locations. I've tried other remote desktop tools and Devolutions is by far the best I've tried. Very easy to set up and organize. Lots off tools other than remote desktop are built into the app. Things like services, ping, port scan etc. Remote desktops open in tabs which makes it very easy to switch from server to server. Also the ability to store multiple passwords and assign them as needed is a real plus."

"This product is truly the "Swiss Army Knife". When you think they've hit the mark, they go and add more functionality when you think there couldn't be much more. Starting from a simple tool to manage numerous connection types, it has morphed in to so much more. Many companies try to throw every feature, plus the kitchen sink, just to increase their version number. That is not the case with Devolutions. Each upgrade truly enhances the product!"

df19127ead
Reply all
Reply to author
Forward
0 new messages