Search Our Database

How to Restrict RDP Access to Specific IP Addresses on Windows Server

Last updated on |

Introduction

Remote Desktop Protocol (RDP) provides a user with the ability to connect to another computer over a network connection. For Windows Servers, controlling which IP addresses can establish RDP sessions is vital for security. This guide will demonstrate how to limit RDP access to specific IPs using Windows Firewall with Advanced Security.

Prerequisites

  1. Administrative access to the Windows Server.
  2. A list of IP addresses that you wish to allow RDP access.
  3. Backup of your current firewall settings.

Steps to Restrict RDP Access

1. Open Windows Firewall with Advanced Security

1. Search and open Windows Defender Firewall with Advanced Security.

2. Edit the RDP Inbound Rule details

1. Find the RDP rule in the list of Inbound Rules. For example, the server using the default RDP rule:

2. Right-click on your rule and select Properties.


3. Go to the Scope tab.


4. Under Remote IP address, select These IP addresses.


4. Click Add and enter the IP addresses that you wish to allow RDP access. You can add multiple IPs or a range.


Click OK to close the dialog and again to close the rule properties.

Conclusion

You have now successfully configured your Windows Server to only allow RDP connections from specific IP addresses. This setup enhances your server’s security by ensuring only authorized users can establish remote desktop sessions.

For additional assistance or if you encounter any issues, please contact our support team at support@ipserverone.com.