Skip to main content
Skip to main content

Network Level Authentication (NLA) Security

Audience: IT administrators, security engineers

Purpose: Understand NLA's role in RDP security and mitigation strategies when NLA must be disabled


Quick Reference

TL;DR
  • NLA Required — Pre-session authentication prevents unauthorized RDP connections
  • Disabling NLA — Significantly increases attack surface for brute force, MITM, and ransomware
  • Mac Compatibility — See RDP from Mac to Windows for secure alternatives
  • Alternatives — Consider Azure Virtual Desktop or RD Gateway instead of disabling NLA

Overview

Network Level Authentication (NLA) secures Remote Desktop Protocol (RDP) sessions by requiring authentication before a connection is fully established. Disabling NLA introduces significant security risks that must be carefully mitigated.


Threats When NLA is Disabled

1. Brute Force Attacks

Threat: Attackers repeatedly attempt to guess credentials via RDP.

MitigationImplementation
Account LockoutEnforce lockout after failed attempts via Intune Endpoint Security
IP RestrictionsLimit RDP access to known IP ranges via Windows Defender Firewall
Entra ID MFARequire MFA via Conditional Access policies

2. Credential Harvesting (MITM)

Threat: Attackers intercept credentials without proper certificate validation.

MitigationImplementation
TLS 1.2+Require TLS encryption for all RDP traffic
User EducationTrain users to reject certificate warnings
VPN RequirementRequire VPN for external RDP access

3. RDP Vulnerabilities

Threat: Unpatched vulnerabilities like BlueKeep (CVE-2019-0708) and DejaBlue (CVE-2019-1181).

MitigationImplementation
Patch ManagementEnforce updates via Intune policies
Firewall RulesRestrict RDP to internal networks only
Network SegmentationIsolate RDP-accessible systems

4. Denial-of-Service (DoS)

Threat: Connection floods cause resource exhaustion.

MitigationImplementation
Firewall Rate LimitingBlock external IPs or limit connection rates
Elastic MonitoringDetect anomalous traffic spikes
Load BalancingDistribute RDP connection load

5. Malware Deployment

Threat: Attackers with RDP access install ransomware or malware.

MitigationImplementation
WDACRestrict unauthorized software execution
Elastic MonitoringDetect abnormal process executions
MFA (Duo)Add additional authentication layer

Mac-to-Windows RDP Challenges

Known Issue

Mac users often require NLA to be disabled to connect to Entra ID-enrolled Windows devices via Microsoft Remote Desktop.

For a production-tested solution that does not require disabling NLA, see our guide:


Instead of disabling NLA, consider these secure alternatives:

AlternativeDescription
Azure Virtual Desktop (AVD)Cloud-based remote desktop with full Entra ID integration
RD GatewayTunnels RDP over HTTPS with Entra authentication
Conditional AccessRisk-based access controls for RDP sessions
VPN + NLARequire VPN connection before RDP access

Security Summary

Key Takeaway

Disabling NLA significantly increases the attack surface. If disabling is required for compatibility:

  1. Implement all applicable mitigations
  2. Restrict access to internal networks only
  3. Enable comprehensive monitoring
  4. Plan migration to secure alternatives