Security – Checking the encryption level of Remote Desktop on Windows Server 2012

rdpSecuritywindows-server-2012

I want to check that my RDP sessions to a windows server 2012 use SSL/TLS 1.0. I found hints about using tools for Windows 2008 that do not exist anymore on Windows Server 2012 and above.

So my question is: how can I be sure (Log–Entries, Session-Monitoring…) that my RDP connection is properly encrypted with TLS 1.x?

Some information:
– No server role for remote sessions installed, just RDP for administrative purposes under "System properties" -> "Remote" (NLA required).
– In Local Computer Policy Manager I have set the client connection encryption level to "High Level", Require use of specific security layer for RDP connections to "SSL (TLS 1.0)" and Require user authentication for remote connection by using NLA to enabled.
– no specific key or certificate created nor installed (I did not manage to find understandable guides on this)

I would like to be sure that encryption actually is used.
Thanks a lot!
Aurel

Best Answer

You've got to trace it and this can be done in Windows.

C:\Windows\System32> netsh trace start capture = yes ipv4.address = <IP>
  Running
  Trace File: <filepath>\NetTrace.etl
C:\Windows\System32> mstsc -v <IP>
C:\Windows\System32> netsh trace stop
  Tracing session was successfully stopped.

Open the saved NetTrace.etl file Microsoft Message Analyzer and look for the Client Handshake

enter image description here

Update for newer Windows versions

Since Message Analyzer got retired, the only alternative as of 2021 is to use pktmon and if you can install extra tools, use netmon.

Also, it is possible to use wireshark by converting the files to pcap format.