Table of Contents

Executive Summary: RDS-Knight is the most powerful and simple to use solution to secure RDS Servers. It has been designed to protect remote connections to Windows Desktops and Business Applications with a package of advanced security features. Today the developer confirms its full compatibility with Windows systems, including the 32bits.

RDS-Tools Improves RDS-Knight Scalability

Recently RDS-Tools announced a new version of its security tool for Windows RDS. RDS-Knight offers five great protective measures to lock down servers and remote sessions. With options to restrict data access at geographical and organisational levels, businesses get the insurance to prevent any attack both from inside and outside their network. Until now, RDS-Knight amazing features were compatible with all Windows systems, from Windows Server 2008 / 2008 R2, Windows Server 2012 / 2012 R2, Windows Server 2016. As a modern and innovative application, it has been designed to be supported by the most recent devices working under 64bits systems. Nevertheless, RDS-Tools main values are ACCESSIBILITY and SIMPLICITY. That is why RDS-Knight 1.8 release is now officially also compatible with any Windows 32bits system and therefore can support older devices and workstations. RDS-Knight 1.8 is a minor release. However, we recommend the customers to download and apply the update file for an optimal experience. For more information, visit rds-tools.com and RDS-Knight webpage .

Related Posts

RD Tools Software

How to Remote Control a Computer: Choosing the Best Tools

For quick support sessions, long-term remote work or administration tasks, remote access and control is a versatile tool. Remote controlling a computer allows you to access and manage another computer from a different location. Whether you are daily providing technical support, accessing files or managing servers or will need to in the future, read up on how to remote control a computer, checking through the principal methods and their main features to find out which may be better suited to your infrastructure, usage and security requirements.

Read article →
back to top of the page icon