Table of Contents

A silver bullet against cyber-criminals.

In today’s connected world, it becomes mandatory to own the proper tools to manage TSE/RDS/Citrix servers. With the emergence of Internet communications, anyone can publish Windows applications and Remote Desktops to share legacy resources throughout the world via the web. Cloud computing and mobile access is the next step in the upcoming world. Your users all benefit from Microsoft Remote Desktop services to connect and to work. However, it is perilous to both your users and your information. Attackers of all kinds with malicious intent threaten your Windows application and databases, whether you know it or not. With everything at stake, protecting your servers is not an option; it is mandatory. But most solutions are complex, sophisticated and time-consuming for everyone involved. RDS-Knight is the best security tool In minutes, you will prevent foreign attacks from opening a session, avoid brute force attacks on your server, restrict access by device and by time, and provide security for your users' environment. RDS-Knight's 360-degrees approach to security combines advanced technology, the latest lessons and insights RDS-Tools elite team of Remote Desktop specialists bring back from real-world missions to protect your RDS servers with five major features:

  • Geo-restriction: Prevent foreign attackers from opening a session.
  • Time-based control access: Prohibit users from connecting at night.
  • Defender: Avoid brute-force attacks.
  • One-click to set User Rights Policies: Provide a highly secure user environment.
  • End-Point Protection: Restrict access per device.

RDS-Tools cares a lot about its customers’ satisfaction. That is why the Development Team is constantly working on improving the software and bringing new solutions to fill all possible expectations. Following are the changes to be noticed since RDS-Knight 1.3 Release.

RDS-Knight 1.4 fixes the uninstall process

No more "Mistake" message box after uninstalling the Application.

RDS-Knight 1.4 Includes Great Enhancements

Homeland Access Protection:

  • New parameter: Access Restriction Per Country. The software checks all the connections to the RDP Port and the connections to the process selected by the Administrator. The selected process by default is "HTML5 service". This new parameter strengthens the protection of the connections coming from the TSplus Web Portal, ensuring the verification of the country of origin.
  • The IP addresses list corresponding to countries has been updated.

RDS-Knight 1.4 makes all of this possible. This is a major release. We recommend you download and apply the Update Release for an optimal experience.

For more information, visit rds-tools.com About RDS-Tools: Since 1996, RDS Tools has specialized in remote-access technology, expanding its experience and expertise in deployments of all sizes — as large as 35,000 concurrent users. After investing nearly seven years of R&D developing our flagship products, we are extremely proud to offer our customers such cost-effective and easy-to-use technology to obviate server complexity and deliver a powerful “server-based solution,” which runs on any Microsoft system. RDS-Tools provides 4 brand new technology choices that will greatly help you to deploy your RDS/TSE servers: RDS WebAccess, RDS Print, RDS Shield and Server Genius. For any questions, comments, suggestions or sales inquiries, please send us an email at [email protected] and we will be pleased to answer you. (Written by Floriane Mer, Marketing Manager at RDS-Tools.)

→ Back to Press Releases

Related Posts

RD Tools Software

How to Remote Control a Computer: Choosing the Best Tools

For quick support sessions, long-term remote work or administration tasks, remote access and control is a versatile tool. Remote controlling a computer allows you to access and manage another computer from a different location. Whether you are daily providing technical support, accessing files or managing servers or will need to in the future, read up on how to remote control a computer, checking through the principal methods and their main features to find out which may be better suited to your infrastructure, usage and security requirements.

Read article →
back to top of the page icon