Table of Contents

The RDS-Tools Team is proud to announce the general availability of RDS-Knight 3.4 version .It contains great new features and enhancements:

  • Blocked IP addresses can be filtered by IP address, date and country (supported country name in English) for Homeland Access Protection and Brute-Force Attacks Defender features:
  • Blocked IP addresses by Bruteforce Attack Defender now records the country of the attack :
  • SMTP Settings were improved :
  • SSL support was added.
  • SMTP validation email's subject now displays machine name.
  • SMTP validation settings (when an invalid credential is provided, an error message is displayed accordingly):
  • Ransomware whitelist process was fixed by using a case-insensitive string comparer.

→ Back to the Release Notes

Related Posts

RD Tools Software

"Enhancing RDS Security: Integrating Windows Server Update Services with Advanced Security Measures"

As cyber threats grow in sophistication, combining WSUS (Windows Server Update Services) with RDS Tools Advanced Security tools has become essential for comprehensive protection. Explore how Windows Server Update Services supports RDS environments, its limitations in addressing modern security challenges, and re-visit how integration with robust cybersecurity solutions, such as RDS Advanced Security, enhances protection. Then finish with best practices for IT teams to effectively implement this comprehensive server and network security approach.

Read article →
RD Tools Software

"How to Remote Control a Computer: Choosing the Best Tools"

For quick support sessions, long-term remote work or administration tasks, remote access and control is a versatile tool. Remote controlling a computer allows you to access and manage another computer from a different location. Whether you are daily providing technical support, accessing files or managing servers or will need to in the future, read up on how to remote control a computer, checking through the principal methods and their main features to find out which may be better suited to your infrastructure, usage and security requirements.

Read article →
back to top of the page icon