Table of Contents
  • The Users Whitelist option was added: The Administrator can add/remove users from the whitelist under the Settings and License tile > Users Whitelist:

Users on the whitelist are now ignored by RDS-Knight and t heir settings will not be applied .The user downloading the setup or updating the software from a previous version will be automatically added to the whitelist.

  • The Brute-Force Attacks Defender was updated to its latest version and the user interface is now fully integrated.
  • Homeland Access Protection : countries are now sorted alphabetically
  • Uninstallation : all RDS-Knight files are now removed when uninstalling the product (and users settings are reset)
  • New "Security Essentials" edition : lower pricing, without the One click to Secure Desktop and the Endpoint protection features, no users/groups selection (settings apply to all users)
  • IP to Countries list and translations were updated.

→ Back to the Release Notes

Related Posts

RD Tools Software

"Enhancing RDS Security: Integrating Windows Server Update Services with Advanced Security Measures"

As cyber threats grow in sophistication, combining WSUS (Windows Server Update Services) with RDS Tools Advanced Security tools has become essential for comprehensive protection. Explore how Windows Server Update Services supports RDS environments, its limitations in addressing modern security challenges, and re-visit how integration with robust cybersecurity solutions, such as RDS Advanced Security, enhances protection. Then finish with best practices for IT teams to effectively implement this comprehensive server and network security approach.

Read article →
RD Tools Software

"How to Remote Control a Computer: Choosing the Best Tools"

For quick support sessions, long-term remote work or administration tasks, remote access and control is a versatile tool. Remote controlling a computer allows you to access and manage another computer from a different location. Whether you are daily providing technical support, accessing files or managing servers or will need to in the future, read up on how to remote control a computer, checking through the principal methods and their main features to find out which may be better suited to your infrastructure, usage and security requirements.

Read article →
back to top of the page icon