Protect Remote Desktop

Protect Remote Desktop Services against BlueKeep/DejaBlue exploits

What is BlueKeep?

BlueKeep is a dangerous vulnerability in the Windows Remote Desktop Service.

Why BlueKeep is dangerous?

BlueKeep exploit allows a remote code execution without authentication.
Any PC with active Remote Desktop may be exploited remotely!
This is a "wormable" vulnerability. A "worm" virus quickly spreads across a local network.

BlueKeep affects Windows 7, Windows Server 2008, and Windows Server 2008 R2.

BlueKeep was reported in May 2019 and patched by Microsoft on May 14.

Download Patch

What is DejaBlue?

"DejaBlue" is a code name for several vulnerabilities in the Microsoft Remote Desktop Services: CVE-2019-1181, CVE-2019-1182.

"DejaBlue" was discovered on 13 August 2019. It affects all recent versions of the operating system up to Windows 10, as well as the older Windows versions.

Download Patch: CVE-2019-1181

Download Patch: CVE-2019-1182

What's next?

There is no guarantee that all bugs fixed.

You can not feel safe!

You should configure your system to stay away from new attacks.

The best way:
Disable Remote Desktop Services if they are not required!

If you use Remote Desktop Services every day, use a workaround:
Enable Network Level Authentication (NLA)

With NLA turned on, an attacker would first need to be authenticated using a valid account.

How Desktop Secret Lock helps you?

A visual indicator on the main screen shows the current status of Remote Desktop Services protection.

Click on an indicator to display options:

  1. Fully Disable Remote Desktop Services - Recommended!
  2. Keep Remote Desktop with Enabled Network Level Authentication (NLA) - Medium Security.
  3. Use Open Remote Desktop without Protection - Low Security.

Download Desktop Secret Lock


Need Help?

  1. Read Frequently Asked Questions.
  2. Submit your question to our Visit the Support Center.
Add or See Comments (>10)