MAIN MENU
Devolutions Blog

Announcements, updates, and insights from Devolutions.

Products
Rdm security dashboard devolutions blog remote desktop manager

Spotlight on: Remote Desktop Manager security dashboard

The RDM security dashboard centralizes security monitoring and enforcement, enabling administrators to identify and address vulnerabilities to improve security posture.

Photo of Marc Beausejour Marc Beausejour

As organizations grow increasingly reliant on digital tools and infrastructure, the importance of maintaining robust security controls cannot be overstated. Remote Desktop Manager (RDM) offers various security features, and one of the most powerful tools administrators can leverage to ensure that RDM is used securely is its security dashboard. This blog will explore RDM’s security dashboard in detail — what it consists of, the features it offers, the advantages of using it, and how to effectively navigate it.

What is the RDM security dashboard?

The RDM security dashboard is a centralized interface within Remote Desktop Manager that provides a comprehensive overview of the security status of your RDM environment. It serves as a control center where administrators can identify vulnerabilities, enforce security policies, and ensure that users are following best practices when using RDM. This tool simplifies the process of managing, monitoring, and configuring security settings to address security concerns with ease.

Key features of the RDM security dashboard

Security score

Security issues list

Advantages of using the RDM security dashboard

How to use the RDM security dashboard

  1. Access the security dashboard: To begin using the security dashboard, simply navigate to the Reports tab within RDM. Once there, you’ll notice the local and remote security dashboards. The local dashboard is for RDM-related security settings and the remote dashboard is for the data source’s security settings. With these dashboards, you can see the overall security score of your RDM and Devolutions Server environments, which provides a quick snapshot of your current security health. Below is an example of the security dashboard in DVLS (Looking for additional tips for improving security in DVLS? Check out our documentation.)

Devolutions Server security dashboard in RDM

And here’s an example of the local RDM security dashboard using a SQLite database file.

Local RDM security dashboard

  1. Review security issues: Review the list of identified security risks and vulnerabilities. Since each issue is assigned a severity rating, you can start by addressing the most critical items, such as unencrypted communication channels or accounts without MFA. Selecting any issue provides detailed instructions on how to resolve it.

  2. Enforce security policies: From the dashboard, you can configure and enforce security policies for RDM and/or your data source. For example, you can set up a password policy that requires all users to create strong, complex passwords. Policies can also be enforced for MFA, encryption, and user permissions.

  3. Audit your environment and generate reports: Use the security dashboard to audit the security configurations of your RDM environment. View which policies are in place, what security issues have been resolved, and which ones still require attention. These items can be useful for compliance audits or for internal review.

Improve your security posture

The RDM security dashboard is an indispensable tool for organizations that prioritize security and compliance. By centralizing security monitoring, automating policy enforcement, and offering real-time insights, the dashboard enables administrators to take control of the application’s security landscape with ease. The detailed security score and issues list provide a clear path for improving the overall security posture of your RDM environment, while customizable alerts and audit logs ensure that no vulnerability goes unchecked.

For more info on using the RDM security dashboard, check out our official documentation.

More from Products

Read more articles