Remote protocols are communication protocols that can be used to remotely control or manage computers, servers, or other IT systems over a network. They allow access to devices as if you were sitting directly in front of them – even though they are physically distant.
Remote protocols govern the way data is exchanged between a client (the device requesting access) and a server (the remote target device). Well-known examples of remote protocols are:
RDP (Remote Desktop Protocol) – commonly used on Windows to access remote desktops.
SSH (Secure Shell) – is used to securely control servers via the command line, especially in Linux environments.
VNC (Virtual Network Computing) – allows remote control of computers via graphical interfaces.
Telnet – an older protocol that is hardly used today because it does not offer encryption.
Remote protocols allow IT administrators to configure servers, troubleshoot or install software – without being on-site. Employees working from home or on business trips can also access their office computers via remote protocols.
In IT support, when technicians solve a problem on their own computer via remote access.
In server administration, e.g. when installing updates on a web server.
In the home office, when you access the workstation in the office via remote desktop.
In the remote maintenance of machines, for example in industry or POS systems.
Because remote protocols allow direct access, they are popular among cybercriminals. They should therefore always be secured with strong passwords, two-factor authentication and – if possible – with encrypted protocols such as SSH or RDP via VPN.