Zero-Day Protection
Gateway RDP Proxy
Zero-Day Shield

Shield Windows Servers from BlueKeep, DejaBlue, and All RDP Zero-Day Exploits

Microsoft (affected platform)

Protect Windows servers from RDP zero-day vulnerabilities (BlueKeep CVE-2019-0708, DejaBlue, CVE-2024-38077) with OnePAM's gateway RDP proxy. No unauthenticated RDP traffic reaches your servers.

Eliminate RDP Zero-Day Exploitation with Identity-Based Access

Remote Desktop Protocol (RDP) is the most exploited remote access protocol in enterprise environments. Critical zero-day vulnerabilities like BlueKeep (CVE-2019-0708), DejaBlue (CVE-2019-1181/1182), and the Windows Licensing Service RCE (CVE-2024-38077) enable remote code execution against Windows servers — often without any authentication. Ransomware groups, nation-state actors, and automated exploit kits use RDP as their primary initial access vector. The fundamental problem is architectural: RDP exposes a complex protocol parser to the network, and every parsing bug becomes a pre-auth RCE. Patching helps, but zero-days by definition are exploited before patches exist. The only durable solution is to ensure that no unauthenticated RDP traffic ever reaches your servers. OnePAM's gateway RDP proxy provides exactly this. By placing a OnePAM gateway in front of your Windows servers and network-isolating the RDP ports, you create an identity-verification layer that attackers cannot bypass.

Gateway RDP Proxy

Run a dedicated OnePAM gateway with native RDP protocol support. Users authenticate via SAML/OIDC at the gateway, which brokers the RDP session using Kerberos NLA. No agent needed on target servers.

The RDP Zero-Day Threat Landscape

Without identity-based RDP access, these risks threaten your Windows servers every day.

BlueKeep (CVE-2019-0708): Wormable pre-auth RCE affecting Server 2008/2008R2/2012/Win7 — millions of servers
DejaBlue (CVE-2019-1181/1182): Pre-auth RCE in RDP Gateway on Server 2012+, more modern than BlueKeep
CVE-2024-38077: RCE in Windows Licensing Service via RDP — affects Server 2019 and 2022
RDP brute-force remains the #1 initial access vector in over 50% of ransomware incidents globally

RDP Security Challenges

These are the risks organizations face with traditional RDP authentication.

Zero-Day by Definition

Zero-days are exploited before patches exist. No amount of patching eliminates the risk of the next undiscovered RDP vulnerability.

Complex Protocol Surface

RDP is a complex protocol with dozens of channels, codecs, and extensions. Every component is a potential attack surface for pre-auth exploitation.

Slow Enterprise Patching

Enterprise patch cycles for Windows servers take weeks or months. During this window, every unpatched server is vulnerable to known exploits.

Network Exposure

Many organizations expose RDP directly to the internet or broadly within the corporate network. Any exposed RDP port is a target.

NLA Is Not Enough

Network Level Authentication (NLA) requires credentials but doesn't prevent all pre-auth attacks. Some CVEs target the NLA negotiation itself.

VPN Doesn't Solve It

VPN provides network access, but a compromised VPN endpoint can still exploit RDP zero-days on internal servers. Identity-based access is required.

How OnePAM Prevents RDP Zero-Day Exploitation

Step-by-step guide to deploying identity-based Windows RDP access.

1

Deploy OnePAM Gateway

Deploy a OnePAM gateway as the exclusive entry point for RDP access to your Windows server fleet.

The gateway runs on hardened infrastructure and exposes only the OnePAM authentication interface — not the RDP protocol.
2

Network-Isolate All RDP Ports

Configure firewall rules so Windows server RDP ports (3389) are only reachable from the OnePAM gateway.

Exploit payloads — no matter how sophisticated — cannot reach the target service.
3

Require Identity Verification

Every RDP connection requires SAML/OIDC authentication via your corporate IdP with MFA enforcement.

No anonymous traffic passes through.
4

Inspect and Proxy RDP Traffic

OnePAM inspects RDP protocol traffic before forwarding to the target server, filtering malformed requests.

The gateway validates RDP protocol compliance, drops malformed packets, and ensures only clean, authenticated RDP sessions reach target servers.
5

Record and Audit Everything

Every RDP session is visually recorded with full identity context for forensics and compliance.

Session recordings provide evidence of who accessed affected servers, when, and what they did.

Why Gateway-Based RDP Protection Works

Measurable security and operational outcomes from deploying OnePAM Windows RDP SSO.

Exploit Delivery Impossible

RDP ports are network-isolated. Exploit payloads — BlueKeep, DejaBlue, or future zero-days — physically cannot reach the RDP service.

100% exploit delivery prevented

Patch on Your Schedule

When a new RDP CVE drops, you're not in emergency mode. OnePAM shields servers while you test and deploy patches at your pace.

No more emergency patching

Eliminate RDP Brute-Force

No RDP login interface is exposed. Brute-force tools have nothing to target.

Zero brute-force surface

Works for Any Windows Version

Gateway mode protects Server 2008 R2, 2012, 2016, 2019, and 2022 equally. One solution for your entire Windows fleet.

All Windows versions protected

Session Recording for IR

If a breach occurs, session recordings provide complete forensic evidence of all RDP activity.

Forensic-ready recordings

Compliance Compensating Control

PCI DSS, SOC 2, HIPAA, and ISO 27001 accept gateway-based access controls as compensating controls for RDP risk.

Audit-ready documentation

Windows RDP SSO Capabilities

Every feature needed for enterprise-grade Windows RDP authentication.

Native RDP protocol implementation
Gateway-based RDP isolation — no direct RDP exposure
Kerberos NLA authentication with Protected User enforcement
SAML/OIDC SSO via any corporate IdP
MFA enforcement before RDP session creation
RDP protocol inspection and filtering
Visual session recording at the gateway
Supports all Windows Server versions (2008 R2 through 2022)
Time-limited access windows
Compliance reporting and compensating control documentation

Zero-Day Protection Features

Enterprise-grade security controls for RDP access.

Native RDP protocol stack with hardened implementation
Kerberos NLA blocks NTLM downgrade attacks
Complete network isolation of RDP ports
Gateway-enforced identity verification
Pre-auth RDP exploits blocked by architecture
Automatic session termination

RDP Zero-Day Protection Use Cases

Common scenarios where organizations deploy OnePAM Windows RDP SSO.

1
Protecting the entire Windows server fleet from the next RDP zero-day vulnerability
2
Shielding end-of-life servers (2008 R2, 2012) from BlueKeep and DejaBlue with gateway isolation
3
Eliminating RDP brute-force as a ransomware initial access vector
4
Meeting PCI DSS and SOC 2 requirements for RDP access controls and monitoring
5
Providing a compensating control for unpatched Windows servers during testing cycles
6
Reducing cyber insurance premiums by documenting RDP gateway isolation controls

RDP Zero-Day & BlueKeep Protection FAQ

Common questions about Windows RDP SSO and zero-day protection.

How does OnePAM actually prevent BlueKeep exploitation?

BlueKeep requires sending specially crafted RDP packets to port 3389 on a vulnerable server. With OnePAM, port 3389 is only reachable from the gateway — not from the network. Attackers cannot send BlueKeep exploit payloads to the server because the port is unreachable.

Does OnePAM inspect the RDP protocol for exploit signatures?

OnePAM performs protocol-level validation but is not a signature-based IDS. Its protection is architectural — by preventing unauthenticated traffic from reaching RDP, it blocks all current and future pre-auth exploits regardless of their signature.

Does this work with cloud Windows servers (Azure, AWS)?

Yes. OnePAM gateway can protect Windows VMs on Azure, AWS, GCP, or any cloud. Deploy the gateway in the same VNet/VPC and restrict the Windows VM's security group to only accept RDP from the gateway.

How does this compare to using a VPN for RDP access?

VPN provides network-level access but doesn't authenticate individual RDP sessions, doesn't record sessions, and doesn't prevent post-VPN lateral movement via RDP exploits. OnePAM provides session-level identity verification, MFA, recording, and protocol inspection.

Stop Waiting for the Next RDP Zero-Day.

OnePAM's gateway RDP proxy makes RDP exploits architecturally impossible. No patching race. No brute-force surface. Identity-verified access only.