Your organization operates a Windows Server 2022 VM that functions solely as an internal file server. Administrators manage the machine through a dedicated jump host and have prohibited direct console or graphical sessions. As part of an operating-system hardening checklist, you need to close any listening ports that are not essential for the server's SMB file-sharing role. Which built-in Windows feature should you disable so that TCP port 3389 stops listening on this host?
Port 3389 is the default listener for the Remote Desktop Protocol. When the Remote Desktop Services (formerly Terminal Services) feature is enabled, it opens this port so that RDP clients can connect. Disabling or removing Remote Desktop Services therefore eliminates the RDP listener and closes port 3389. The DNS Server role listens on port 53, Print and Document Services use ports such as 515 or 631, and Server Message Block (SMB) uses port 445; turning off any of those would not affect port 3389.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is port 3389 specifically associated with Remote Desktop Protocol (RDP)?
Open an interactive chat with Bash
What are the risks of keeping TCP port 3389 open unnecessarily?
Open an interactive chat with Bash
How can administrators check which ports are currently open and listening on a Windows Server?