RDM Field Guide

Security routine

Remote Desktop Manager Hardening Runbook

This runbook helps teams review Remote Desktop Manager permission boundaries, privileged credential placement, shared data source ownership, and technician handoff notes.

This site is independent and is not affiliated with, endorsed by, or sponsored by Devolutions. Remote Desktop Manager is referenced only to describe compatible workflows.

Hardening checks by operating layer

Identity layer
Confirm that team roles match actual support duties and that privileged entries are not visible to broad technician groups.
Vault layer
Review shared vault boundaries, archived entries, stale connection folders, and unclear credential labels.
Data source layer
Document who owns the shared data source, who approves schema or backup changes, and how outage notes are communicated.
Handoff layer
Check that session documentation explains purpose, owner, access risk, and escalation path for sensitive connections.

Quarterly review board

QuestionEvidence to collectOutcome
Who can view privileged entries?Role list, vault membership, access notesRemove broad access and document exceptions
Which connections are stale?Owner review, last-use context, retired systems listArchive or relabel entries before they confuse the team
Where are handoff notes missing?Session notes, escalation records, ticket referencesAdd short operational notes beside the connection path