Policy Expert

RDP: Do Not Allow COM Port Redirection – The Policy Expert

Reading time: 3 Minutes Read
Roy Ludmir
Updated on: September 28, 2025
RDP: Do Not Allow COM Port Redirection – The Policy Expert

Do not allow COM port redirection in RDP is a security setting stated in Windows servers’ CIS benchmarks/STIGs. A COM port is an I/O interface that enables the connection of a serial device to a computer. In some cases, COM ports are also referred to as “serial ports”. Most computers are no longer equipped with COM ports, but many serial port devices are still used in computer networks. The COM port can refer not only to physical ports but also to emulated ports, such as ports created by Bluetooth or USB-to-serial adapters.

What You Will Learn

  • What is this policy
  • What are the policy’s vulnerabilities
  • Are there available countermeasures
  • How to mitigate the vulnerability
  • Configuring the policy

What is the Do Not Allow COM Port Redirection Policy

This server hardening policy setting determines whether data redirection to client COM ports from the remote computer is allowed in the RDP session. By default, RDP allows COM port redirection. It can be used, for example, to use a USB dongle in an RDS session.

Policy Vulnerabilities

When not enabled, users can redirect data to COM port peripherals or map the local COM ports while using the Remote Desktop Service session.

As stated by MITRE ATT&CK, port redirection can lead to protocol tunneling- Adversaries may tunnel network communication to and from a victim system within a separate protocol to avoid detection/network filtering and/or enable access to otherwise unreachable systems. Tunneling involves

explicitly encapsulating a protocol within another. This behavior may conceal malicious traffic by blending in with existing traffic and/or provide an outer layer of encryption (similar to a VPN). Tunneling could also enable the routing of network packets that would otherwise not reach their intended destination, such as SMB, RDP, or other traffic that would be filtered by network appliances or not routed over the Internet. T-1572

Available Counter Measures

Enable this object wherever possible. If the status is set to Disabled, Remote Desktop Services always allows COM port redirection. If the status is set to Not Configured, COM port redirection is not specified at the Group Policy level. However, an administrator can still disable COM port redirection using the Remote Desktop Session Host Configuration tool.

POTENTIAL IMPACT

RDP users won’t be able to access a client’s COM port peripherals, such as USB dongles and Bluetooth.

CALCOM’S RECOMMENDED VALUE

Enable

Configuring: Do not allow COM port redirection

1. Press Windows Logo+R, type gpedit.msc, and press Enter.

2. Click the arrow next to Computer Configuration under Local Computer Policy to expand it.

3. Click the arrow next to Administrative Templates to expand it.

4. Click All Settings to show all group policy settings.

5. Scroll down to Do not allow COM port redirection and double-click on it to view the setting.

6. Ensure the policy isn’t Disabled and click OK. (Enabled must be selected).

Key Takeaways

  • RDP is a common attack vector.
  • Hackers exploit misconfigured RDP installations.
  • Port redirection can lead to protocol tunneling.
  • The best countermeasure is to disable this functionality.
  • Use Group policies as your frontline defense.

CalCom’s RDP Hardening Solution

Attackers actively exploit weak RDS configurations, turning simple missteps into full-scale breaches. CalCom hardening solution (CHS) is a hardening automation tool designed to help IT infrastructure teams automate hardening procedures. With CHS, you can automatically enforce secure RDS policies, eliminate misconfigurations, and maintain compliance with CIS Benchmarks, PCI DSS, HIPAA, and more—without disrupting operations.

FAQs

What is RDS hardening?
The process of reducing misconfigurations and vulnerabilities through policies and best practices.
Why is RDS a common attack vector?
RDP is widely used for remote access, making it a frequent target for exploits like BlueKeep, DejaBlue, and misused redirection features.
What settings should be disabled for security?
Trun off Clipboard redirection, client printer redirection, and unused device to reduce attack surfaces.
Can RDS hardening be automated?
Yes, automation tools like CalCom Hardening Suite (CHS) enforce secure baselines, reduce manual errors, and simplify compliance.
Roy Ludmir
Roy Ludmir is a cybersecurity entrepreneur and CEO with over 15 years of experience driving product innovation and sales growth in the security industry. He is highly skilled in CIS Benchmarks, baseline hardening, and vulnerability management, helping organizations strengthen defenses and meet compliance requirements. With a unique blend of executive leadership and deep technical expertise, he bridges business strategy with practical security solutions.

Related Articles

About Us

Established in 2001, CalCom is the leading provider of server hardening solutions that help organizations address the rapidly changing security landscape, threats, and regulations. CalCom Hardening Suite (CHS) is a security baseline hardening solution that eliminates outages, reduces operational costs, and ensures a resilient, constantly hardened, and monitored server environment.

More about us
Background Shape
About Us

Stay Ahead with Our Newsletter

Get the latest insights, security tips, and exclusive resources straight to your inbox every month.

    Ready to simplify compliance?

    See automated compliance in action—book your demo today!