A protocol for remotely connecting to computers running Windows. Despite the name, it enables not only interaction with desktop elements, but also access to other device resources. RDP was conceived as a remote administration tool, but is often used by intruders to penetrate the target computer. By exploiting incorrectly configured RDP settings or system software vulnerabilities, cybercriminals can intercept an RDP session and log in to the system with the victim’s permissions.