Friday, January 20, 2017 / Azure
First of all, to all the "security" guys out there. Increasing functionality securely is the goal. Just turning all the computers off and disconnecting the internet is secure. Anyone can do that. A port number in TCP/IP is just an integer in a packet. It is NOT a new attack vector. Every protocol can run over any port, it is just a number. If you want to block something it requires more thought than just blocking a port. Ok, rant over.
In case your "security" guys think it makes sense to block outbound RDP on port 3389, I show here how we can still be functional and connect to an Azure Windows 10 VM via RDP.
You need to do 3 things and you have to be able to RDP into the system to do 2 of them. (So do from home or use Teamviewer to get out of your "secure" environment.):
Open windows Firewall on the Azure VM.
Add New Rule that allows incoming connection on port 3390 (Or any number not being used)