Wednesday, April 16, 2025
HomeBrowserActivating Incognito Mode in RDP to Erase All Traces

Activating Incognito Mode in RDP to Erase All Traces

Published on

SIEM as a Service

Follow Us on Google News

The Remote Desktop Protocol (RDP) is a widely used tool for remote access, but it often leaves behind traces of user activity, which can be a concern for privacy and security.

Recently, the use of the “/public” command-line option in MSTSC, the RDP client, has gained attention for its ability to activate a “public mode,” similar to incognito mode in web browsers.

This feature is particularly useful on shared or public computers where users want to prevent the storage of credentials, session details, and cached images.

- Advertisement - Google News

Understanding RDP Public Mode

When the public mode is enabled, MSTSC prevents several key features from storing data locally.

Incognito Mode
public mode

For instance, connection settings are not saved to the hidden Default.rdp file, which is typically used to store such information.

Additionally, credential caching is disabled, meaning that users will be prompted for credentials each time they connect, even if they have previously connected to the same server.

This is crucial for maintaining privacy, as saved credentials can be listed using commands like cmdkey /list | ? { $_ -Match "TERMSRV/" } and can be a security risk if accessed by unauthorized parties.

Another significant aspect affected by public mode is the persistent bitmap cache.

According to the Devolution Blog Report, this cache stores bitmap fragments from previous sessions to improve performance by reusing cached images instead of resending them.

However, public mode disables this feature, which can be beneficial for privacy but may slightly impact performance.

The cache files, such as bcache24.bmc and Cache0000.bin, are stored under %LOCALAPPDATA%\Microsoft\Terminal Server Client\Cache, and while they can provide valuable forensic information, they are not a reliable method for reconstructing past sessions.

Impact on Forensic Analysis and Security

For forensic analysts, the traces left behind by RDP can be invaluable in investigating malicious activities.

Incognito Mode
Microsoft RDP

However, with public mode enabled, these traces are significantly reduced.

Features like the most recently used (MRU) server list, server username hints, and server certificate exceptions are all disabled, preventing them from being stored in the registry.

This makes it more challenging for forensic analysts to track user activity but enhances privacy and security for legitimate users.

In terms of security, public mode also disables the “Don’t ask me again for connections to this computer” checkbox, which is often used to bypass certificate warnings.

This ensures that users are always prompted to verify server authenticity, reducing the risk of connecting to untrusted servers.

Overall, activating public mode in RDP provides a robust way to maintain privacy and security on shared computers by minimizing the data left behind after each session.

While it may slightly impact performance due to the lack of cached images, the benefits in terms of security and privacy make it a valuable tool for users concerned about leaving digital footprints.

Collect Threat Intelligence on the Latest Malware and Phishing Attacks with ANY.RUN TI Lookup -> Try for free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Microsoft Teams File Sharing Unavailable Due to Unexpected Outage

Microsoft Teams users across the globe are experiencing significant disruptions in file-sharing capabilities due...

Cloud Misconfigurations – A Leading Cause of Data Breaches

Cloud computing has transformed the way organizations operate, offering unprecedented scalability, flexibility, and cost...

Security Awareness Metrics That Matter to the CISO

Security awareness has become a critical component of organizational defense strategies, particularly as companies...

New ‘Waiting Thread Hijacking’ Malware Technique Evades Modern Security Measures

Security researchers have unveiled a new malware process injection technique dubbed "Waiting Thread Hijacking"...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Microsoft Teams File Sharing Unavailable Due to Unexpected Outage

Microsoft Teams users across the globe are experiencing significant disruptions in file-sharing capabilities due...

Cloud Misconfigurations – A Leading Cause of Data Breaches

Cloud computing has transformed the way organizations operate, offering unprecedented scalability, flexibility, and cost...

Security Awareness Metrics That Matter to the CISO

Security awareness has become a critical component of organizational defense strategies, particularly as companies...