Description
By allowing public access (from IP 0.0.0.0/0) over the internet to RDP ports for Windows servers you are allowing attackers all over the internet to access your server and virtual instance and attempt exploitation of known vulnerabilities in operating systems or use brute force techniques to gain access to servers, data, and information systems.
Remediation
Azure Portal
- Go to Azure Portal
- Select Network Security Groups under resources
- Go to Security Group (or all groups one at a time)
- Under Settings->Inbound Security Rules
- On the right-hand pane, review the list of security rules
- Remove or update any inbound rule where incoming / ingress traffic is allowed from source IP '0.0.0.0/0' and destination port is 3389 with protocol TCP
Additional documents
https://docs.microsoft.com/en-us/azure/virtual-network/network-security-groups-overview