There are many organizations concerned with the critical Microsoft Security Bulletin MS12-020 Remote Desktop Protocol (RDP) vulnerability. Here is a quick way to check if you have Remote Desktop Protocol running on your system or network. I used NMAP to check my home network.

In the highlighted text below you can see that NMAP can check for the RDP service running. If you can't patch, this is important because attackers won't be able to exploit MS12-020 with the service closed. It's just basic information security hygiene to disable services that you don't need.

If you must run RDP, you'll have to patch this soon. To verify patches actually worked, you'll need a vulnerability scanner. You can download Nexpose Community Edition for free here:  Free Vulnerability Scanner Download | Rapid7

It is important to note that RDP can run on any port, but TCP Port 3389 is the default.

To check one system:

mjc@msfdev:~$ nmap 192.168.1.105 -p 3389  
  
Starting Nmap 5.21 ( http://nmap.org ) at 2012-03-13 16:59 CDT  
Nmap scan report for 192.168.1.105  
Host is up (0.00035s latency).  
PORT     STATE SERVICE  
3389/tcp open  ms-term-serv  
  
Nmap done: 1 IP address (1 host up) scanned in 0.10 seconds  
mjc@msfdev:~$  

To check a network range:

mjc@msfdev:~$ nmap 192.168.1.0/24 -p 3389                                                  
Starting Nmap 5.21 ( http://nmap.org ) at 2012-03-13 17:07 CDT    
Nmap scan report for 192.168.1.1  
Host is up (0.0065s latency).  
PORT     STATE  SERVICE  
3389/tcp closed ms-term-serv  
  
<SNIP>  
  
Nmap done: 256 IP addresses (10 hosts up) scanned in 10.75 seconds  
mjc@msfdev:~$