If used to access a server remotely, yes. Those don’t bypass the infrastructure for how remote access works.