Enable Remote Desktop registry

By default on a Windows Server Product Windows Remote Management [WinRM] is enabled, but Remote Desktop [RDP] is Disabled.  On workstation operating systems neither is enabled by default.

For instructor-led Windows Server training, see our class schedule. 

Enabling RDP locally.

Method 1:  Graphical Interface

By far the easiest way is to enable RDP through the graphical interface.

  1. Launch System Properties and click Remote Settings in the left hand pane.
  2. Choose the Allow remote connections to this computer radial button.
  3. Click Select Users to add users to connect via RDP.

NOTE:  By default the local Administrators group will be allowed to connect with RDP.  Also the user that is currently logged in will also be allowed to connect.

  1. Click OK to close the interface, RDP is now enabled on the compute.

NOTE:  Enabling RDP through the GIU will also configure the Windows Firewall with the appropriate ports to allow RDP connections.

NOTE:  To Disable Remote Desktop select the Don’t allow remote connections to this computer radial button.

Method 2:  Registry

To enable remote desktop by directly editing the registry use the following steps:

  1. Launch the registry editing tool by typing REGEDIT in the run.
  2. Navigate to the following node: HKEY_LOCAL_MACHINE\SYSTEM\CurRentControlSet\Control\Terminal Server
  3. Select the fDenyTSConnections Name

  1. Change the Data Value from 1 to 0, select OK.

NOTE:  Enabling RDP through the registry will not configure the Windows Firewall with the appropriate ports to allow RDP connections.

Type the following in an administrative command prompt:

Netsh advfirewall firewall set rule group=”remote desktop” new enable=yes

Netsh advfirewall firewall set rule group=”remote desktop new enable=yes

NOTE:  By default the local Administrators group will be allowed to connect with RDP.  Also the user that is currently logged in will also be allowed to connect.

NOTE:  To Disable Remote Desktop select enter 1 instead of 0.

Method 3:  Command Line

To enable RDP with the Command Prompt, use the following steps.

  1. Launch the Command Prompt as Administrator.
  2. Type the following command:

Reg add “HKEY_LOCAL_MACHINE\SYSTEM\CurentControlSet\Control\Terminal Server”  /v fDenyTSConnections /t REG_DWORD /d 0 /f

Reg add HKEY_LOCAL_MACHINE\SYSTEM\CurentControlSet\Control\Terminal Server”  /v fDenyTSConnections /t REG_DWORD /d 0 /f

NOTE:  Enabling RDP through the Command Prompt will not configure the Windows Firewall with the appropriate ports to allow RDP connections.

Type the following:

Netsh advfirewall firewall set rule group=”remote desktop” new enable=yes

Netsh advfirewall firewall set rule group=”remote desktop new enable=yes

NOTE:  By default the local Administrators group will be allowed to connect with RDP.  Also the user that is currently logged in will also be allowed to connect.

To disable RDP with the Command Prompt, use the following steps.

  1. Launch the Command Prompt as Administrator.
  2. Type the following command:

Reg add “HKEY_LOCAL_MACHINE\SYSTEM\CurRentControlSet\Control\Terminal Server”  /v fDenyTSConnections /t REG_DWORD /d 1 /f

Reg add HKEY_LOCAL_MACHINE\SYSTEM\CurRentControlSet\Control\Terminal Server”  /v fDenyTSConnections /t REG_DWORD /d 1 /f

Method 4:  Using PowerShell

To enable RDP with the PowerShell, use the following steps.

  1. Launch PowerShell as Administrator.
  2. Type the following command:

Set-ItemProperty -Path "HKLM:\System\CurrentControlSet\Control\Terminal Server" -Name "fDenyTSConnections" –Value 0

Set-ItemProperty -Path "HKLM:\System\CurrentControlSet\Control\Terminal Server" -Name "fDenyTSConnections" Value 0

NOTE:  Enabling RDP through the Command Prompt will not configure the Windows Firewall with the appropriate ports to allow RDP connections.

Type the following:

Enable-NetFirewallRule -DisplayGroup "Remote Desktop"

Enable-NetFirewallRule -DisplayGroup "Remote Desktop"

NOTE:  By default the local Administrators group will be allowed to connect with RDP.  Also the user that is currently logged in will also be allowed to connect.

To disable RDP with the PowerShell, use the following steps.

  1. Launch PowerShell as Administrator.
  2. Type the following command:

Set-ItemProperty -Path "HKLM:\System\CurrentControlSet\Control\Terminal Server" -Name "fDenyTSConnections" –Value 1

Set-ItemProperty -Path "HKLM:\System\CurrentControlSet\Control\Terminal Server" -Name "fDenyTSConnections" Value 1

Until next time – Ride Safe!

Rick Trader
Windows Server Instructor – Interface Technical Training
Phoenix, AZ

Subscribe to this author's posts feed via RSS

Video liên quan

Chủ Đề