Methods to Enable and Disable Remote Desktop Locally
Methods to Enable and Disable Remote Desktop Locally
By default on a Windows Server Product Windows Remote Management (WinRM) is enabled, but Remote Desktop (RDP) is Disabled. On workstation operating systems neither is enabled by default.
For instructor-led Windows Server training, see our class schedule.
Enabling RDP locally.
Method 1: Graphical Interface
By far the easiest way is to enable RDP through the graphical interface.
- Launch System Properties and click Remote Settings in the left hand pane.
- Choose the Allow remote connections to this computer radial button.
- Click Select Users to add users to connect via RDP.
NOTE: By default the local Administrators group will be allowed to connect with RDP. Also the user that is currently logged in will also be allowed to connect.
- Click OK to close the interface, RDP is now enabled on the compute.
NOTE: Enabling RDP through the GIU will also configure the Windows Firewall with the appropriate ports to allow RDP connections.
NOTE: To Disable Remote Desktop select the Don’t allow remote connections to this computer radial button.
Method 2: Registry
To enable remote desktop by directly editing the registry use the following steps:
- Launch the registry editing tool by typing REGEDIT in the run.
- Navigate to the following node: HKEY_LOCAL_MACHINE\SYSTEM\CurRentControlSet\Control\Terminal Server
- Select the fDenyTSConnections Name
- Change the Data Value from 1 to 0, select OK.
NOTE: Enabling RDP through the registry will not configure the Windows Firewall with the appropriate ports to allow RDP connections.
Type the following in an administrative command prompt:
1 | Netsh advfirewall firewall set rule group=”remote desktop” new enable=yes |
NOTE: By default the local Administrators group will be allowed to connect with RDP. Also the user that is currently logged in will also be allowed to connect.
NOTE: To Disable Remote Desktop select enter 1 instead of 0.
Method 3: Command Line
To enable RDP with the Command Prompt, use the following steps.
- Launch the Command Prompt as Administrator.
- Type the following command:
1 | Reg add “HKEY_LOCAL_MACHINE\SYSTEM\CurentControlSet\Control\Terminal Server” /v fDenyTSConnections /t REG_DWORD /d 0 /f |
NOTE: Enabling RDP through the Command Prompt will not configure the Windows Firewall with the appropriate ports to allow RDP connections.
Type the following:
1 | Netsh advfirewall firewall set rule group=”remote desktop” new enable=yes |
NOTE: By default the local Administrators group will be allowed to connect with RDP. Also the user that is currently logged in will also be allowed to connect.
To disable RDP with the Command Prompt, use the following steps.
- Launch the Command Prompt as Administrator.
- Type the following command:
1 | Reg add “HKEY_LOCAL_MACHINE\SYSTEM\CurRentControlSet\Control\Terminal Server” /v fDenyTSConnections /t REG_DWORD /d 1 /f |
Method 4: Using PowerShell
To enable RDP with the PowerShell, use the following steps.
- Launch PowerShell as Administrator.
- Type the following command:
1 | Set-ItemProperty -Path "HKLM:\System\CurrentControlSet\Control\Terminal Server" -Name "fDenyTSConnections" –Value 0 |
NOTE: Enabling RDP through the Command Prompt will not configure the Windows Firewall with the appropriate ports to allow RDP connections.
Type the following:
1 | Enable-NetFirewallRule -DisplayGroup "Remote Desktop" |
NOTE: By default the local Administrators group will be allowed to connect with RDP. Also the user that is currently logged in will also be allowed to connect.
To disable RDP with the PowerShell, use the following steps.
- Launch PowerShell as Administrator.
- Type the following command:
1 | Set-ItemProperty -Path "HKLM:\System\CurrentControlSet\Control\Terminal Server" -Name "fDenyTSConnections" –Value 1 |
Until next time – Ride Safe!
Rick Trader
Windows Server Instructor – Interface Technical Training
Phoenix, AZ
You May Also Like
A Simple Introduction to Cisco CML2
0 3877 0Mark Jacob, Cisco Instructor, presents an introduction to Cisco Modeling Labs 2.0 or CML2.0, an upgrade to Cisco’s VIRL Personal Edition. Mark demonstrates Terminal Emulator access to console, as well as console access from within the CML2.0 product. Hello, I’m Mark Jacob, a Cisco Instructor and Network Instructor at Interface Technical Training. I’ve been using … Continue reading A Simple Introduction to Cisco CML2
Creating Dynamic DNS in Network Environments
0 638 1This content is from our CompTIA Network + Video Certification Training Course. Start training today! In this video, CompTIA Network + instructor Rick Trader teaches how to create Dynamic DNS zones in Network Environments. Video Transcription: Now that we’ve installed DNS, we’ve created our DNS zones, the next step is now, how do we produce those … Continue reading Creating Dynamic DNS in Network Environments
Cable Testers and How to Use them in Network Environments
0 724 1This content is from our CompTIA Network + Video Certification Training Course. Start training today! In this video, CompTIA Network + instructor Rick Trader demonstrates how to use cable testers in network environments. Let’s look at some tools that we can use to test our different cables in our environment. Cable Testers Properly Wired Connectivity … Continue reading Cable Testers and How to Use them in Network Environments
See what people are saying...