![]() Open the Remote Settings tab and enable the Allow remote connection to this computer option. Step 4 Allow Port 3389 (Remote Desktop Port) through Windows Firewall. Step 3 Enable Network Level Authentication for Remote Connections. Step 2 Enable Allow users to connect remotely by using Remote Desktop Services. Step 1 Create a GPO to Enable Remote Desktop. ![]() To enable preset firewall rules of RemoteDesktop, use the following PowerShell command: Enable-NetFirewallRule -DisplayGroup Remote Desktop or from CMD, append powershell.exe in the beginning: powershell. Steps to Enable Remote Desktop Using Group Policy. Net localgroup “Remote Desktop Users” /add (non admin) AAD users will be able to connect to other systems using RDP. Open the system properties in the Control Panel or run the SystemPropertiesRemote command. By default, you might find RDP firewall rules disabled which prevent RDP connections to the server. Note that the same can be done by running the follow command from an elevated Command Prompt: By default Windows, Server 2019 RDS Server comes with the PowerShell module installed. Going into Computer Management, we see that it shows up in the UI as well: Validate the creation of firewall rules Following the selection of Allow remote connections to this computer, a window opens indicating that exceptions in the firewall have been enabled, click OK. Here we see that my AAD account was added successfully. In the Remote Desktop section, on the Remote Usage tab of the system properties, select Allow remote connections to this computer. Get-LocalGroupMember -Group “Remote Desktop Users” ![]() Open up an elevated PowerShell and run the following command:Īdd-LocalGroupMember -Group “Remote Desktop Users” -Member using the following PowerShell command, check the group membership: Well, lucky for you, PowerShell is your friend (BTW – PowerShell is always your friend). Not so fast in an AAD only environment as we run into the same issue we did in the previous post. In a domain environment, this is simple – open up Computer Management, find the Remote Desktop Users Group and add the necessary domain users to the group. PowerShell remoting is enabled by default on Windows Server platforms. WS-Management based PowerShell remoting is currently supported only on Windows platform. ![]() There was a need for some of the (non admin) remote users to be able to remote into a Windows 10 system at the main office so they could run a client-server application that does not run well across the WAN. The Enable-PSRemoting cmdlet configures the computer to receive PowerShell remote commands that are sent by using the WS-Management technology. In my last post, How to create a network share in an AAD only environment, I mentioned how I have been doing some side projects for a friend’s small business and using Microsoft 365 Business to manage the Windows 10 environment. ![]()
0 Comments
Leave a Reply. |