Table of Contents

Why Enable Remote Desktop on Windows Server 2022?

Remote Desktop Protocol (RDP) is a powerful tool for accessing Windows servers from remote locations. It allows administrators to perform system maintenance, deploy applications, and troubleshoot issues without physical access to the server. By default, Remote Desktop is disabled on Windows Server 2022 for security purposes, necessitating deliberate configuration to enable and secure the feature.

RDP also simplifies collaboration by enabling IT teams to work on the same server environment simultaneously. Additionally, businesses with distributed workforces depend on RDP for efficient access to centralized systems, boosting productivity while reducing infrastructure costs.

Methods to Enable Remote Desktop

There are several ways to enable Remote Desktop in Windows Server 2022, each tailored to different administrative preferences. This section explores three primary methods: the GUI, PowerShell, and Remote Desktop Services (RDS). These approaches ensure flexibility in configuration while maintaining high standards of precision and security.

Enabling Remote Desktop via the Server Manager (GUI)

Step 1: Launch Server Manager

The Server Manager is the default interface for managing Windows Server roles and features. Open it by:

  • Clicking the Start Menu and selecting Server Manager.
  • Alternatively, use the Windows + R key combination, type ServerManager, and press Enter.

Step 2: Access Local Server Settings

Once in Server Manager:

  • Navigate to the Local Server tab in the left-hand menu.
  • Locate the "Remote Desktop" status, which typically shows "Disabled."

Step 3: Enable Remote Desktop

  • Click on "Disabled" to open the System Properties window in the Remote tab.
  • Select Allow remote connections to this computer.
  • For enhanced security, check the box for Network Level Authentication (NLA), requiring users to authenticate before accessing the server.

Step 4: Configure Firewall Rules

  • A prompt will appear to enable the firewall rules for Remote Desktop. Click OK.
  • Verify the rules in the Windows Defender Firewall settings to ensure port 3389 is open.

Step 5: Add Authorized Users

  • By default, only administrators can connect. Click Select Users... to add non-administrator accounts.
  • Use the Add Users or Groups dialog to specify usernames or groups.

Enabling Remote Desktop via PowerShell

Step 1: Open PowerShell as Administrator

  • Use the Start Menu to search for PowerShell.
  • Right-click and select Run as Administrator.

Step 2: Enable Remote Desktop via Registry

  • Run the following command to modify the registry key controlling RDP access:
  • Set-ItemProperty -Path 'HKLM:\System\CurrentControlSet\Control\Terminal Server' -Name "fDenyTSConnections" -Value 0

Step 3: Open the Necessary Firewall Port

  • Allow RDP traffic through the firewall with:
  • Enable-NetFirewallRule -DisplayGroup "Remote Desktop"

Step 4: Test Connectivity

  • Use PowerShell’s built-in networking tools to verify:
  • Test-NetConnection -ComputerName -Port 3389

Installing and Configuring Remote Desktop Services (RDS)

Step 1: Add the RDS Role

  • Open Server Manager and select Add roles and features.
  • Proceed through the wizard, selecting Remote Desktop Services.

Step 2: Configure RDS Licensing

  • During the role setup, specify the licensing mode: Per User or Per Device.
  • Add a valid license key if required.

Step 3: Publish Applications or Desktops

  • Use the Remote Desktop Connection Broker to deploy remote apps or virtual desktops.
  • Ensure users have appropriate permissions to access published resources.

Securing Remote Desktop Access

While enabling Remote Desktop Protocol (RDP) on Windows Server 2022 provides convenience, it can also introduce potential security vulnerabilities. Cyber threats like brute-force attacks, unauthorized access, and ransomware often target unsecured RDP setups. This section outlines best practices to secure your RDP configuration and protect your server environment.

Enable Network Level Authentication (NLA)

Network Level Authentication (NLA) is a security feature that requires users to authenticate before a remote session is established.

Why Enable NLA?

  • It minimizes exposure by ensuring only authorized users can connect to the server.
  • NLA reduces the risk of brute-force attacks by blocking unauthenticated users from consuming server resources.

How to Enable NLA

  • In the System Properties window under the Remote tab, check the box for Allow connections only from computers running Remote Desktop with Network Level Authentication.
  • Ensure client devices support NLA to avoid compatibility issues.

Restrict User Access

Limiting who can access the server via RDP is a critical step in securing your environment.

Best Practices for User Restrictions

  • Remove Default Accounts: Disable or rename the default Administrator account to make it harder for attackers to guess credentials.
  • Use the Remote Desktop Users Group: Add specific users or groups to the Remote Desktop Users group. Avoid granting remote access to unnecessary accounts.
  • Audit User Permissions: Regularly review which accounts have RDP access and remove outdated or unauthorized entries.

Enforce Strong Password Policies

Passwords are the first line of defense against unauthorized access. Weak passwords can compromise even the most secure systems.

Key Elements of a Strong Password Policy

  • Length and Complexity: Require passwords to be at least 12 characters long, including uppercase letters, lowercase letters, numbers, and special characters.
  • Expiration Policies: Configure policies to force password changes every 60–90 days.
  • Account Lockout Settings: Implement account lockout after a certain number of failed login attempts to deter brute-force attacks.

How to Configure Policies

  • Use Local Security Policy or Group Policy to enforce password rules:
    • Navigate to Computer Configuration > Windows Settings > Security Settings > Account Policies > Password Policy.
    • Adjust settings such as minimum password length, complexity requirements, and expiration duration.

Restrict IP Addresses

Restricting RDP access to known IP ranges limits potential attack vectors.

How to Restrict IPs

  • Open Windows Defender Firewall with Advanced Security.
  • Create an Inbound Rule for RDP ( port 3389 ):
    • Specify the rule applies only to traffic from trusted IP ranges.
    • Block all other inbound traffic to RDP.

Benefits of IP Restrictions

  • Drastically reduces exposure to attacks from unknown sources.
  • Provides an additional layer of security, especially when combined with VPNs.

Implement Two-Factor Authentication (2FA)

Two-Factor Authentication adds an extra layer of protection by requiring users to verify their identity with something they know (password) and something they have (e.g., a mobile app or hardware token).

Setting Up 2FA for RDP

  • Use third-party solutions such as DUO Security or Authy to integrate 2FA with Windows Server.
  • Alternatively, configure Microsoft Authenticator with Azure Active Directory for seamless integration.

Why Use 2FA?

  • Even if a password is compromised, 2FA prevents unauthorized access.
  • It significantly enhances security without compromising user convenience.

Testing and Using Remote Desktop

After successfully enabling Remote Desktop Protocol (RDP) on your Windows Server 2022, the next critical step is testing the setup. This ensures connectivity and verifies that the configuration works as expected. Additionally, understanding how to access the server from various devices—regardless of the operating system—is essential for a seamless user experience.

Testing Connectivity

Testing the connection ensures the RDP service is active and accessible over the network.

Step 1: Use the Built-in Remote Desktop Connection Tool

On a Windows machine:

  • Open the Remote Desktop Connection tool by pressing Windows + R, typing mstsc, and pressing Enter.
  • Enter the server's IP address or hostname in the Computer field.

Step 2: Authenticate

  • Input the username and password of an account authorized for remote access.
  • If using Network Level Authentication (NLA), ensure the credentials match the required security level.

Step 3: Test the Connection

  • Click Connect and verify that the remote desktop session initializes without errors.
  • Troubleshoot connectivity issues by checking the firewall, network configurations, or server status.

Accessing from Different Platforms

Once the connection has been tested on Windows, explore methods for accessing the server from other operating systems.

Windows: Remote Desktop Connection

Windows includes a built-in Remote Desktop client:

  • Launch the Remote Desktop Connection tool.
  • Input the IP address or hostname of the server and authenticate.

macOS: Microsoft Remote Desktop

  • Download Microsoft Remote Desktop from the App Store.
  • Add a new PC by entering the server details.
  • Configure optional settings such as display resolution and session preferences for an optimized experience.

Linux : RDP Clients like Remmina

Linux users can connect using RDP clients such as Remmina:

  • Install Remmina via your package manager (e.g., sudo apt install remmina for Debian-based distributions).
  • Add a new connection and select RDP as the protocol.
  • Provide the server's IP address, username, and password to initiate the connection.

Mobile Devices

Accessing the server from mobile devices ensures flexibility and availability:

iOS:
  • Download the Microsoft Remote Desktop app from the App Store.
  • Configure a connection by providing the server's details and credentials.
Android:
  • Install the Microsoft Remote Desktop app from Google Play.
  • Add a connection, enter the server’s IP address, and authenticate to begin remote access.

Troubleshooting Common Issues

Connectivity Errors

  • Check that port 3389 is open in the firewall.
  • Confirm the server is accessible via a ping test from the client device.

Authentication Failures

  • Verify the username and password are correct.
  • Ensure the user account is listed in the Remote Desktop Users group.

Session Performance

  • Reduce display resolution or disable resource-intensive features (e.g., visual effects) to improve performance on low-bandwidth connections.

Explore Advanced Remote Access with TSplus

For IT professionals seeking advanced solutions, TSplus Remote Access offers unparalleled functionality. From enabling multiple concurrent connections to seamless application publishing and enhanced security features, TSplus is designed to meet the demands of modern IT environments. Streamline your remote desktop management today by visiting TSplus .

Conclusion

Enabling Remote Desktop on Windows Server 2022 is a critical skill for IT administrators, ensuring efficient remote management and collaboration. This guide has walked you through multiple methods to enable RDP, secure it, and optimize its usage for professional environments. With robust configurations and security practices, Remote Desktop can transform server management by providing accessibility and efficiency.

TSplus Remote Access Free Trial

Ultimate Citrix/RDS alternative for desktop/app access.Secure, cost-effective,on-permise/cloud

Related Posts

back to top of the page icon