Share via


RDP-TCP Administrative Settings

Question

Thursday, January 31, 2013 11:04 PM

I have installed 2012 onto a machine and would like to make it's RDP-Tcp settings the same as our company standard. 

I understand the Host Configuration screen is no longer available, but isn't there a way to do this anymore for administrative RDP sessions?  Everything I am finding is saying I need to install the RDS but this will never be an RDS server and I already have an RDS farm that I do not want to reduce liscensing from.  Mainly I am looking to stop it from mapping client printers, drives, etc. As well as get our CA issued RDP cert on it.

Here are the screens I am looking for.

All replies (3)

Friday, February 1, 2013 5:56 AM âś…Answered

Hi,

You may configure most of these settings via the domain group policy object that is applicable to your server or via the server's local group policy object using gpedit.msc.  The settings are located under the following path (for local policy object):

Computer Configuration\ Administrative Templates\ Windows Components\ Remote Desktop Services\ Remote Desktop Session Host

-TP


Thursday, January 31, 2013 11:55 PM

RDP that comes with every Windows box is for administrative purposes only, so I would think that your company would have some sort of exception for administrative connections versus general purpose connections.  Otherwise, if you will need to set up RDS to accomplish what you are looking for because those are settings for RDS.

You can set those settings on the RDC client side.  That you can control via group policy.  But, again, users should not be connecting via the administrative connections, so you really should not have to worry about it.  You should just enable those people in the administrator group to have access to the administrative connections.

.:|:.:|:. tim


Friday, February 1, 2013 9:18 PM

Thanks that did the trick for the Client Settings part.  I still don't see a way to get our CA certificate onto these 2012 servers. 

We only allow admins to connect to the servers, and in general use MMC to remote admin everything, RDP is done to over come the limitations of the snap in, or take a direct look when there is a problem.  We therefore secure the connection with our internal CA certificate as well.  Why they would limit us from doing this easily for the administravie RDP I cannot understand.

Anyone have any idea on manually importing a certificate to replace the self generated?  Of course I have the other problem of the fact that the Certificate snap in isn't seeing the RDP cert as one that is valid.  I am not sure if that is because the RDS isn't install, or if the Cert used on my CA is not valid with 2012 anymore.  The DC and Config Manager certs automatically worked based on the GPO though so it seems to certificate specific.