Microsoft Terminal Services Client (MSTSC) is the command line interface to run the Microsoft Remote Desktop (RDP) client. It enables you to establish a remote connection to somebody else’s computer or to Remote Desktop Session Host (RDSH) servers as if it is in front of you and edit existing Remote Desktop Connection (.rdp) configuration files. Acquire access to the Windows command line (cmd.exe). This can be done by pressing the Windows key and the r key on the keyboard, then by typing. And pressing enter. Next, type the following: mstsc /console /V:address. This will start a Remote Desktop Protocol connection to the console session of the remote machine. User need to open command prompt with Administrator privilege and enter the command “Shadow rdp-tcp#0″ User M is prompted with a wizard for allowing access for O, after granting the access user session of M is shadowed. Remote desktop shadow command line in Windows 8.1.
Microsoft Remote Desktop Command Line Download
By default on a Windows Server Product Windows Remote Management (WinRM) is enabled, but Remote Desktop (RDP) is Disabled. On workstation operating systems neither is enabled by default, so if you want to be able to accomplish the following you will need to enable WinRM on the workstations.
Enabling RDP remotely.
Method 1: Command Line
To enable RDP with the Command Prompt, use the following steps.
- Launch the Command Prompt as Administrator.
- Type the following command:
NOTE: By default the local Administrators group will be allowed to connect with RDP. Also the user that is currently logged in will also be allowed to connect.
To disable RDP with the Command Prompt, use the following steps.
- Launch the Command Prompt as Administrator.
- Type the following command:
- Launch PowerShell as Administrator.
- Type the following command and create a script block and use the Invoke-Command cmdlet:
Invoke-Command–Computername“server1”,“Server2”–ScriptBlock{Set-ItemProperty-Path'HKLM:SystemCurrentControlSetControlTerminal Server'-Name'fDenyTSConnections'–Value0} |
NOTE: Enabling RDP through PowerShell will not configure the Windows Firewall with the appropriate ports to allow RDP connections.
Type the following:
Invoke-Command–Computername“server1”,“Server2”–ScriptBlock{Enable-NetFirewallRule-DisplayGroup'Remote Desktop'} |
NOTE: By default the local Administrators group will be allowed to connect with RDP. Also the user that is currently logged in will also be allowed to connect.
To disable RDP with the PowerShell, use the following steps.
- Launch PowerShell as Administrator.
- Type the following command:
Invoke-Command–Computername“server1”,“Server2”–ScriptBlock{Set-ItemProperty-Path'HKLM:SystemCurrentControlSetControlTerminal Server'-Name'fDenyTSConnections'–Value1} |
Option 2
To enable RDP RDP with the PowerShell, use the following steps.
- Launch PowerShell as Administrator.
- Create a PS Session with the desired target computer.
- Type the following command once possession is established:
Set-ItemProperty-Path'HKLM:SystemCurrentControlSetControlTerminal Server'-Name'fDenyTSConnections'–Value0 |
NOTE: Enabling RDP through PowerShell will not configure the Windows Firewall with the appropriate ports to allow RDP connections.
Type the following:
Enable-NetFirewallRule-DisplayGroup'Remote Desktop' |
NOTE: By default the local Administrators group will be allowed to connect with RDP. Also the user that is currently logged in will also be allowed to connect.
To disable RDP RDP with the PowerShell, use the following steps.
- Launch PowerShell as Administrator.
- Create a PS Session with the desired target computer.
- Type the following command once possession is established:
Set-ItemProperty-Path'HKLM:SystemCurrentControlSetControlTerminal Server'-Name'fDenyTSConnections'–Value1 |
Method 3: Use Group Policy
If you have numerous Servers and/or Workstations that you need to enable RDP on and they are in the same Organization Unit structure in Active Directory you should enable RDP through Group Policy.
To enable RDP Using Group Policy.
Microsoft Remote Desktop Command Line
- Launch the Group Policy Management Console (GPMC)
- Either edit an existing Group Policy Object (GPO) or create a new GPO.
- Navigate to the following GPO node:
Computer ConfigurationAdministrative TemplatesWindows ComponentsRemote Desktop ServicesRemote Desktop Session HostConnections
- In the Settings pane double click Allow users to connect remotely by using Remote Desktop Services.
- Select the Enable Radial button select OK.
- Close the GPO editor and link the GPO to the appropriate Organizational Unit.
NOTE: Enabling RDP through GPO will configure the Windows Firewall with the appropriate ports to allow RDP connections.
Note: In all the methods demonstrated in this blog any member of the local Remote Desktop Users group will be able to connect to the target computers.
Until next time – Ride Safe!
Rick Trader
Windows Server Instructor – Interface Technical Training
Phoenix, AZ
You May Also Like
GPMC, GPO, Group Policy Management Console, Group Policy Object, Invoke-Command, Powershell, RDP, RDP connections, remote desktop, Windows Remote Management, WinRM