

However, that’s out of the scope of this article so I won’t go in to the details now. This is highly recommended and has many security advantages. Now we’re going to enable Network Level Authentication.Allow users to connect remotely by using Remote Desktop Services to Enable.Go to Computer Configuration -> Policies -> Administrative Templates -> Windows Components -> Remote Desktop Services -> Remote Desktop Session Host -> Connections.Now that we have added the local ports, we’ll need to enable the Remote Desktop Session Host policies.

Name this rule – Inbound Rule for RDP Port 3389.Allow the Connection and only select Domain and Private Profiles.Ensure TCP and Specific Local Port : 3389.Select Port in the New Inbound Rule Wizard.Navigate to: Computer Configuration -> Windows Settings -> Security Settings -> Windows Firewall with Advanced Security -> Windows Firewall with Advanced Security -> Inbound Rules and Create a New Rule.Create a New Group Policy Object and name it Enable Remote Desktop.Open up Group Policy Management Console (GPMC).I’m going to assume you have the permissions so we’ll just continue on with a bullet list that’s easy peasy for you to understand. The biggest problem you could be potentially faced with, is actual permissions to modify any GPOs. Today, that’s exactly what I’m going to show you how to do. Since walking to their desk is not an option, you need to figure out How to enable Remote Desktop via Group Policy so it gets applied to machines at that site. Picture this: you just setup a remote site and now you find yourself having to support servers (or users) you can’t physically get to.
