http://www.dannyeckes.com/server-2012-enable-remote-desktop-rdp-group-policy-gpo/
Since my ESX lab is all virtual I don’t have any monitors connected to my servers. The best way to manage these servers is by connecting remotely. I want to be able to remote onto all my computers but limit which users can remote onto these machines. The best way to do this is through a group policy that sets this up on all machines.
My GPO will need to do the following:
- Enable Remote Desktop Service
- Open the Firewall to allow Remote Desktop
- Disallow local admins from making changes
- Only allow certain users to logon remotely.
CREATE A SECURITY GROUP
I want only members of a specific security group to use remote desktop. I need to create a group for these users to be a member of.
- Open up Active Directory Users and Computers
- Create an Organizational Unit (OU) called “DOMAIN – Groups”
- Under your Groups OU create another OU called “Security”. This is where we will hold all of our security groups.
- Right click Security and select New > Group.
- Give the group a name. I used “SG – Remote Desktop Users”.
CREATE THE GPO
Now that we have a security group, we need to enable RDP and allow only members of this group to connect to our systems.
- Log into your Domain Controller.
- On the Start Screen type: gpmc.msc. This will pull up the Group Policy Management Console.
- Right click on your domain and select “Create a GPO in this domain, and Link it here…”. I am creating this GPO at the root of my domain to allow access to all servers and computers in my domain. This might not be exactly what you want to do, if your situation is different then select the OU you want this policy to apply to instead of your domain.
- Name the GPO. I used “Enable RDP” to keep it simple. This will create a blank GPO and a link to it.
- Right click the GPO or the Link and select “Edit…”
- This will pull up a the Group Policy Editor.
- We are only going to be modifying Computer Settings. We need to enable RDP, open the Firewall, and allow the security group members. Set the following:
- Computer ConfigurationPoliciesWindows SettingsSecurity SettingsLocal PoliciesUser Rights AssignmentAllow Log on through Remote Desktop Services.
- Add Users or Group…
- Browse and search for your Security Group. In my case it was SG – Remote Desktop users
- Computer ConfigurationPoliciesWindows SettingsSecurity SettingsRestricted Groups
- Right Click in the blank area and select Add Group…
- Browse and find “Remote Desktop Users”
- Select OK
- Double Click Remote Desktop Users
- Select Add for “Members of this Group”
- Browse and find your Security group.
- Computer ConfigurationAdministrative TemplatesNetworkNetwork ConnectionsWindows FirewallDomain ProfileWindows Firewall: Allow Inbound Remote Desktop exceptions: Enabled
- Computer ConfigurationAdministrative TemplatesWindows ComponentsRemote Desktop ServicesRemote Desktop Session HostConnectionsAllow user to connect remotely by using Remote Desktop Services: Enabled
- Computer ConfigurationAdministrative TemplatesWindows ComponentsRemote Desktop ServicesRemote Desktop Session HostSecurityDo not allow local administrators to customize permissions: Enabled
- Computer ConfigurationAdministrative TemplatesWindows ComponentsRemote Desktop ServicesRemote Desktop Session HostSecurityRequire user authentication for remote connections by using NLA: Disabled
- Computer ConfigurationPoliciesWindows SettingsSecurity SettingsLocal PoliciesUser Rights AssignmentAllow Log on through Remote Desktop Services.
That should be it! Just wait for or force your computers to update Group Policy. Now any users that are a member of your security group can RDP to your computers.
- See more at: http://www.dannyeckes.com/server-2012-enable-remote-desktop-rdp-group-policy-gpo/#sthash.atFJJmdH.dpuf