You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The Remote Desktop Configuration Manager MMC snap-in enables you direct access to the RDP listener. In the snap-in, you can bind a certificate to the listener and in turn, enforce SSL security for the RDP sessions.
31
-
32
-
::: zone-end
33
-
::: zone pivot="windows-server-2012"
34
-
35
-
The MMC method isn't available starting from Windows Server 2012 or Windows Server 2012 R2. However, you can always configure the RDP listener by using WMI or the registry.
36
-
37
-
::: zone-end
38
-
::: zone pivot="windows-11-or-server-2025"
39
-
40
-
The MMC method isn't available starting from Windows Server 2012 or Windows Server 2012 R2. However, you can always configure the RDP listener by using WMI or the registry.
The configuration data for the RDS listener is stored in the `Win32_TSGeneralSetting` class in WMI under the `Root\CimV2\TerminalServices` namespace.
28
+
The configuration data for the RDS listener is stored in the `Win32_TSGeneralSetting` class in Windows Management Instrumentation (WMI) under the `Root\CimV2\TerminalServices` namespace.
47
29
48
30
The certificate for the RDS listener is referenced through the **Thumbprint** value of that certificate on a **SSLCertificateSHA1Hash** property. The thumbprint value is unique to each certificate.
49
31
@@ -56,9 +38,9 @@ To configure a certificate by using WMI, follow these steps:
56
38
57
39
::: zone pivot="windows-server-pre-2012"
58
40
59
-
2. Scroll down to the **Thumbprint** field and copy the spacedelimited hexadecimal string into something like Notepad.
41
+
2. Scroll down to the **Thumbprint** field and copy the space-delimited hexadecimal string into something like Notepad.
60
42
61
-
The following screenshot is an example of the certificate thumbprint in the **Certificate** properties:
43
+
The following screenshot shows an example of the certificate thumbprint in the **Certificate** properties:
62
44
63
45
:::image type="content" source="./media/remote-desktop-listener-certificate-configurations/thumbprint-property.png" alt-text="An example of the certificate thumbprint in the Certificate properties.":::
64
46
@@ -72,15 +54,15 @@ To configure a certificate by using WMI, follow these steps:
72
54
73
55
Make sure that this ASCII character is removed before you run the command to import the certificate.
74
56
75
-
3. Remove all spaces from the string. There may be an invisible ACSII character that is also copied. This isn't visible in Notepad. The only way to validate is to copy directly into the Command Prompt window.
57
+
3. Remove all spaces from the string. There may be an invisible ACSII character that is also copied. This character isn't visible in Notepad. To validate the string, copy the string directly into the Command Prompt window.
76
58
77
59
4. At command prompt, run the following `wmic` command together with the thumbprint value that you obtain in step 3:
78
60
79
61
```console
80
62
wmic /namespace:\\root\cimv2\TerminalServices PATH Win32_TSGeneralSetting Set SSLCertificateSHA1Hash="THUMBPRINT"
81
63
```
82
64
83
-
The following screenshot is a successful example:
65
+
The following screenshot shows a successful example:
84
66
85
67
:::image type="content" source="./media/remote-desktop-listener-certificate-configurations/successful-example-to-run-wmic-commands.png" alt-text="A successful example of running the `wmic` command together with the thumbprint value that you obtain in step 3." border="false":::
86
68
@@ -103,7 +85,7 @@ To configure a certificate by using WMI, follow these steps:
103
85
104
86
Ensure that this ASCII character is removed before you run the command to import the certificate.
105
87
106
-
3. Remove all spaces from the string. There might be an invisible ACSII character that is also copied. This isn't visible in Notepad. The only way to validate is to copy directly into the Command Prompt window.
88
+
3. Remove all spaces from the string. There might be an invisible ACSII character that is also copied. This character isn't visible in Notepad. To validate the string, copy the string directly into the Command Prompt window.
107
89
108
90
4. At command prompt, run the following `wmic` command together with the thumbprint value that you obtain in step 3:
109
91
@@ -118,10 +100,9 @@ To configure a certificate by using WMI, follow these steps:
118
100
::: zone-end
119
101
::: zone pivot="windows-11-or-server-2025"
120
102
121
-
2. Scroll down to the **Thumbprint** field and copy it.
122
-
The following screenshot is an example of the certificate thumbprint in the **Certificate** properties:
103
+
2. Scroll down to the **Thumbprint** field and copy it. The following screenshot is an example of the certificate thumbprint in the **Certificate** properties:
123
104
124
-
:::image type="content" source="./media/remote-desktop-listener-certificate-configurations/thumbprint-property-w11.png" alt-text="An example of the certificate thumbprint in the Certificate properties.":::
105
+
:::image type="content" source="./media/remote-desktop-listener-certificate-configurations/thumbprint-property-windows-11.png" alt-text="An example of the certificate thumbprint in the Certificate properties.":::
125
106
126
107
3. At command prompt, run the following PowerShell command together with the thumbprint value that you obtain in step 2:
127
108
@@ -174,4 +155,20 @@ To configure a certificate by using registry editor, follow these steps:
174
155
8. Right-click the certificate, select **All Tasks**, and then select **Manage Private Keys**.
175
156
9. In the **Permissions** dialog box, select **Add**, type *NETWORK SERVICE*, select **OK**, select **Read** under the **Allow** check box, and then select **OK**.
176
157
177
-
---
158
+
### [MMC](#tab/mmc)
159
+
160
+
::: zone pivot="windows-server-pre-2012"
161
+
162
+
The Remote Desktop Configuration Manager Microsoft Management Console (MMC) snap-in enables you direct access to the RDP listener. In the snap-in, you can bind a certificate to the listener and in turn, enforce SSL security for the RDP sessions.
163
+
164
+
::: zone-end
165
+
::: zone pivot="windows-server-2012"
166
+
167
+
The Microsoft Management Console (MMC) method isn't available starting from Windows Server 2012 or Windows Server 2012 R2. However, you can always configure the RDP listener by using WMI or the registry.
168
+
169
+
::: zone-end
170
+
::: zone pivot="windows-11-or-server-2025"
171
+
172
+
The Microsoft Management Console (MMC) method isn't available starting from Windows Server 2012 or Windows Server 2012 R2. However, you can always configure the RDP listener by using WMI or the registry.
0 commit comments