Skip to content

Commit 61d7628

Browse files
authored
Merge pull request #8980 from v-lianna/CI_5811
AB#5811 create system-admin-restrict-types-logon.md
2 parents 4832540 + 7d19626 commit 61d7628

File tree

3 files changed

+103
-0
lines changed

3 files changed

+103
-0
lines changed

support/azure/virtual-machines/windows/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -142,6 +142,8 @@
142142
href: azure-vm-nsi-not-starting.md
143143
- name: Cannot RDP into Azure VM because of a brute force attack
144144
href: cannot-rdp-azure-vm-brute-force.md
145+
- name: The system administrator has restricted the types of logon
146+
href: ../../../windows-server/remote/system-admin-restrict-types-logon.md?context=/troubleshoot/azure/virtual-machines/windows/context/context
145147
- name: Troubleshoot a failed trust relationship in an Azure Windows VM
146148
href: troubleshoot-broken-secure-channel.md
147149
- name: Troubleshoot RDP error because DHCP is disabled
Lines changed: 99 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,99 @@
1+
---
2+
title: The System Administrator Has Restricted the Types of Logon
3+
description: Helps resolve an error when connecting to a computer—The system administrator has restricted the types of logon (network or interactive).
4+
ms.date: 06/04/2025
5+
manager: dcscontentpm
6+
audience: itpro
7+
ms.topic: troubleshooting
8+
ms.reviewer: kaushika, akastha, narafa, v-lianna
9+
ms.custom:
10+
- sap:remote desktop services and terminal services\session connectivity
11+
- pcy:WinComm User Experience
12+
---
13+
# "The system administrator has restricted the types of logon" error when connecting to a computer
14+
15+
This article helps resolve an error "The system administrator has restricted the types of logon (network or interactive) that you may use" when connecting to a computer.
16+
17+
When you use a Remote Desktop Protocol (RDP) connection to connect to a computer, you're prompted for credentials. However, the session ends immediately after authentication, and you receive the following error message:
18+
19+
> The system administrator has restricted the types of logon (network or interactive) that you may use.
20+
21+
This error indicates that an attempted RDP connection is blocked because of a restriction in the system's Local Security Policy or Group Policy settings related to the allowed logon type.
22+
23+
In addition, you also receive the following events or messages in Event Viewer logs:
24+
25+
- [Event ID 4625](/previous-versions/windows/it-pro/windows-10/security/threat-protection/auditing/event-4625) with a logon failure due to logon type restrictions.
26+
- [Event ID 4005](/answers/questions/389027/winlogon-error-4005) with the message "The Windows logon process has unexpectedly terminated."
27+
28+
This error might occur for the following reasons:
29+
30+
|Cause |Explanation |
31+
|---------|---------|
32+
|The user lacks the **Allow log on through Remote Desktop Services** right |The account isn't a member of a group allowed to use RDP (like **Remote Desktop Users** or **Administrators**). |
33+
|Group Policy restrictions on logon types |Group Policy Object (GPO) or local security policy denies logon via RDP or network. |
34+
|Conflicting security settings |One policy allows logon, but another policy overrides it and denies it.|
35+
|RDP logon denied by "Deny" policies |The user is explicitly denied logon rights. |
36+
|Network Level Authentication (NLA) incompatibility |NLA requires credentials before establishing an RDP session. Older accounts or systems might fail. |
37+
38+
## Troubleshooting steps
39+
40+
1. Open **lusrmgr.msc** and ensure the user is a member of **Remote Desktop Users**. If not, add the user to the **Remote Desktop Users** group by using the following cmdlet:
41+
42+
```Powershell
43+
Add-LocalGroupMember -Group "Remote Desktop Users" -Member "DOMAIN\Username"
44+
```
45+
46+
2. Verify user rights and group membership.
47+
48+
- On the local machine:
49+
50+
In the Local Security Policy snap-in (**secpol.msc**), go to **Local Policies** > **User Rights Assignment**:
51+
52+
- Ensure the user or group is included in the following policies:
53+
54+
- **Access this computer from the network**
55+
- **Allow log on locally**
56+
- **Allow log on through Remote Desktop Services**
57+
58+
- Ensure the user or group isn't included in the following policies:
59+
60+
- **Deny access to this computer from the network**
61+
- **Deny log on locally**
62+
- **Deny log on through Remote Desktop Services**
63+
64+
- On the domain controller (if the system is domain-joined):
65+
66+
- Open Group Policy Management Console and edit **Default Domain Controllers Policy**.
67+
68+
Go to **Computer Configuration** > **Policies** > **Windows Settings** > **Security Settings** > **Local Policies** > **User Rights Assignment**, and confirm the same settings as listed in the preceding step.
69+
70+
- Open the Active Directory Users and Computers snap-in:
71+
72+
- Ensure the user or group is a member of **Remote Desktop Users**.
73+
- Confirm group policy inheritance applies as expected.
74+
75+
3. Check the effective Group Policy. Run the following command to generate a report with the Resultant Set of Policy information:
76+
77+
```console
78+
gpresult /h report.html
79+
```
80+
81+
Open the report and verify the relevant logon rights under **Computer Details**.
82+
83+
4. Ensure the NLA compatibility:
84+
85+
- Use the latest version of the Remote Desktop client.
86+
- Enable NLA on the remote computer.
87+
- Configure user accounts with valid credentials, as NLA requires authentication before the session is established.
88+
89+
If necessary, temporarily disable NLA by using the following cmdlet:
90+
91+
```powershell
92+
Set-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" -Name "UserAuthentication" -Value 0
93+
```
94+
95+
5. Restart the system or update Group Policy settings by using the following command:
96+
97+
```console
98+
gpupdate /force
99+
```

support/windows-server/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2330,6 +2330,8 @@ items:
23302330
href: ./remote/terminal-server-commands-msg.md
23312331
- name: Terminal Server User's Home Directory is not set correctly
23322332
href: ./remote/terminal-server-users-home-directory-not-set-correctly.md
2333+
- name: The system administrator has restricted the types of logon
2334+
href: ./remote/system-admin-restrict-types-logon.md
23332335
- name: Troubleshoot unexpected RDS session locks or disconnections
23342336
href: ./remote/troubleshoot-unexpected-rds-session-locks-or-disconnections.md
23352337
- name: User can't authenticate or must authenticate twice

0 commit comments

Comments
 (0)