You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
- sap:remote desktop services and terminal services\web access (includes remoteapp and desktop connections)
11
11
- pcy:WinComm User Experience
@@ -30,9 +30,7 @@ Securing remote connection...
30
30
31
31
Remote desktop connection uses the highest possible security level encryption method between the source and destination.
32
32
33
-
In Windows 7 or later versions, the remote desktop connection uses the SSL (TLS 1.0) Protocol and the encryption is Certificate-based.
34
-
35
-
It means the authentication is performed by using self-signed certificates (default), or a certificate issued by a certification authority installed on the remote session host server (Terminal Server).
33
+
Authentication is performed by using self-signed certificates (default behavior), or a certificate issued by a certification authority installed on the Remote Desktop Session Host server (RD Session Host).
36
34
37
35
If you use a self-signed certificate, the system tries to retrieve the trusted certification authority list from the Internet to check the publish and revocation status of the certificate. Therefore, the **Securing remote connection** screen may appear for a while.
38
36
@@ -78,10 +76,22 @@ To work around this behavior, use either of the following methods:
78
76
79
77
### Method 2
80
78
81
-
Deploy a Group Policy Object to the client to turn off Automatic Root Certificates Update. To do it, follow these steps on a Windows Server 2012 R2-based computer:
79
+
Deploy a Group Policy to the client to turn off Automatic Root Certificates Update. To create a Group Policy, follow these steps on a Windows Server computer that is used for Group Policy management in the same Active Directory domain as the RD Session Host and client:
80
+
81
+
1. Open the Group Policy Management Console (GPMC) by using the following steps:
82
+
83
+
1. Press the Windows key+<kbd>R</kbd> to open the **Run** box.
84
+
2. Type **Gpmc.msc** in the **Run** box, and then select **OK**.
85
+
86
+
> [!NOTE]
87
+
> GPMC is installed by default on domain controllers and on any Windows Server or client that has the Remote Server Administration Tools installed.
88
+
89
+
2. Create a new Group Policy Object (GPO) or select an existing GPO to change.
90
+
3. Right-click the selected GPO, select **Edit**, and browse to the following Group Policy:
91
+
92
+
**Computer Configuration** > **Administrative Templates** > **System** > **Internet Communication Management** > **Internet Communication settings**
82
93
83
-
1. Open Group Policy Management Console. To do it, hold the Windows key and press the r key. Type *Gpmc.msc* in the **Run** box, and then select **OK**.
84
-
2. Create a new Group Policy Object (GPO) or select an existing Group Policy Object (GPO) to change.
85
-
3. Right-click the selected Group Policy Object (GPO) and then select **Edit** and browse to the following Group Policy:
86
-
**Computer Configuration** > **Administrative Templates** > **System** > **Internet Communication Management** > **Internet Communication settings**
87
94
4. In the details pane, double-click **Turn off Automatic Root Certificates Update**, and then select **Enabled**.
95
+
96
+
> [!WARNING]
97
+
> Turning off Automatic Root Certificates Update means you need to update any client or server when a new root certificate update is rolled out.
0 commit comments