Skip to content

Commit e29b0a2

Browse files
authored
Update remote-desktop-listener-certificate-configurations.md
1 parent e84fc30 commit e29b0a2

File tree

1 file changed

+30
-30
lines changed

1 file changed

+30
-30
lines changed

support/windows-server/remote/remote-desktop-listener-certificate-configurations.md

Lines changed: 30 additions & 30 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Remote Desktop listener certificate configurations
33
description: Describes the methods to configure RDP listener certificates in Windows Server 2012 R2 and Windows Server 2012.
4-
ms.date: 06/17/2025
4+
ms.date: 06/24/2025
55
manager: dcscontentpm
66
audience: itpro
77
ms.topic: troubleshooting
@@ -13,17 +13,17 @@ zone_pivot_groups: rdp-windows-server-versions
1313
---
1414
# Remote Desktop listener certificate configurations
1515

16-
This article describes the methods to configure listener certificates on a Windows Server that is not part of a Remote Desktop Services (RDS) deployment.
16+
This article describes the methods to configure listener certificates on a Windows Server that isn't part of a Remote Desktop Services (RDS) deployment.
1717

1818
_Original KB number:_   3042780
1919

2020
## About Remote Desktop server listener availability
2121

22-
The listener component runs on the Remote Desktop server and is responsible for listening to and accepting new Remote Desktop Protocol (RDP) client connections. This lets users establish new remote sessions on the Remote Desktop server. There is a listener for each Remote Desktop Services connection that exists on the Remote Desktop server. Connections can be created and configured by using the Remote Desktop Services Configuration tool.
22+
The listener component runs on the Remote Desktop server and is responsible for listening to and accepting new Remote Desktop Protocol (RDP) client connections. This lets users establish new remote sessions on the Remote Desktop server. There's a listener for each Remote Desktop Services connection that exists on the Remote Desktop server. Connections can be created and configured by using the Remote Desktop Services Configuration tool.
2323

2424
## Configure Remote Desktop server listener certificate
2525

26-
### [MMC](#tab/mmc)
26+
### [Microsoft Management Console (MMC)](#tab/mmc)
2727

2828
::: zone pivot="windows-server-pre-2012"
2929

@@ -32,23 +32,23 @@ The Remote Desktop Configuration Manager MMC snap-in enables you direct access t
3232
::: zone-end
3333
::: zone pivot="windows-server-2012"
3434

35-
The MMC method is not available starting from Windows Server 2012 or Windows Server 2012 R2. However, you can always configure the RDP listener by using WMI or the registry.
35+
The MMC method isn't available starting from Windows Server 2012 or Windows Server 2012 R2. However, you can always configure the RDP listener by using WMI or the registry.
3636

3737
::: zone-end
3838
::: zone pivot="windows-11-or-server-2025"
3939

40-
The MMC method is not available starting from Windows Server 2012 or Windows Server 2012 R2. However, you can always configure the RDP listener by using WMI or the registry.
40+
The MMC method isn't available starting from Windows Server 2012 or Windows Server 2012 R2. However, you can always configure the RDP listener by using WMI or the registry.
4141

4242
::: zone-end
4343

44-
### [WMI](#tab/wmi)
44+
### [Windows Management Instrumentation (WMI)](#tab/wmi)
4545

4646
The configuration data for the RDS listener is stored in the `Win32_TSGeneralSetting` class in WMI under the `Root\CimV2\TerminalServices` namespace.
4747

4848
The certificate for the RDS listener is referenced through the **Thumbprint** value of that certificate on a **SSLCertificateSHA1Hash** property. The thumbprint value is unique to each certificate.
4949

5050
> [!NOTE]
51-
> Before you run the commands, the certificate that you want to use must be imported to the **Personal** certificate store for the computer account (via `certlm.msc`). If you do not import the certificate, you will receive an **Invalid Parameter** error.
51+
> Before you run the commands, the certificate that you want to use must be imported to the **Personal** certificate store for the computer account (via `certlm.msc`). If you don't import the certificate, you'll receive an **Invalid Parameter** error.
5252
5353
To configure a certificate by using WMI, follow these steps:
5454

@@ -72,48 +72,48 @@ To configure a certificate by using WMI, follow these steps:
7272

7373
Make sure that this ASCII character is removed before you run the command to import the certificate.
7474

75-
3. Remove all spaces from the string. There may be an invisible ACSII character that is also copied. This is not visible in Notepad. The only way to validate is to copy directly into the Command Prompt window.
75+
3. Remove all spaces from the string. There may be an invisible ACSII character that is also copied. This isn't visible in Notepad. The only way to validate is to copy directly into the Command Prompt window.
7676

77-
4. At command prompt, run the following wmic command together with the thumbprint value that you obtain in step 3:
77+
4. At command prompt, run the following `wmic` command together with the thumbprint value that you obtain in step 3:
7878

7979
```console
8080
wmic /namespace:\\root\cimv2\TerminalServices PATH Win32_TSGeneralSetting Set SSLCertificateSHA1Hash="THUMBPRINT"
8181
```
8282

8383
The following screenshot is a successful example:
8484

85-
:::image type="content" source="./media/remote-desktop-listener-certificate-configurations/successful-example-to-run-wmic-commands.png" alt-text="A successful example of running the wmic command together with the thumbprint value that you obtain in step 3." border="false":::
85+
:::image type="content" source="./media/remote-desktop-listener-certificate-configurations/successful-example-to-run-wmic-commands.png" alt-text="A successful example of running the `wmic` command together with the thumbprint value that you obtain in step 3." border="false":::
8686

8787
::: zone-end
8888
::: zone pivot="windows-server-2012"
8989

90-
2. Scroll down to the **Thumbprint** field and copy the space delimited hexadecimal string into something like Notepad.
90+
2. Scroll down to the **Thumbprint** field and copy the space-delimited hexadecimal string into a text editor like Notepad.
9191

92-
The following screenshot is an example of the certificate thumbprint in the **Certificate** properties:
92+
The following screenshot shows an example of the certificate thumbprint in the **Certificate** properties:
9393

9494
:::image type="content" source="./media/remote-desktop-listener-certificate-configurations/thumbprint-property.png" alt-text="An example of the certificate thumbprint in the Certificate properties.":::
9595

96-
If you copy the string into Notepad, it should resemble the following screenshot:
96+
When you copy the string into Notepad, it should look like the following screenshot:
9797

9898
:::image type="content" source="./media/remote-desktop-listener-certificate-configurations/thumbprint-string-in-notepad.png" alt-text="Copy and paste the thumbprint string into Notepad.":::
9999

100-
After you remove the spaces in the string, it still contains the invisible ASCII character that is only visible at the command prompt. The following screenshot is an example:
100+
After you remove the spaces in the string, it still contains an invisible ASCII character that is only visible at the command prompt. The following screenshot shows an example:
101101

102102
:::image type="content" source="./media/remote-desktop-listener-certificate-configurations/ascii-character-in-command-prompt.png" alt-text="The invisible ASCII character that is only shown at the command prompt." border="false":::
103103

104-
Make sure that this ASCII character is removed before you run the command to import the certificate.
104+
Ensure that this ASCII character is removed before you run the command to import the certificate.
105105

106-
3. Remove all spaces from the string. There may be an invisible ACSII character that is also copied. This is not visible in Notepad. The only way to validate is to copy directly into the Command Prompt window.
106+
3. Remove all spaces from the string. There might be an invisible ACSII character that is also copied. This isn't visible in Notepad. The only way to validate is to copy directly into the Command Prompt window.
107107

108-
4. At command prompt, run the following wmic command together with the thumbprint value that you obtain in step 3:
108+
4. At command prompt, run the following `wmic` command together with the thumbprint value that you obtain in step 3:
109109

110110
```console
111111
wmic /namespace:\\root\cimv2\TerminalServices PATH Win32_TSGeneralSetting Set SSLCertificateSHA1Hash="THUMBPRINT"
112112
```
113113

114-
The following screenshot is a successful example:
114+
The following screenshot shows a successful example:
115115

116-
:::image type="content" source="./media/remote-desktop-listener-certificate-configurations/successful-example-to-run-wmic-commands.png" alt-text="A successful example of running the wmic command together with the thumbprint value that you obtain in step 3." border="false":::
116+
:::image type="content" source="./media/remote-desktop-listener-certificate-configurations/successful-example-to-run-wmic-commands.png" alt-text="A successful example of running the `wmic` command together with the thumbprint value that you obtain in step 3." border="false":::
117117

118118
::: zone-end
119119
::: zone pivot="windows-11-or-server-2025"
@@ -123,15 +123,15 @@ To configure a certificate by using WMI, follow these steps:
123123

124124
:::image type="content" source="./media/remote-desktop-listener-certificate-configurations/thumbprint-property-w11.png" alt-text="An example of the certificate thumbprint in the Certificate properties.":::
125125

126-
3. At command prompt, run the following powershell command together with the thumbprint value that you obtain in step 2:
126+
3. At command prompt, run the following PowerShell command together with the thumbprint value that you obtain in step 2:
127127

128128
```console
129129
Get-WmiObject -class "Win32_TSGeneralSetting" -Namespace root\cimv2\terminalservices | Set-WmiInstance -Arguments @{SSLCertificateSHA1Hash="THUMBPRINT"}
130130
```
131131

132-
The following screenshot is a successful example:
132+
The following screenshot shows a successful example:
133133

134-
:::image type="content" source="./media/remote-desktop-listener-certificate-configurations/successful-example-to-run-powershell-commands.png" alt-text="A successful example of running the powershell command together with the thumbprint value that you obtain in step 2." border="false":::
134+
:::image type="content" source="./media/remote-desktop-listener-certificate-configurations/successful-example-to-run-powershell-commands.png" alt-text="A successful example of running the PowerShell command together with the thumbprint value that you obtain in step 2." border="false":::
135135

136136
::: zone-end
137137

@@ -164,14 +164,14 @@ To configure a certificate by using registry editor, follow these steps:
164164
165165
To change the permissions, follow these steps on the Certificates snap-in for the local computer:
166166
167-
1. Click **Start**, click **Run**, type *mmc*, and then click **OK**.
168-
2. On the **File** menu, click **Add/Remove Snap-in**.
169-
3. In the **Add or Remove Snap-ins** dialog box, on the **Available snap-ins** list, click **Certificates**, and then click **Add**.
170-
4. In the **Certificates** snap-in dialog box, click **Computer account**, and then click **Next**.
171-
5. In the **Select Computer** dialog box, click **Local computer: (the computer this console is running on)**, and then click **Finish**.
172-
6. In the **Add or Remove Snap-ins** dialog box, click **OK**.
167+
1. Select **Start**, select **Run**, type *mmc*, and then select **OK**.
168+
2. On the **File** menu, select **Add/Remove Snap-in**.
169+
3. In the **Add or Remove Snap-ins** dialog box, on the **Available snap-ins** list, select **Certificates**, and then select **Add**.
170+
4. In the **Certificates** snap-in dialog box, select **Computer account**, and then select **Next**.
171+
5. In the **Select Computer** dialog box, select **Local computer: (the computer this console is running on)**, and then select **Finish**.
172+
6. In the **Add or Remove Snap-ins** dialog box, select **OK**.
173173
7. In the **Certificates** snap-in, on the console tree, expand **Certificates (Local Computer)**, expand **Personal**, and then select the SSL certificate that you want to use.
174174
8. Right-click the certificate, select **All Tasks**, and then select **Manage Private Keys**.
175-
9. In the **Permissions** dialog box, click **Add**, type *NETWORK SERVICE*, click **OK**, select **Read** under the **Allow** check box, and then click **OK**.
175+
9. In the **Permissions** dialog box, select **Add**, type *NETWORK SERVICE*, select **OK**, select **Read** under the **Allow** check box, and then select **OK**.
176176
177177
---

0 commit comments

Comments
 (0)