Skip to content

Commit 4b4f08a

Browse files
Merge pull request #229057 from dknappettmsft/patch-1
AVD RDP Shortpath limit ports fix link
2 parents b7ff97a + 9825b2a commit 4b4f08a

File tree

1 file changed

+5
-2
lines changed

1 file changed

+5
-2
lines changed

articles/virtual-desktop/configure-rdp-shortpath-limit-ports-public-networks.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Limit the port range when using RDP Shortpath for public networks - Azure
33
description: Learn how to limit the port range used by clients when using RDP Shortpath for public networks for Azure Virtual Desktop, which establishes a UDP-based transport between a Remote Desktop client and session host.
44
author: dknappettmsft
55
ms.topic: how-to
6-
ms.date: 02/02/2023
6+
ms.date: 03/01/2023
77
ms.author: daknappe
88
---
99
# Limit the port range when using RDP Shortpath for public networks
@@ -17,7 +17,8 @@ When choosing the base and pool size, consider the number of ports you choose. T
1717
## Prerequisites
1818

1919
- A client device running the [Remote Desktop client for Windows](users/connect-windows.md), version 1.2.3488 or later. Currently, non-Windows clients aren't supported.
20-
- Internet access for both clients and session hosts. Session hosts require outbound UDP connectivity from your session hosts to the internet. For more information you can use to configure firewalls and Network Security Group, see [Network configurations for RDP Shortpath](rdp-shortpath.md#network-configuration).
20+
21+
- Internet access for both clients and session hosts. Session hosts require outbound UDP connectivity from your session hosts to the internet. For more information you can use to configure firewalls and Network Security Group, see [Network configurations for RDP Shortpath](rdp-shortpath.md?tabs=public-networks#network-configuration).
2122

2223
## Enable a limited port range
2324

@@ -29,10 +30,12 @@ To enable a limited port range when using RDP Shortpath for public networks, you
2930

3031
**AD Domain**:
3132
1. Copy and paste the **terminalserver-avd.admx** file to the Central Store for your domain, for example `\\contoso.com\SYSVOL\contoso.com\policies\PolicyDefinitions`, where *contoso.com* is your domain name. Then copy the **en-us\terminalserver-avd.adml** file to the `en-us` subfolder.
33+
3234
1. Open the **Group Policy Management Console** (GPMC) and create or edit a policy that targets your session hosts.
3335

3436
**Locally**:
3537
1. Copy and paste the **terminalserver-avd.admx** file to `%windir%\PolicyDefinitions`. Then copy the **en-us\terminalserver-avd.adml** file to the `en-us` subfolder.
38+
3639
1. Open the **Local Group Policy Editor** on the session host.
3740

3841
1. Browse to **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Remote Desktop Services** > **Remote Desktop Session Host** > **Azure Virtual Desktop**. You should see policy settings for Azure Virtual Desktop, as shown in the following screenshot:

0 commit comments

Comments
 (0)