Skip to content

Commit 82e300c

Browse files
Merge pull request #210648 from dknappettmsft/avd-rdp-shortpath-windows-firewall
AVD RDP shortpath windows firewall
2 parents e322225 + c668413 commit 82e300c

File tree

1 file changed

+36
-3
lines changed

1 file changed

+36
-3
lines changed

articles/virtual-desktop/configure-rdp-shortpath.md

Lines changed: 36 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,9 @@ Before you can enable RDP Shortpath, you'll need to meet the prerequisites. Sele
2424
# [Public networks](#tab/public-networks)
2525

2626
> [!TIP]
27-
> RDP Shortpath for public networks will work automatically without any additional configuration, providing networks and firewalls allow the traffic through and RDP transport settings in the Windows operating system for session hosts and clients are using their default values.
27+
> RDP Shortpath for public networks is currently rolling out now it is generally available. It will work automatically without any additional configuration, providing networks and firewalls allow the traffic through and RDP transport settings in the Windows operating system for session hosts and clients are using their default values.
28+
>
29+
> While it is rolling out, it may still be necessary to configure a registry value to enable RDP Shortpath for public networks. For more information, see [Enable the preview of RDP Shortpath for public networks](#enable-the-preview-of-rdp-shortpath-for-public-networks).
2830
>
2931
> The steps to configure RDP Shortpath for public networks are provided for session hosts and clients in case these defaults have been changed.
3032
@@ -62,6 +64,29 @@ To enable RDP Shortpath for managed networks, you need to enable the RDP Shortpa
6264

6365
1. Open the policy setting **Enable RDP Shortpath for managed networks** and set it to **Enabled**. If you enable this policy setting, you can also configure the port number that Azure Virtual Desktop session hosts will use to listen for incoming connections. The default port is **3390**.
6466

67+
1. If you need to configure Windows Firewall to allow port 3390, run one of the following commands, depending on whether you want to configure Windows Firewall using Group Policy centrally from your domain, or locally for each session host:
68+
69+
**AD Domain**:
70+
1. Open an elevated PowerShell prompt and run the following command, replacing the value for `$domainName` with your own domain name, the value for `$writableDC` with the hostname of a writeable domain controller, and the value for `$policyName` with the name of an existing Group Policy Object:
71+
72+
```powershell
73+
$domainName = "contoso.com"
74+
$writableDC = "dc01"
75+
$policyName = "RDP Shortpath Policy"
76+
$gpoSession = Open-NetGPO -PolicyStore "$domainName\$policyName" -DomainController $writableDC
77+
78+
New-NetFirewallRule -DisplayName 'Remote Desktop - RDP Shortpath (UDP-In)' -Action Allow -Description 'Inbound rule for the Remote Desktop service to allow RDP Shortpath traffic. [UDP 3390]' -Group '@FirewallAPI.dll,-28752' -Name 'RemoteDesktop-UserMode-In-RDPShortpath-UDP' -Profile Domain, Private -Service TermService -Protocol UDP -LocalPort 3390 -Program '%SystemRoot%\system32\svchost.exe' -Enabled:True -GPOSession $gpoSession
79+
80+
Save-NetGPO -GPOSession $gpoSession
81+
```
82+
83+
**Locally**:
84+
1. Open an elevated PowerShell prompt and run the following command:
85+
86+
```powershell
87+
New-NetFirewallRule -DisplayName 'Remote Desktop - RDP Shortpath (UDP-In)' -Action Allow -Description 'Inbound rule for the Remote Desktop service to allow RDP Shortpath traffic. [UDP 3390]' -Group '@FirewallAPI.dll,-28752' -Name 'RemoteDesktop-UserMode-In-RDPShortpath-UDP' -PolicyStore PersistentStore -Profile Domain, Private -Service TermService -Protocol UDP -LocalPort 3390 -Program '%SystemRoot%\system32\svchost.exe' -Enabled:True
88+
```
89+
6590
1. Select OK and restart your session hosts to apply the policy setting.
6691
6792
# [Public networks](#tab/public-networks)
@@ -274,9 +299,17 @@ To configure managed Windows clients using Intune:
274299

275300
1. Apply the configuration profile, then restart your clients.
276301

277-
## Deleting the preview of RDP Shortpath for public networks
302+
## Enable the preview of RDP Shortpath for public networks
303+
304+
RDP Shortpath for public networks is currently rolling out now it is generally available. While it is rolling out, it may still be necessary to configure a registry value to enable RDP Shortpath for public networks. Open an elevated PowerShell prompt on your session hosts and run the following command:
305+
306+
```powershell
307+
New-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations" -Name ICEControl -PropertyType DWORD -Value 2
308+
```
309+
310+
## Disable the preview of RDP Shortpath for public networks
278311

279-
If you've participated in the preview of RDP Shortpath for public networks, you need to delete the following registry key as it is no longer required. Open an elevated PowerShell prompt and run the following command:
312+
If you've participated in the preview of RDP Shortpath for public networks, you need to delete the following registry value as it is no longer required. Open an elevated PowerShell prompt on your session hosts and run the following command:
280313

281314
```powershell
282315
Remove-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations" -Name ICEControl -Force

0 commit comments

Comments
 (0)