You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/virtual-desktop/configure-rdp-shortpath.md
+36-3Lines changed: 36 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -24,7 +24,9 @@ Before you can enable RDP Shortpath, you'll need to meet the prerequisites. Sele
24
24
# [Public networks](#tab/public-networks)
25
25
26
26
> [!TIP]
27
-
> RDP Shortpath for public networks will work automatically without any additional configuration, providing networks and firewalls allow the traffic through and RDP transport settings in the Windows operating system for session hosts and clients are using their default values.
27
+
> RDP Shortpath for public networks is currently rolling out now it is generally available. It will work automatically without any additional configuration, providing networks and firewalls allow the traffic through and RDP transport settings in the Windows operating system for session hosts and clients are using their default values.
28
+
>
29
+
> While it is rolling out, it may still be necessary to configure a registry value to enable RDP Shortpath for public networks. For more information, see [Enable the preview of RDP Shortpath for public networks](#enable-the-preview-of-rdp-shortpath-for-public-networks).
28
30
>
29
31
> The steps to configure RDP Shortpath for public networks are provided for session hosts and clients in case these defaults have been changed.
30
32
@@ -62,6 +64,29 @@ To enable RDP Shortpath for managed networks, you need to enable the RDP Shortpa
62
64
63
65
1. Open the policy setting **Enable RDP Shortpath for managed networks** and set it to **Enabled**. If you enable this policy setting, you can also configure the port number that Azure Virtual Desktop session hosts will use to listen for incoming connections. The default port is **3390**.
64
66
67
+
1. If you need to configure Windows Firewall to allow port 3390, run one of the following commands, depending on whether you want to configure Windows Firewall using Group Policy centrally from your domain, or locally for each session host:
68
+
69
+
**AD Domain**:
70
+
1. Open an elevated PowerShell prompt and run the following command, replacing the value for `$domainName` with your own domain name, the value for `$writableDC` with the hostname of a writeable domain controller, and the value for `$policyName` with the name of an existing Group Policy Object:
1. Select OK and restart your session hosts to apply the policy setting.
66
91
67
92
# [Public networks](#tab/public-networks)
@@ -274,9 +299,17 @@ To configure managed Windows clients using Intune:
274
299
275
300
1. Apply the configuration profile, then restart your clients.
276
301
277
-
## Deleting the preview of RDP Shortpath for public networks
302
+
## Enable the preview of RDP Shortpath for public networks
303
+
304
+
RDP Shortpath for public networks is currently rolling out now it is generally available. While it is rolling out, it may still be necessary to configure a registry value to enable RDP Shortpath for public networks. Open an elevated PowerShell prompt on your session hosts and run the following command:
## Disable the preview of RDP Shortpath for public networks
278
311
279
-
If you've participated in the preview of RDP Shortpath for public networks, you need to delete the following registry key as it is no longer required. Open an elevated PowerShell prompt and run the following command:
312
+
If you've participated in the preview of RDP Shortpath for public networks, you need to delete the following registry value as it is no longer required. Open an elevated PowerShell prompt on your session hosts and run the following command:
0 commit comments