Systems Admin

Enable Remote Desktop using Windows Admin Center

Enabling Remote Desktop on a Windows Server is one of those tasks that has a small but annoying chicken-and-egg problem: the obvious way to enable RDP on a remote server is to RDP into it — which you can’t do until RDP is enabled. Windows Admin Center (WAC) is the cleanest way around it: WAC reaches the server over its existing management channel and toggles the Remote Desktop setting for you, no console session required. This walkthrough shows the full flow plus two ways to verify it worked.

Prerequisites

  • Windows Admin Center installed and reachable.
  • The target server already added to WAC’s All connections list (we’re using dc.smart.local).
  • The WAC gateway account has local administrator rights on the target.
  • If a firewall sits between you and the target, allow inbound TCP 3389 on the rules that face the management network.

Step 1: Pick the target server in Windows Admin Center

From the WAC home page, select the server you want to manage. In our example that’s dc.smart.local, a Windows Server 2022 Domain Controller managed by SMART\Administrator. The same flow works against any Windows Server in the connections list — not just DCs.

Windows Admin Center All connections list with the target server dc.smart.local highlighted.
Figure 1. Open Windows Admin Center and select the target server (here, dc.smart.local) from the All connections list.

Step 2: Settings → Remote Desktop → Allow + NLA → Save

Once you’re inside the server connection:

  1. Click Settings in the left tools rail.
  2. Choose Remote Desktop from the General settings list.
  3. Select Allow remote connections to this computer.
  4. Tick Allow connections only from computers running Remote Desktop with Network Level Authentication (recommended).
  5. Click Save.

That’s the entire enable step. WAC writes the equivalent of toggling the fDenyTSConnections registry value to 0 and turning on the Remote Desktop firewall rule, then opens the appropriate Windows Defender Firewall exception for TCP 3389. NLA is on by default in modern Windows Server — keep it that way; pre-NLA RDP exposes a half-authenticated RDP layer that’s a known scan target.

WAC Settings pane with Remote Desktop selected and Allow remote connections enabled with NLA.
Figure 2. Under the server Settings, choose Remote Desktop, select Allow remote connections to this computer with NLA, then click Save.

Step 3: Verify path A — classic mstsc client

From a workstation that can route to the server, launch the legacy Remote Desktop Connection client.

  1. Press Win+R and type mstsc, then click OK.
  2. Enter the target hostname (dc.smart.local) and click Connect.
  3. When prompted, supply domain credentials — for our DC, SMART\Administrator and the password.
  4. Click OK.
Windows Run dialog with mstsc typed in the Open box.
Figure 3. From a client machine, press Win+R and run mstsc to launch the Remote Desktop Connection client.
Remote Desktop Connection prompting for SMART domain administrator credentials for dc.smart.local.
Figure 4. Enter the server domain credentials (SMART\\Administrator) when the Windows Security prompt appears.

If the connection succeeds, you’ve confirmed two things at once: RDP is enabled on the server, and the path between your client and the server’s TCP 3389 listener is open through any intervening firewalls. If it fails, pinpoint where: a connection refused (port closed) usually means the firewall rule didn’t open or the RDP listener didn’t start, while a credential prompt that loops without error usually points at NLA or domain-trust issues rather than RDP being off.

Step 4 (optional): Confirm at the OS level

If you want a second-source confirmation, sign in to the server (locally or via the new RDP session) and open Server Manager. On the Local Server page, the Remote Desktop property should now read Enabled.

Server Manager Local Server panel on DC showing Remote Desktop status Enabled.
Figure 5. Optional verification: open Server Manager on the server and confirm Remote Desktop is Enabled in the Local Server properties.

This is purely diagnostic — if Step 3 worked, you already have the answer. But it’s a useful sanity check when you’re troubleshooting and want to be sure the WAC setting actually landed on the registry.

Step 5: Verify path B — in-browser RDP via WAC

WAC also ships with a built-in Remote Desktop tool that opens an RDP session right inside the browser, no mstsc required.

  1. Back on the server’s WAC tools rail, select Remote Desktop.
  2. On the Welcome to Remote Desktop form, enter your username (SMART\Administrator) and password.
  3. Pick a keyboard layout (default US).
  4. Leave Automatically connect with the certificate presented by this machine ticked (or untick it if you want to evaluate the cert each time).
  5. Click Connect.
WAC built-in Remote Desktop tool sign-in form for dc.smart.local.
Figure 6. Use the WAC built-in Remote Desktop tool: provide credentials and click Connect to open an in-browser RDP session.

WAC tunnels the RDP session through its gateway and renders the desktop in the browser tab. You get a Disconnect button and a Send Ctrl+Alt+Del button at the top of the embedded session.

In-browser Remote Desktop session inside Windows Admin Center showing DC Server Manager.
Figure 7. A successful in-browser RDP session inside Windows Admin Center, with full access to the server Server Manager.

This is the most useful path when you’re working from a machine that doesn’t have mstsc available, or when network policy only allows access through the WAC gateway. The functional difference between the two paths is the trust boundary: mstsc connects the client directly to TCP 3389 on the target, while WAC’s in-browser session goes client → WAC gateway → target, with the WAC server doing the RDP handshake.

Hardening notes

  • NLA stays on. Don’t uncheck the NLA box. Anything that can’t do NLA is old enough to be a liability anyway.
  • Restrict to a group, not Everyone. Add only the accounts that actually need RDP to the local Remote Desktop Users group on the target. Domain Admins implicitly have access; everyone else should be explicit.
  • Consider RD Gateway / just-in-time access. For internet-exposed scenarios put RDP behind RD Gateway with MFA, or use Azure / cloud just-in-time VM access so port 3389 isn’t open all the time.
  • Audit logons. Watch for Event ID 4624 (successful logon) with Logon Type 10 (RemoteInteractive) on the target. Anything outside expected business hours or coming from unfamiliar source IPs is worth investigating.

Conclusion

Enabling RDP through Windows Admin Center sidesteps the chicken-and-egg problem of needing RDP to enable RDP — WAC’s management channel is the bootstrap. The toggle takes seconds, NLA is on by default, and you can verify the result two ways: a classic mstsc connection from a workstation, or WAC’s own in-browser Remote Desktop tool. Either path is fine; pick whichever fits your access model. Just be sure to follow up with sane RDP hardening — restrict access to a named group, leave NLA on, and audit logons — before declaring the server production-ready.

Leave a Reply