

Negotiate : which corresponds to the "Client compatible" option which allows to choose the best method according to what is supported by the client and by the server.

Then, double-click on the "Require use of specific security layer for remote (RDP) connections" policy.Įnable this policy and select "Security layer : SSL (TLS 1.0)".Īs you can see, you have the choice between 3 options :
#Server 2012 terminal services manager windows#
On your Active Directory server, open Group Policy Management and go to : Computer Configuration -> Policies -> Administrative Templates -> Windows Components -> Remote Desktop Services -> Remote Desktop Session Host -> Security. However, be aware that group policies has priority over the setting available in the server manager.

#Server 2012 terminal services manager Pc#
This means that if an attacker tries to trick the user with a fake server, the client PC will be able to detect this phishing attempt and will not communicate with this fake server. Indeed, on Windows Server 20 R2, it's possible and recommended to use the SSL security layer (TLS 1.0) which allows the server to be authenticated before sending data to this server. When you set up a RDS infrastructure (which is based on the Microsoft RDP protocol), it's important to secure it as much as possible to avoid hacker attacks and/or theft of confidential data.įor this, it's possible to secure the authentication of the RDP protocol in various ways and in particular through the use of SSL certificates.
