Enable Remote Desktop Remotely

Quick tip on how to enable Remote Desktop remotely (by editing the remote registry)

1. On any computer that is running a version of Windows Server 2003 or Windows XP Professional, click Start, click Run, type regedit, and then click OK.

2. On the File menu, click Connect Network Registry.

3. In the Select Computer dialog box, type the computer name and then click Check Names.

4. In the Enter Network Password dialog box, provide Domain Admins credentials for the domain of the server, and then click OK.

5. After the computer name resolves, click OK.

6. In the computer node that appears in the Registry Editor, navigate to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server.

7. In the console tree, click Terminal Server and then, in the details pane, double-click fDenyTSConnections.

8. In the Edit DWORD Value box, in Value data, type 0, and then click OK.

9. Attempt to remote desktop into target machine. If necessary, reboot the server remotely to make registry edit effective, as follows:
Open a command prompt, type the following, and then press Enter:

shutdown -m \\machine -r

Duplicate info:

Either connect to the remote machine’s registry or download this utility: http://www.intelliadmin.com/index.php/2006/06/remotely-enable-remote-desktop/
 
regedit.exe >> connect to remote machine >> enter machine name >> browse to HKLM\System\CurrentControlSet\Control\Terminal Server >> change fDenyTSConnection from 1 (disabled) to 0 (enabled) >> send this remote reboot command: shutdown -m \\{workstation_name} -r -c “this system will reboot in 60 seconds” -t 60
 
netsh advfirewall firewall add rule name=”Allow Port 25″ dir=in action=allow protocol=TCP localport=25
 
Other cool tools: http://www.intelliadmin.com/index.php/downloads/
 
 
If connected to console on local machine, run these commands:
netsh advfirewall firewall set rule group=”remote desktop” new enable=Yes
reg add “HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server” /v fDenyTSConnections /t REG_DWORD /d 0 /f

Leave a Reply

Your email address will not be published. Required fields are marked *