![]() ![]() I have this issue on 3 Session Host servers, randomly. After that is done the ghostuserlogon will be killed without a reboot Search for the corresponding svchost PID en kill the process. Use Process explorer (sysinternals) and run it as admin. Unfortunately, you can't kill the svchost PID with taskmgr. There you will see a svchost proces with a particular PID. Rightclick winlogon.exe en select "analyze wait chain " You will go to the winlogon.exe proces in the detail tab for this user. Go to users > expand (4) user proceses en rightclick "Windows logon application" > select "go to details" Logon to the RDSH where the ghostuser (4) is happening and start taskmgr It's a bit dirty but in my case its working. I have found a workarround to kill/logoff this mysterious (4) user session without having to perform a reboot. When the user is stuck in the logoff process we see these (4) ghostusers appear. In our environment it happens randomly and we see a lot of 6006 eventID's in our application log with very slow logoff times (hundreds of seconds). I still don't know what is causing this issue, but it seems related to using User Profile disks which we use. Of course, depending on your business security level, you may need to go ahead with further settings for who can access and from where.We also have this annoying thing happening to our servers. These were the three basic methods to enable Remote Desktop connections in Windows Server 2016. To enable the rules in the Windows Firewall, follow the path below and set the policy Windows Firewall: Allow inbound Remote Desktop exceptions to Enabled.Ĭomputer Configuration \ Policies \ Administrative Templates \ Network \ Network Connections \ Windows Firewall \ Domain Profile To enable user authentication through Network Level Authentication (NLA), follow the path below and set the Require Network User Authentication policy to Enabled.Ĭomputer Configuration \ Policies \ Administrative Templates \ Remote Desktop Services \ Remote Desktop Session Host \ Security To enable Remote Desktop Connection, follow the path below and set the Allow users to connect remotely using Remote Desktop Services to Enabled.Ĭomputer Configuration \ Policies \ Administrative Templates \ Remote Desktop Services \ Remote Desktop Session Host \ Connections New-ItemProperty -Path 'HKLM:\System\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp\' -Name "UserAuthentication" -Value 1 -PropertyType dword -Force Enable Remote Desktop using Group Policy New-ItemProperty -Path 'HKLM:\System\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp\' -Name "UserAuthentication" -Value 1 -PropertyType dword -Force ![]() Commands should run in a PowerShell window with administrator privileges.īy running the following command, the Remote Desktop will be enabled, allowing connections via Terminal Services. To enable Remote Desktop through PowerShell, you will need to add two keys to the registry and a rule in the Windows Firewall. That’s it! Once you upgrade to Server Manager, you will see that the Remote Desktop setting has changed to Enabled. Once you’ve enabled the above setting, you’ll see a message to enable the corresponding Windows Firewall rule that will allow Remote Desktop Connection from any source address. At this point, you can choose whether to allow NLA connections by enabling the corresponding setting but also to select which additional users or groups to connect other than administrators. In the window that appears, enable the Allow remote connections to this computer setting. Here, click Disable in the Remote Desktop field. Open Server Manager and click Local Server from the left pane. Note: In Windows Server 2016 Essentials, Remote Desktop is enabled by default. So, you have to turn it on in order to access a Windows Server remotely.ĭepending on the case, we can enable the Remote Desktop directly using the graphical user interface, PowerShell or by implementing the appropriate policies through Group Policy. Remote management of Windows Server 2016 is enabled by default, but Remote Desktop, on the other hand, is disabled.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |