Chapter 17

Remote Server Administration

The day-to-day administration of any server rarely occurs at the server. Instead, administrators commonly connect to servers remotely.

The servers are humming along smoothly in a cool (and sometimes downright cold) server room protected with physical security. Administrators are often in a comfortable office running a desktop system like Windows 7 or Windows 8. When administration is necessary, they connect to the servers remotely.

With this in mind, you need to know how to configure the servers for remote administration and connect to the servers from your desktop. Either that, or you will spend your time in the server room bundled up in a parka in the middle of the summer.

In this chapter, you will learn to:

Remote Desktop for Administration

Remote Desktop for Administration is the default implementation of Remote Desktop Services (RDS) on a Windows Server 2012 R2 server. In this mode, as many as two administrators can be remotely logged onto a server at the same time performing remote administration.

It’s also possible to configure a server as a Remote Desktop Session Host server so that it can run desktops or desktop applications for remote users. However, configuring the server as a Remote Desktop Session Host server requires additional licenses and a licensing server. When using the server in the Remote Desktop for Administration mode, no additional licensing is required.


Terminal Services Renamed
If you’ve been working with previous versions of Windows, you’re probably familiar with some of the RDS features but by a different name. In past versions, Remote Desktop Services was known as Terminal Services. It was renamed to RDS in Windows Server 2008 R2.

Remote Desktop for Administration allows you to connect to a server and do just about anything remotely that you could if you were physically at the server. You can access the Start menu, launch tools, install applications, install updates, and do much more when connected remotely. The two primary tools you’ll use are Remote Desktop Connection and Remote Desktop.

The primary limitation you have is if the remote system needs a reboot or restart. Although it is possible to reboot the system remotely, when you do so, you will be disconnected. If something prevents the system from rebooting, you won’t know what the problem is or be able to resolve it.

Configuring the Server for Remote Desktop

You can enable Remote Desktop on the server in several ways. You can access the advanced properties page of the server by one of the following methods:

Figure 17.2 shows the configuration choices you have on the Remote tab.

Figure 17.2 Configuring Remote Desktop from the Remote tab of the System Properties dialog box

image

You can see that Windows Server 2012 R2 provides three choices for configuring the server for remote administration:

Don’t Allow Remote Connections to This Computer Remote Desktop is disabled.
Allow Remote Connections to This Computer This will allow remote connections from clients.
Allow Connections Only from Computers Running Remote Desktop with Network Level Authentication (Recommended) This supports connections from clients using RDC 6.0 or newer. RDC 6.0 and newer are available on Windows Vista and Windows 7. RDC 6.1 can be installed on Windows XP systems with at least SP2 installed.

When you enable Remote Desktop Connection, an exception is automatically created in the firewall on the local system. It’s not necessary to add other exceptions on the local firewall. However, if you connect through a network firewall, port 3389 needs to be opened to allow the remote connections through. If opening port 3389 on your network firewall is not feasible in your network, you can create a Remote Desktop Gateway server as described later in this chapter.

Network Level Authentication (NLA) is a security feature available in Remote Desktop Services when the more secure setting is selected. NLA provides added security by completing the user authentication before the remote connection is established. If NLA is not used, the server is vulnerable to a denial-of-service attack.

NLA should be used whenever possible. The following are the requirements to support NLA:


RDC 6.1 for Windows XP
The original version of RDC used in Windows XP doesn’t support NLA. However, Microsoft later created RDC 6.1 for clients running Windows XP SP2 or SP3 that provides support for many of the features available in Windows Server 2012 R2 connections.
RDC 6.1 is available as a free download and is documented in KB article 952155 (http://support.microsoft.com/kb/952155/). RDC 6.0 is supported in Windows XP SP3.
Additionally, the CredSSP protocol can be enabled via a registry modification on Windows XP, as described in KB article 951608 (http://support.microsoft.com/kb/951608/).

Using Remote Desktop Connection

Remote Desktop Connection (RDC) is used to connect to a remote server. The version that works best with Windows Server 2012 R2 is RDC 6.0 or greater. Earlier versions don’t support all of the features available, such as NLA.

You can launch RDC in Windows Vista, Windows 7, and Windows Server 2008 R2 by selecting Start image All Programs image Accessories image Remote Desktop Connection. Once RDC is launched, you can click the Options button to view all the options available, as shown in Figure 17.3.

Figure 17.3 Remote Desktop Connection with Options expanded

image

Accessing RDC on Windows 8 and Windows Server 2012 R2 is a little different:

1. Hit your Windows key to get to your Metro-styled Start screen.
2. In the lower-right corner is a minimize icon. It’s a hotspot you can mouse over. When the sidebar appears, simply type remote in the search box.
3. As you start to type in the search box, you will see Remote Desktop Connection appear on the left, as shown in Figure 17.4.

Figure 17.4 Getting to RDC on Windows Server 2012 R2

image

RDC includes six tabs that can be manipulated to provide different features, as detailed in the following sections.

RDC General Tab

The General tab is used to identify the remote computer you want to connect with and the user account you’ll use to connect. Additionally, you can save your settings in a Remote Desktop Protocol file from this page.

By saving your settings in an RDP file, you can simply double-click the file to start the session. Follow these steps to save and use your RDP file:


Remote Sessions Are Possible on Local Computers
If you have only one computer, you can still follow these steps. It’s possible to log onto the remote session of a computer while logged on locally. You should use a different account with administrative permissions for the remote session. Although this wouldn’t be very useful on the job, it does allow you to see the process in a test system.

1. Launch Remote Desktop Connection.
2. Click the Options button to expand the options.
3. Enter the remote computer’s computer name in the Computer text box.
4. Enter a username that has permission to use RDC on the remote computer.
If you want this username to be saved, select the “Allow me to save credentials” check box. You will be prompted for the password later.
5. Click Save As, and browse to the desktop. Rename the filename to RDC.rdp, and click Save.
6. Close the Remote Desktop Connection application.
7. Access your computer’s desktop, and double-click the RDC.rdp file to launch it.
8. Review the warnings on this dialog box, as shown in Figure 17.5.

Figure 17.5 Remote Desktop Connection unknown publisher warning

image
9. Click Details in the dialog box.
This dialog box allows you to pick some local resources that you can bring to your remote session. You can also manipulate local resource settings on the Local Resources tab when the Remote Desktop Connection tool opens.
10. Since you created the RDP file, you can trust it and ignore the warnings. Click Connect.
A dialog box appears allowing you to enter the password for your account or use another account.
11. Enter the password for an account with administrative privileges, and click OK.
After a moment, another warning will appear similar to the one in Figure 17.6.

Figure 17.6 Remote Desktop Connection unknown certifying authority warning

image
12. Click Yes to connect despite the warning.
Your system will then connect to the remote session. Take your time looking around in the remote session.
If you used the defaults in RDC, the connection bar will display across the top of the screen with the name of the server. If you click the X to close the screen, you will disconnect the session, but you won’t close it. The session will remain open, consuming resources, either until you reconnect or log off, or until another administrator closes your session.
13. Click Start, and select Log Off to log off and close the session.

Unknown Publisher Warnings
When using an unsigned RDP file, you’ll see two warnings indicating that the publisher of the remote connection cannot be identified and asking you whether you want to connect anyway. The first warning is shown at the top of the dialog box in Figure 17.5, and the second warning is shown in Figure 17.6.
RDP files can be signed using certificates for security. A signed RDP file has a signature within it indicating the identity of the client of the certificate authority (CA) that verified the identity. If you trust the CA, you’ll trust this RDP file. When distributing RDP files to many clients, this added security feature can be quite valuable.
However, RDP files don’t have to be signed. Since you are creating this RDP file, you can simply ignore the warnings.

The RDP file is associated with the Remote Desktop Connection application, so by double-clicking it, you will launch RDC. However, this RDP file is simply a text file. If you want to look at the contents, you can launch Notepad and browse to the file to see the contents.

RDC Display Tab

The Display tab allows you to configure the display for the remote desktop. You can configure the size of the desktop and the colors from this page. Figure 17.7 shows the Display tab.

Figure 17.7 Remote Desktop Connection Display tab

image

If you drag the slider all the way to the right, the remote desktop will display in full-screen mode. By default, a connection bar will be displayed across the top when in full-screen mode.


Increased Performance over a WAN Link
If you’re accessing the remote server over a slow WAN connection, you can get increased performance by using a smaller screen or reducing the number of colors displayed. This isn’t a problem in a well-connected network with a maximum of two remote sessions, but with a slow link, every bit helps.

The connection bar includes the name of the remote server, which can be useful if you have more than one instance of RDC running at a time. For example, if you’re troubleshooting a problem and remote into three different servers using three different instances of RDC, you can quickly glance at the connection bar at the top of the window to remind yourself which server you’re accessing.

When you remote into a server using RDC in full-screen mode, this connection bar is the only apparent difference you’ll see. Everything else will look as if you’re standing in front of the server.

At the left of the connection bar is a pushpin icon. It is selected by default and pins the connection bar to the top of the screen. You can deselect it to enable autohiding of the connection bar.

RDC Local Resources Tab

The Local Resources tab allows you to identify what resources you can bring to your remote session. For example, if you have a printer attached to your system and you want to print a log from the remote server, you can enable the local printer.

Microsoft introduced Easy Print in Windows Server 2008, which makes printer redirection easier with Remote Desktop Services and ensures that the client printers are installed in remote sessions. You don’t have to install the print drivers on the server in order to print from an RDS session.

You can click the More button to enable additional resources during the remote session. Figure 17.8 shows the Local Resources tab and the additional resources that can be enabled after clicking the More button.

Figure 17.8 The Remote Desktop Connection Local Resources tab, with additional options

image

The primary reason why you’ll access this tab is to enable or disable local devices and resources. Local printers and the local clipboard are enabled by default. The local clipboard allows you to copy text from your system (such as a script) and paste it into an application in the remote session.

Local drives are not enabled by default, but if you want to copy data from a local drive to the remote system, you can easily select the box. This does represent a security risk, though. If either the remote system or your local system is infected with malware, connecting the drives makes them accessible by the malware and susceptible to infection.

You can also configure the audio and keyboard settings. Audio settings include the following:

If you’re a fan of keyboard shortcuts, you may want to change the keyboard settings. The choices are as follows:

RDC Programs Tab

The Programs tab allows you to identify a program that will start when the remote connection is established. For example, you may always launch Server Manager when you start a specific server and want it to start automatically.

Figure 17.9 shows the RDC Programs tab. ServerManager.msc is entered in the text box, which will cause Server Manager to start when the connection is created.

Figure 17.9 Remote Desktop Connection Programs tab

image

Since the path of Server Manager is already known by the system to be %systemroot%\System32, the path doesn’t need to be included. However, if you wanted to launch a different program or script from an unknown path, you would need to include the full path.


System Path Variable
You can identify what the known path of the system is by accessing the command line, typing Path, and pressing Enter. Any application in this path can be entered by just entering the name of the application.
You can modify this path by clicking Start, right-clicking Computer, selecting Properties, and then selecting “Advanced system settings.” Select the Advanced tab of System Properties, and click the Environment Variables button. You can then select the Path system variable, and click Edit to modify it. You shouldn’t delete any paths, but you can add paths by entering a semicolon and the additional paths.

RDC Experience Tab

You can add or remove different features from the RDC Experience tab. Different features such as the desktop background, menu and window animations, and visual styles are available to enhance the remote connection’s display or experience.

Figure 17.10 shows the RDC Experience tab with the connection speed set to “LAN (10 Mbps or higher).” These features take additional bandwidth, so default features are selected based on the connection speed selected on this page.

Figure 17.10 Remote Desktop Connection Experience tab

image

If you’re connected in a local LAN, you have high-speed connectivity, so all of the features are available. If you see a decrease in performance, you can deselect some of the features. Additionally, if you connect using a modem over a 56 Kbps connection, you could select the Modem (56 Kbps) setting, and only persistent bitmap caching will be enabled by default.

The speed selection isn’t automatically determined. When it is selected, default features are selected, but you can easily add or remove these features by selecting or deselecting the corresponding check boxes.

This page also includes the setting “Reconnect if the connection is dropped.” This is useful on unreliable links. If the network connection is dropped, RDC will automatically try to reconnect.

RDC Advanced Tab

The RDC Advanced tab includes two sections: “Server authentication” and “Connect from anywhere.”

Server authentication is a new security feature available when connecting to Windows Server 2008 or later servers. It provides verification that you are connecting to the computer that you intended to connect to, and it helps prevent the unintentional disclosure of confidential information.

You have three choices with server authentication:

Connect and Don’t Warn Me You can use this if you are consistently connecting to pre–Windows Server 2008 servers that don’t support server authentication. Since these servers don’t support server authentication, they will always give warnings.
Warn Me This is the default. It would be used in a mixed environment of Windows Server servers and Windows 2003 (or older) servers.
Do Not Connect If your environment is all Windows Server 2008 servers or newer, this setting will ensure that connections aren’t created if the server can’t authenticate.

Figure 17.11 shows the Remote Desktop Connection Advanced tab with the Remote Desktop Gateway (RD Gateway) settings expanded.

Figure 17.11 Remote Desktop Connection Advanced tab and Remote Desktop Gateway settings

image

If you are connecting to a remote server through an RD Gateway server, you will configure the connection settings here. RD Gateway will be covered in more detail later in this chapter.

The important thing to realize is that the server name you enter here is that of the gateway server. RDC will connect to this RDC server first and then to the remote server identified on the General tab.

You will need to authenticate with both the RD Gateway server and the remote computer. If you use the same credentials for both, you can leave the “Use my RD Gateway credentials for the remote computer” check box selected. With this check box selected, you will be challenged only once. If you deselect it, you will be challenged at both servers, and you can enter different credentials for each.

Although knowing what each of the tabs within the Remote Desktop Connection can do for you is useful, you’ll want to know some other details. For example, you can launch it from the command line, and with any command-line command, there are useful switches to master. Additionally, you can control several different limitations on remote connections.

MSTSC

You can launch the Remote Desktop Connection from the Run line or the command line using the mstsc.exe command. The name mstsc is derived from Microsoft Terminal Services Connection. Even though Terminal Services has been renamed to Remote Desktop Services, the mstsc command is still the same.

You can access the help screen for mstsc by entering mstsc /? at the command line. The following items show some of the common usages for mstsc:

Default Usage Use the following command to launch Remote Desktop Connection (RDC):
mstsc
Identify a Server Connect to a server named Srv1 using the /v switch:
mstsc /v:Srv1
Use an RDP File Launch RDC using an RDP file located in the path c:\data\srv1.rdp:
mstsc c:\data\Srv1.rdp
Connect in Full-Screen Mode Use the /f switch to launch RDC in full-screen mode after the connection is established:
mstsc /f
Use Multiple Monitors If you want RDC to be able to span multiple monitors available on your local system, use the /span switch. This will cause the remote system to use the same width and height of your local desktop.
mstsc /span
Connect for Administrative Purposes The /admin switch is used to connect to a Windows Server 2012 R2 server for administrative purposes. This is meaningful only if the server has the Remote Desktop Services installed. In other words, when the server is being used for Remote Desktop for Administration mode only, all connections are for administrative purposes, and this switch isn’t needed. However, if the server is configured as a Remote Desktop Session Host server, you can use this switch to connect to one of the two administrator sessions.
You can also use the /admin switch to launch RDC in legacy console mode when connecting to Windows Server 2003 servers. Windows Server 2003 servers support a console session that isn’t supported in Windows Server 2012 R2. The /admin switch will connect to the console session in Windows Server 2003.

Connection Limitations

Only two connections are allowed to the server when it is used for normal administrative connections. In other words, only two administrators can be logged onto a single server at a time.

If the server is used to host desktops or applications for end users, then you can have as many connections as you need. Remote Desktop Services requires licenses for connections when used in Remote Desktop session host server mode. However, licenses are not required for the two administrator connections.

The two connections include either remote sessions or the session at the computer. Previous operating systems allowed you to connect to two remote sessions and the session at the computer. The session at the computer was referred to as the console session and you were even able to connect to this console session remotely, but the console session is no longer available.

Figure 17.12 shows the result if a third user tries to connect when two sessions are already active.

Figure 17.12 Blocking the third remote session

image

In the figure, a user named Darril is physically located at the server and logged on. Sally is connected via a remote session. Joe tries to log on, but since his session will be the third session, it is blocked. Notice that the dialog box also indicates whether these sessions are active or idle. In the figure, Sally’s session has been idle for 11 minutes, and Darril’s session is active.

If Joe selects the check box next to “Force disconnect of this user” and selects one of the users, that user will be immediately disconnected with a message saying this:

Your Remote Desktop session has ended. Another user connected to the remote computer so your connection was lost. Try connecting again, or contact your network administrator or technical support group.

If Joe doesn’t select the check box but instead just selects one of the users to disconnect the session, the user will get a notification. Figure 17.13 shows what appears on Darril’s session when Joe tries to disconnect it without the check box selected. If Darril is working at the computer, he can see this connection attempt and click Cancel to block it. Otherwise, the request will automatically disconnect Darril’s session after 30 seconds and allow Joe’s session.

Figure 17.13 Disconnect request

image

If Darril was active and clicked Cancel, Joe would receive a notification indicating that the logged-on user denied the disconnect request.


Active Connections for Inactive Sessions
This method of closing an inactive administrator session provides a real-world solution to a common problem. We’ve worked in some large environments where administrators connect remotely to a server, but instead of logging off, they simply disconnect by closing the RDC application.
When this happens, the inactive session is left open on the server. If the server has reached the maximum number of sessions, other administrators can’t log into a remote session. These inactive sessions would stay open until they timed out (if time-out settings were configured), the user logged back in and closed the session, or the session was closed in Remote Desktop Services Manager.
With the features now available in RDC, you can easily see who’s connected, whether the session is active or idle, and even choose to disconnect the session.

Installing Remote Desktop Services with Session Host Service

For the next few sections of this chapter you will need the Remote Desktop Services role installed on the server.

To install this role, do the following:

1. Open the Server Manager Dashboard, and click Add Roles and Features.
2. Click Next to get past the “Before you begin” screen.
3. On the next screen (Figure 17.14) select “Role-based or feature-based installation.”

Figure 17.14 Select the type of role installation

image
4. Next, select the server that you will install the role on.
As you can see in Figure 17.15, we only have one server available to us. Select the server and click Next.

Figure 17.15 Select the server on which to install the RDS role.

image
5. Select the Remote Desktop Services role, as shown in Figure 17.16, and click Next.

Figure 17.16 Selecting the Remote Desktop Services role

image
6. Since you do not need any features shown in the Features screen in Figure 17.17, just click Next to continue.

Figure 17.17 Features selection screen

image
Figure 17.18 shows the summary screen explaining which role you are about to install. Seems like a waste to have this here. If you don’t know what role you’re installing by now, you should . . . never mind!

Figure 17.18 Role summary screen

image
7. In the next screen, shown in Figure 17.19, the following role services are available:

Figure 17.19 Selecting role services

image
Remote Desktop Connection Broker Allows users to reconnect to their existing virtual desktops and session-based desktops. It also enables you to load-balance the pooled virtual desktops in a collection.
Remote Desktop Gateway Enables authorized users to connect to an internal corporate network from any Internet-connected device.
Remote Desktop Licensing Manages the licenses required to connect to a Remote Desktop Session Host server.
Remote Desktop Session Host Enables a server to host session-based desktops.
Remote Desktop Virtualization Host Integrates with Hyper-V to deploy pooled or personal virtual desktop collections within your organization by using Remote Desktop Connection.
Remote Desktop Web Access Allows users to connect via a web browser.
Select Remote Desktop Session Host.
As you select the service you may get a pop-up screen asking you to install additional features to support your selections.
8. Select Add Features to install the supporting features.
Figure 17.20 shows the Network Policy and Access Services screen, letting us know we will need to also install this role service on the next screen.

Figure 17.20 Network Policy and Access Services notification

image
9. In Figure 17.21 you can see that the Network Policy Server is selected for us by default. Click Next to continue.

Figure 17.21 Network Policy Server

image
We are almost finished. In Figure 17.22 you see the confirmation page for the role we are about to install.

Figure 17.22 Role Confirmation page

image
10. Check the box to restart the server after installation.
11. Click Install to begin the installation of the Remote Desktop Services and all its supporting features.
In Figure 17.23 you can see the progress of our installation.

Figure 17.23 Installation progress

image
12. After the server reboots, log in and you will see that the Server Manager menu has added the Remote Desktop Services option.

Configuring Host Session Properties

In Windows Server 2012 R2, you can no longer use the Remote Desktop Session Host Configuration Tool that you may have used in Windows Server 2008 R2.

You can configure session properties for remote sessions in the Remote Desktop Session Host from within Group Policy Management Editor. You can access this tool by hitting your Windows key and choosing Group Policy Management.

The primary configuration you’ll use here when using Remote Desktop Services is the Remote Desktop Session Host. Figure 17.24 shows the properties available for Remote Desktop Session Host.

Figure 17.24 Using Group Policy Manager to configure Desktop Session Host

image

Since there are so many properties listed, we just discuss a couple of important ones you should be concerned with.

Security Since users will be remotely accessing the server, security properties should be an administrator’s concern. The following are the security properties you can set:
Server Authentication Certificate Template This policy setting allows you to specify the name of the certificate template that determines which certificate is automatically selected to authenticate an RD Session Host server.
Set Client Connection Encryption Level This policy setting specifies whether to require the use of a specific encryption level to secure communications between client computers and RD Session Host servers during Remote Desktop Protocol connections.
Always Prompt for Password upon Connection You can use this setting to enforce a password prompt for users logging onto Remote Desktop Services, even if they already provided the password in the Remote Desktop Connection client.
Require Secure RPC Communications You can use this setting to strengthen the security of RPC communication with clients by allowing only authenticated and encrypted requests.
Require Use of Specific Security Layer for Remote (RDP) Connections This policy setting specifies whether to require the use of a specific security layer to secure communications between clients and RD Session Host servers during Remote Desktop Protocol connections.
Do Not Allow Local Administrators to Customize Permissions You can use this setting to prevent administrators from making changes to the user groups allowed to connect remotely to the RD Session Host server. By default, administrators are able to make such changes.
Require User Authentication for Remote Connections by Using Network Level Authentication If you enable this policy setting, only client computers that support Network Level Authentication can connect to the RD Session Host server.
Session Time Limits The other properties you will probably find yourself changing will be the session time limits. The following are the session time limit properties with a short description of each.
Set Time Limit for Disconnected Sessions You can use this policy setting to specify the maximum amount of time that a disconnected session remains active on the server. By default, Remote Desktop Services allows users to disconnect from a Remote Desktop Services session without logging off and ending the session.
Set Time Limit for Active but Idle Remote Desktop Services Sessions If you enable this policy setting, you must select the desired time limit in the idle session limit list. Remote Desktop Services will automatically disconnect active but idle sessions after the specified amount of time. The user receives a warning two minutes before the session disconnects, which allows the user to press a key or move the mouse to keep the session active.
Set Time Limit for Active Remote Desktop Services Sessions This policy setting allows you to specify the maximum amount of time that a Remote Desktop Services session can be active before it is automatically disconnected.
End Session When Time Limits Are Reached This policy setting specifies whether to end a Remote Desktop Services session that has timed out instead of disconnecting it.
Set Time Limit for Logoff of RemoteApp Sessions This policy setting allows you to specify how long a user’s RemoteApp session will remain in a disconnected state before the session is logged off from the RD Session Host server.
By default, if a user closes a RemoteApp program, the session is disconnected from the RD Session Host server.

Although the Remote Desktop Connection is an extremely valuable tool to remotely administer servers within a controlled LAN, sometimes it won’t meet your needs. For example, you may want to remotely connect to a server over the Internet, but the firewall administrators simply refuse to open the ports. Remote Desktop Gateway may be exactly what you need.

Remote Desktop Gateway

RD Gateway is used to allow connections to an internal network via the Internet. When RD Gateway is enabled, users can connect to resources on an internal network from any Internet-connected device. RD Gateway works the same way whether it’s used to allow an administrator to access an internal resource or to allow a regular user to access a Session Host server, as covered in Chapter 29, “Installing, Using, and Administering Remote Desktop Services.”

RD Gateway uses the Remote Desktop Protocol over HTTPS to establish a secure, encrypted connection between the remote users and the internal resource.

Figure 17.25 shows how RD Gateway could be configured. A Windows Server 2012 R2 server named BF4 is placed in the DMZ with the Remote Desktop Gateway role service installed. The client can connect to BF4 over the Internet using RDP over HTTPS.

Figure 17.25 RD Gateway providing access to an internal server

image

HTTPS uses Secure Sockets Layer (SSL) to encrypt the session and uses port 443. The external firewall needs port 443 open to support the HTTPS traffic.

BF4 will authenticate the client and act as the gateway to internal resources. RD Gateway can be configured with a resource authorization policy to restrict access to a single server (such as BF2 in the figure) or any resources in the network.

Remote Desktop Connection Authorization Policies (RD CAP) are used to restrict who can connect to the RD Gateway server. Remote Desktop Resource Authorization Policies (RD RAP) are used to restrict which servers can be accessed once a user connects.


TS Gateway Renamed to RD Gateway
RD Gateway was previously known as Terminal Services Gateway (TS Gateway). Since Terminal Services has been renamed to Remote Desktop Services, it has affected other names, including the RD Gateway.

In past versions of Windows, it was possible to remotely administer servers from the Internet. However, you had to open port 3389 on the firewall (or convince the firewall administrator to open the port). But every additional port opened on a firewall represents an additional vulnerability that needs to be managed.

From a security standpoint, it’s much easier to simply leave the port closed. Even though remote administration through port 3389 was a useful feature, it was often blocked at the network firewall to mitigate the associated security risks.

Since RD Gateway uses RDP over HTTPS through port 443, the external firewall needs only port 443 open. Port 443 is commonly open to allow other HTTPS traffic through. If port 443 is open for other HTTPS traffic, you don’t need to open additional ports to use RDP over HTTPS.

As an example, if a company was hosting a web server using HTTP and HTTPS, ports 80 and 443 would be open to support the web server. You can then implement RD Gateway on a server in the DMZ without modifying the firewall.

Even if port 443 isn’t already open, the security of HTTPS is well understood by most administrators. It’s easier for an administrator to weigh the risks of HTTPS and make a decision to open this port than it is to consider opening port 3389 for remote administration traffic.

Remote Desktop Connection Client

RD Gateway supports connections from Remote Desktop Connection 6.0 or greater. However, to support all the features available in RD Gateway in Windows Server 2012 R2, Remote Desktop Protocol 8.0 is recommended. This is natively provided in the RDC client supplied with Windows 8 and Windows 2012. The RDP 8.0 client is also available as an add-on for Windows 7 SP1 and Windows Server 2008 R2 SP1 (http://support.microsoft.com/kb/2592687).

Although these features are most useful when using Remote Desktop Services to host desktops and remote applications, administrators may find them useful too. These are some of the additional features that are available:

RemoteFX RemoteFX technologies enhance the user’s visual user interface experience. There are a number of new improvements affecting RemoteFx:
Support for Nested Sessions You can now run a remote desktop session from within another remote desktop session.
Performance Counters for Monitoring the User Experience Performance counters let administrators monitor and troubleshoot user experience issues.

RD Gateway–Required Services and Features

RD Gateway requires the following additional role services and features on the Windows Server 2012 R2 server where it is hosted (which we had you install earlier in this section):

When you add the RD Gateway role, the wizard will prompt you to automatically install all the required roles, services, and features. You won’t need to install them individually. However, if they are already installed, the wizard will recognize that they are active.

RD Gateway–Required Policies

Before users can connect through RD Gateway, you must have at least two policies:

RD Connection Authorization Policy (RD CAP) RD CAP specifies the users who can connect to the RD Gateway server. For example, you may choose to give anyone in the Administrators group of the RD Gateway server permission to connect, or you could create a global security group (such as G RD Gateway Users) specifically for this purpose. You would then place any users for whom you want to grant connection access into this new global group.
RD Resource Allocation Policy (RD RAP) RD RAP specifies the resources that users can access once they connect. For example, you may be creating this policy so that administrators can remotely administer a specific server. You would identify the server in RD RAP. Administrators could connect to this server but not to any other servers via the RD Gateway server.
It’s also possible to configure RD RAP so that users can connect to any computer on the network without any restrictions.

Enabling Remote Desktop Gateway

Follow these steps to enable the Remote Desktop Gateway role service on a Windows Server 2012 R2 server. These steps will also lead you through adding the required roles, services, and features, as well as RD CAP and RD RAP:

1. Launch Server Manager from your taskbar.
2. Select Roles, and click Add Roles.
3. Review the information on the “Before you begin” page, and click Next.
4. Select the Role-Based Installation radio button and click Next.
5. Select the server to install it on, and click Next.
6. Expand the Remote Desktop Services role on the Select Server Roles page, and select Remote Desktop Gateway. Click Next.
7. You will be prompted that additional features may need to be installed. Click Add Features.
8. When the pop-up closes, click Next.
9. Click Next again on the features page.
10. Review the information on the Network Policy and Access Services page, and click Next.
11. Network Policy should be a selected role service; click Next.
12. Review the Confirmation page, select the check box to restart the server if needed, and click Install.

After a few minutes and a server reboot, you should have RD Gateway installed on your server. To access it you can hit your Windows key. You will see a new Metro-style button called Remote Desktop Gateway, as shown in Figure 17.26.

Figure 17.26 Remote Desktop Gateway

image

Once you get inside the RD Gateway Manager, you can see that it’s very similar to the Group Policy Management tool. You can manage all aspects of the RD Gateway using this tool.

On the left window pane you will see your server with two folders underneath: Policies and Monitoring. If you click the server you will see current connection information and any outstanding configurations required, as shown in Figure 17.27.

Figure 17.27 Gateway connection information

image

As you can see in Figure 17.27, we still need to configure the Gateway certificate.

1. Click the link “View or modify certificate properties.”
The Choose a Server Authentication Certificate for SSL Encryption page will appear. You can install an existing certificate, create a self-signed certificate, or import a certificate.
You can purchase a certificate from an external CA or obtain one from an internal CA.
2. For these steps, choose the option “Create a self-signed certificate for SSL encryption.” Click “Create and Import Certificate.”
3. In Figure 17.28 you see that we can create our self-signed certificate using the defaults. Click OK.

Figure 17.28 Create your self-signed certificate.

image

You can see in Figure 17.29 that our certificate has installed successfully.

Figure 17.29 Certificate installed properly

image

Figure 17.30 shows that we still have a few configuration items to attend to. The first one is Remote Desktop Connection Authorization Policy, and the other is Remote Desktop Resource Authorization Policies. For those of you familiar with Windows Server 2008 R2, you may have noticed that all three of these, starting with the certificate, are configured during the installation of the Remote Desktop Services role. In Windows Server 2012 R2 they get configured in Gateway Manager.

Figure 17.30 Requirements needed to complete gateway configuration

image

Obtaining a Certificate from a CA
Self-signed certificates are useful for testing, but it is not recommended to use a self-signed certificate in a production environment. Instead, you should obtain a certificate from a certificate authority. Since a certificate used by RD Gateway for administration will be used only by administrators, you can use an internal CA to create a certificate instead of purchasing a certificate from an external CA.

1. Let’s configure RD CAP by selecting the link “Create connection authorization policy,” shown in Figure 17.30.
2. Under the General tab of the New RD CAP dialog box, enter a policy name, as shown in Figure 17.31.

Figure 17.31 Enter a policy name.

image
Under the Requirements tab, you can add permissions for groups and client computer membership. As you can see in Figure 17.32, we added Remote Management Users.

Figure 17.32 Requirements tab

image
The next tab is Device Redirection, allowing or denying the use of these devices during the session.
3. As shown in Figure 17.33, select the default to allow all devices on the client.

Figure 17.33 Device Redirection tab

image
4. The last tab is the Timeouts tab. Set your session timeouts as desired (see Figure 17.34).

Figure 17.34 Timeouts tab

image
5. Click OK.

Your newly created policy will now show up in the Connection Authorization Policy window. You will also notice that the requirement on the Gateway property has been fulfilled.

As we mentioned earlier, we also need to set the Remote Desktop Resource Authorization Policy. This will fulfill the last requirement to setting up the Remote Desktop Gateway. This is very similar to the procedure you just completed for RD CAP:

1. On the Gateway summary page for the server, click the link Create Resource Authorization Policy. This will open the properties for the RD RAP.
2. Under the General tab, add a policy name and policy description, as we have done in Figure 17.35.

Figure 17.35 Add a policy name and description.

image
3. The User Groups tab is for adding the group permission for this policy. As shown in Figure 17.36, add your Remote Management Users group.

Figure 17.36 Add a group to the User Groups tab.

image
4. Under the Network Resource tab, add the network resource groups.
5. Select “Allow users to connect to any network resource,” as shown in Figure 17.37.

Figure 17.37 Network Resource tab

image
6. The last tab is for selecting allowed ports; select to allow only port 3389, as shown in Figure 17.38.

Figure 17.38 Allow Ports tab

image

Congratulations! Your gateway is now configured and ready to allow connections.

Remote Desktop Connection and Remote Gateway are both valuable tools used to remotely administer servers. However, each of these will launch as single instances. There may be times when you’re charged with managing multiple servers and you want to manage them through a single tool. Remote Desktops is your solution.

Configuring a Server for Remote Assistance

Remote Assistance is primarily a feature used on desktop systems and is not enabled by default on Windows Server 2012 R2. However, if you have a large organization with junior administrators in remote locations, it can be very useful to you.

For example, imagine you work at the main location of your company and your company has a remote office with only 20 people. One of these employees occasionally performs routine tasks on the server located in the remote office but may need some help. With Remote Assistance enabled, they can send you a request for assistance. You can then access the remote server’s desktop and demonstrate how to perform a task.

The Remote Assistance check box in System Properties is grayed out and can’t be enabled until the Remote Assistance feature is added to Windows Server 2012 R2. The following steps show how to enable Remote Assistance:

1. Launch Server Manager.
2. Select “Add roles and features.”
3. Accept the defaults until you get to the features.
4. Select the Remote Assistance check box, and click Next.
5. Click Install on the Confirmation page.
6. When the wizard completes, click Close.

With the Remote Assistance feature added, Remote Assistance should now be enabled on the server. You can verify it with these steps:

1. Press the Windows key, right-click Computer, and select Properties from the taskbar.
2. Click Remote Settings.
3. Verify that the “Allow Remote Assistance connections to this computer” check box is selected.
4. Click the Advanced button. Verify that the “Allow this computer to be controlled remotely” check box is selected.
The default lifetime of invitations is six hours, but it can be changed. After the time limit has passed, the invitation can no longer be used to connect.

This server is now configured for Remote Assistance. To start a Remote Assistance session, the user needs to send a Remote Assistance request.

Sending a Remote Assistance Request

The user who needs assistance should follow these steps to create a Remote Assistance request and begin the process:

1. Click Start, type msra in the Run box, and press Enter. The Windows Remote Assistance dialog box will appear.
2. Click “Invite someone you trust to help you.”
3. Click “Save this invitation as a file.”
4. Browse to a location on your hard drive. The invitation file is named Invitation.msrcIncident by default but can be changed if desired. Click Save.
5. A password is automatically created and can’t be changed. You’ll need to tell the helper this password.
6. Send the invitation to a helper as an email attachment, or place it on a share accessible to the helper.

At this point, the person needing help must wait for the response from the helper.

Responding to a Remote Assistance Request

The helper can follow these steps with the person requesting assistance to begin a Remote Assistance session:

1. Double-click the invitation received from the person requesting help.
This invitation could have been received via email or available on a share. It will take a moment for this invitation to open.
2. Enter the password in the Windows Remote Assistance dialog box, and click OK.
If you enter an incorrect password, you will be notified immediately.
The user requesting help will see a dialog box appear asking whether they want to allow the connection.
3. The user should click Yes.
At this point, you will be able to see everything on the user’s desktop, but you won’t be able to interact with the desktop.
4. Click the Request Control button at the top of the Windows Remote Assistance window.
The user will see a dialog box appear asking whether they want to allow the helper to share control of the desktop.
5. The user should click Yes.
Note that the user has complete control and can deny the request. However, since the user requested assistance and gave the password, they would click Yes.

The helper can now control the mouse on the remote computer. Figure 17.39 shows the Windows Remote Assistance window viewed by the person being helped.

Figure 17.39 Remote Assistance session on a remote computer

image

At this point, the helper can manipulate the mouse and keyboard of the remote desktop to demonstrate any tasks. This is shared control. In other words, both the helper and the user have control over the desktop.

It’s useful if the helper and user are able to talk over the phone during this process, but it’s not necessary. The Windows Remote Assistance dialog boxes include a Chat feature that allows each of the users to type questions and comments.

The helper could demonstrate a task and then simply type “now you try it” while observing the desktop. The helper could stop using the mouse, and the user could perform the same steps on their computer. Additionally, the user being helped can end the session whenever they want to by clicking Stop Sharing or Pause.

Windows Remote Management Service

The Windows Remote Management Service (WinRM) will allow you to issue any command-line command from one computer against a remote computer.

For example, you may be working on a Windows 7 or Windows 8 computer, but you want to query some information from a remote server. If the server has been configured with WinRM, you can execute a WinRS command-line command from the desktop system and get the results just as if you were at the computer or connected with RDC.

One of the benefits of this is that you don’t need to consume one of the two remote sessions for a server or even launch RDC. You can simply enter the command at your command prompt.

The following are the two commands used by the Windows Remote Management Service:

WinRM The WinRM tool is executed on the remote server and enables the server to listen and respond to WinRS requests.
WinRS The WinRS tool is executed from the command line on a desktop or other server accessed by an administrator. It allows the administrator to execute any command-line commands against the remote server.

Enabling WinRM

WinRM is not enabled by default on Windows Server 2012 R2. You can use the following steps to enable WinRM on the server.


RD Gateway Enables WinRM
WinRM is not enabled to allow remote access for management by default. However, if you followed the steps to enable RD Gateway earlier in this chapter, you’ll find that WinRM has been enabled on the same server. RD Gateway uses the Windows Remote Management service and enables it when the role service is installed. If you follow these steps, it will inform you that WinRM is already configured.

1. Select Power Shell and type cmd at the command prompt.
2. Type the following command, and press Enter:
WinRM qc
You will be promoted to allow the following changes to be made on your system:
3. Type Y, and press Enter to accept the changes.
You will see a status message indicating the changes have been completed.
4. Type WinRM /? to see the help available for the Windows Remote Management command-line tool.
WinRM includes a rich set of commands, and the help file can help you dig deeper if desired.
5. Type in the following command to enumerate (list) the properties for WinRM:
WinRM enumerate WinRM/config/listener
Notice that there is a space between WinRM and enumerate, and there is a second space between enumerate and WinRM, but no other spaces are used.
This command will give you some of the details on how the service is configured and verification that it is enabled to listen on the HTTP transport using all the available IP addresses on your system. Notice that you can also type in the command with just the first letter of enumerate (e) as follows:
WinRM e WinRM /config/listener
You can change the format of the output by modifying the -format switch. By default, the output is shown in text format, but you can output it as simple XML (using the - format:#XML switch) or formatted XML (using the -format:#pretty switch).
6. Try the following commands:
WinRM e WinRM /config/listener -format:#text
WinRM e WinRM /config/listener -format:#xml
WinRM e WinRM /config/listener -format:#pretty

Although there is more you can do with WinRM on the server, its primary purpose for remote administration is to enable the listener with the quickconfig command. Once this is done, you’ll probably turn your attention to the client where you’ll do the actual administration.

Using WinRS

The Windows Remote Shell (WinRS) is used to execute commands against a remote server that has been configured with WinRM. For example, you could use WinRS from a Windows 7 or Windows 8 system to execute commands against a remote server.

WinRS commands are primarily formatted as follows:

WinRS -r:servername command

The -r switch is used to identify the name of the remote server. Although other switches are available, the -r switch is the switch used the most.

Issuing WMIC Commands with WinRS

WinRS commands can be any command that you would issue from the command line. As an example, you can use the Windows Management Instrumentation Command-line (WMIC) tool to document the services running on computers.

Before using WinRS, you can use this command to show how WMIC can be used to document information on services running on any system. Launch a command line, and enter this command:

Wmic /output:services.htm /node:localhost service list brief /format:htable

This creates an HTML-formatted file named services.htm. You can view it by entering services.htm at the command prompt, which will launch Internet Explorer displaying the document. This lists all of the services on the system, as well as the start mode, the state, the status, and some additional details.

Now, use the same command to document the services of a remote computer that has been configured with WinRS. Substitute Srv2012 for the name of the server you have configured with WinRS, and change the name of the HTML file:

WinRS -r:Srv2012 Wmic /output:Srv2012services.htm /node:Srv2012 service list brief /format:htable

You can view this file by entering the name of the file at the command prompt. In this example, it is Srv2012services.htm.

If you want more details on the services, change list brief to list full. This simple tool can easily give you some important documentation on multiple servers that you can easily print or save.

Issuing PowerShell Commands with WinRS

Although WMIC is certainly feature rich, it’s not the only command you can use. Any command that you can enter at the server you can also enter remotely using WinRS. This includes PowerShell commands. The following link shows the PowerShell cmdlets:

http://msdn.microsoft.com/en-us/library/windows/desktop/ee309371(v=vs.85).aspx

PowerShell commands follow a verb-noun format. The verb specifies an action, and the noun identifies the object on which the action will take place.

The most popular verb is get, and if you enter get- at the PowerShell command prompt, you can tab through all the nouns associated with the get verb.

Other verbs include set, copy, move, and many more. You can do the same thing with any of the verbs; enter the verb with a hyphen (-), and tab through all the possible nouns associated with the verb. For a full list of the verbs, check out this MSDN page: http://msdn.microsoft.com/en-us/library/ms714428(VS.85).aspx.

For example, you can enter the following PowerShell command from the PowerShell prompt to check the status of services on a system:

Get-Service

You don’t even need to type in the entire command. You can just type Get-S and press the Tab key.

This command will list all the services on the system with the status (running or stopped), name, and display name. Using this with WinRS, you can execute the same command remotely:

WinRS -r:SRV2012 PowerShell Get-Service

If you want to redirect this to a file, you can add the > redirect character as follows:

WinRS -r:SRV2012 PowerShell Get-Service > services.txt

The output will be stored in a file named services.txt. You can then open the file with Notepad from the command line with this command:

Notepad services.txt

Remote Server Administration Tools

The Remote Server Administration Tools (RSAT) are tools you need to manage roles and features on a Windows Server 2012 R2 server from your desktop operating system.

Although Remote Desktop Connection and Remote Desktops allow you to connect to the desktop of a server, sometimes you simply need to do a single task such as resetting a password on a user account or verifying that DNS is configured correctly.

RSAT includes tools like Active Directory Users and Computers (ADUC) and the DNS console. After installing RSAT on a desktop, you can launch ADUC to manipulate user accounts, or you can launch the DNS console to verify DNS configuration.

Users still need the appropriate permissions to run the installed tools. For example, a junior administrator who installs the tools on their desktop system won’t be added to the Enterprise Admins role and suddenly be able to perform anything in the forest.

The tools available in RSAT can be used to Manage Windows Server 2012 R2 roles and features.

RSAT Compatibility Issues

RSAT is not compatible with the Administration Tools Pack used to remotely administer Windows Server 2000 and Windows Server 2003 servers. If you have these tools installed on your system, you must first uninstall them before installing RSAT.

Additionally, RSAT won’t allow you to remotely manage a server with the Streaming Media Services role. There are separate Remote Server Administration Tools for the Streaming Media Services role you can download and install to manage a Windows Server 2012 R2 server hosting the Streaming Media Services role.

For more information on issues with a Streaming Media Services role server, check out the Microsoft KB article at http://support.microsoft.com/kb/934518. The RSAT information is located near the end of the article.

RSAT Tools

After installing RSAT on a desktop system, you’ll have access to a full suite of tools that you’d find on a Windows Server 2012 R2 server with all of the roles and features installed. As long as the remote server has the appropriate role or feature installed, you can use the client-side RSAT tool to administer it.

In other words, if a server is running the DHCP role, you can use the DHCP console to remotely administer it. However, if the server isn’t a DHCP server, you can’t use the RSAT-installed DHCP console to make it a DHCP server.

The following list shows some of the more commonly used tools available with RSAT. This isn’t meant to be an exhaustive list but instead a summary of some of the commonly used tools. For a complete list, check out the Microsoft KB article at http://support.microsoft.com/kb/941317.

Active Directory Domain Services Tools The AD DS tools include Active Directory Users and Computers, Active Directory Domains and Trusts, Active Directory Sites and Services, and other snap-ins and command-line tools for remotely managing Active Directory Domain Services.
Active Directory Certificate Services Tools These tools include the Active Directory Certification Authority tools used for enterprise certificate authorities and certificate authority tools used for stand-alone certificate authorities.
Dynamic Host Configuration Protocol Server Tools The DHCP snap-in tool is included.
Domain Name System Server Tools DNS tools include the DNS Manager snap-in and the Dnscmd.exe command-line tool.
File Services Tools These tools include the Share and Storage Management snap-in, Distributed File System tools, and the File Server Resource Manager tools.
Network Policy and Access Services Tools The Routing and Remote Access snap-in is included for network policy and network access.
Remote Desktop Services Tools Remote Desktops and Remote Desktop Services Manager snap-ins are included.
BitLocker Drive Encryption Tools The Manage-bde.wsf script is included for BitLocker Drive Encryption.
Failover Clustering Tools These tools include the Failover Cluster Manager snap-in and the Cluster.exe command-line tool.
Group Policy Management Tools The Group Policy Management Console, Group Policy Management Editor, and Group Policy Starter GPO Editor are all included.
Network Load Balancing Tools The Network Load Balancing Manager utility and the Nlb.exe and Wlbs.exe command-line tools are included.
SMTP Server Tools The SMTP snap-in is available.
Storage Manager for SANs Tools The Storage Manager for SANs snap-in and the ProvisionStorage.exe command-line tool are both included.
Windows System Resource Manager Tools The Windows System Resource Manager snap-in and the Wsrmc.exe command-line tool are included.

Installing RSAT

RSAT is available as a free download from Microsoft. You can download RSAT by going to the Microsoft download site at www.Microsoft.com/downloads and typing RSAT.


32-Bit and 64-Bit Versions of RSAT
Both 32-bit and 64-bit versions of RSAT are available. These need to match the platform where you’re installing RSAT. In other words, if you’re running 32-bit Windows 8 on your desktop, you need the 32-bit version of RSAT to remotely manage a 64-bit Windows Server 2012 R2 server.

Once you’ve downloaded RSAT, you can follow these steps to install and enable RSAT:

1. Use Windows Explorer to browse to where you saved the download.
2. Double-click the installation package, and follow the wizard to complete the installation.
3. When the installation completes, click Close.
Normally you’d expect the installation to be complete at this point, but you need to take extra steps to enable RSAT on your system.
4. Select Start image Control Panel to launch Control Panel.
5. Select Programs and then click “Turn Windows features on or off.” If prompted by User Account Control, click Continue.
6. Select the Remote Server Administration Tools check box. Your display will look similar to Figure 17.40.

Figure 17.40 Adding the Remote Server Administration Tools feature

image
You can pick and choose individual feature and role administration tools if desired, or you can simply add them all by selecting the Remote Server Administration Tools check box.
7. Click OK. The tools will be configured to work on your system.

If Administrative Tools does not show on your Start menu, you can add the tools by following these steps:

1. Right-click the Start menu, and select Properties.
2. Ensure that the Start Menu tab is selected, and click Customize.
3. Scroll to the “System administrative tools” section close to the bottom of the customization window. Select “Display on the All Programs menu and the Start menu.”
4. Click OK twice.

Once RSAT is installed on a system, you can use the tools in the same way you would use them on a server.

Remote Desktop and PowerShell

Before we close out this chapter, let’s discuss how you can use PowerShell to remotely connect to another PowerShell session. If you do not plan on using PowerShell to remotely administer your server, then you can skip this section. If you plan on using PowerShell, then stick around and see how you can connect remotely using PowerShell cmdlets.

When you are sending cmdlets to the server, you will need to provide a username and password just like in the Remote Desktop UI. If you have to type several commands, you will have to enter this username and password for each command. To get around this you can assign the username and password to a session variable that will be hold the credentials for you.

When you enter the following command, you will see a login pop-up appear to enter your credentials (see Figure 17.41).

Figure 17.41 Login credential pop-up screen

image
$cr = Get-Credential -Credential jpwebconsulting\administrator

Now all your login information is stored in the $cr variable. You will see in the next cmdlet how this will be of use to you. The next cmdlet you will use is your connection to the remote system. You can now see the variable in use:

Enter-PSSession -ComputerName TestServer-1 -Credential $cr

You are now connected remotely to the server via PowerShell. You should see the following command prompt, and you will see that it switched over to TestServer-1. You can now administer the server as if you were sitting in front of it. I bet you didn’t think it was that easy!

[TestServer-1]: PS C:\Users\Administrator\Documents>

The Bottom Line

Configure Windows Server 2012 R2 servers for remote administration. Servers must be configured to allow remote administration before administrators can connect remotely.
Master It Configure a server to allow remote connections by clients running RDC version 6.0 or greater.
Remotely connect to Windows Server 2012 R2 servers using Remote Desktop Connection. You can remotely connect to servers to do almost any administrative work. Servers are often located in a secure server room that is kept cool to protect the electronics. They can be in a different room, a different building, or even a separate geographical location, but they can still be remotely administered using either RDC or Remote Desktops.
Master It Connect to a server using RDC. Ensure your local drives are accessible when connected to the remote server.
Remotely connect to Windows Server 2012 R2 servers using a Remote Desktop Protocol file. If you regularly connect to a remote server using RDC, you can configure an RDP file that can be preconfigured based on your needs for this server. This RDP file will store all the settings you configure for this connection.
Master It Create an RDP file that you can use to connect with a server named Server1. Configure the file to automatically launch Server Manager when connected.
Configure a server for Remote Assistance. When your environment includes remote locations where junior administrators may occasionally need assistance, you can use Remote Assistance to access their session and demonstrate procedures.
Master It Configure a server for Remote Assistance.
Install the Remote Server Administration Tools. The Remote Assistance Server Administration Tools (RSAT) include the snap-ins and command-line tools needed to manage Server 2003, Server 2008, and Server 2012 servers from Windows Vista and Windows 7 and 8.
Master It Obtain and install RSAT on a Windows Vista or Windows 7 or 8 system.