Skip to content

TechDirectArchive

Hands-on IT, Cloud, Security & DevOps Insights

  • Home
  • About
  • Advertise With US
  • Reviews
  • Contact
  • Toggle search form
Home » Windows Server » Allow RDP access for non administrators: Add User to Remote Desktop Users Group in Active Directory
  • zoom
    How to install Zoom on macOS Mac
  • Veeam upgrade11 11a
    How to upgrade Veeam Backup and Replication from version 11 to 11a Backup
  • banner2
    How to Integrate Postman With GitHub Automation
  • Keb
    How to configure a service account for Kerberos delegation Windows Server
  • tmutil localsnapshot
    Fix what is taking up my Mac Storage? Delete Snapshots Network | Monitoring
  • 1 8y62mmvjlr 5uovgoq6zmq
    How to download and install DriveLock on Windows Security | Vulnerability Scans and Assessment
  • Compacting VHD
    How to Compact Virtual Hard Disks on VMware Virtualization
  • article 1280x720.192a2586
    How to fix Scheduled task status prompts error 0x800710E0 Windows Server

Allow RDP access for non administrators: Add User to Remote Desktop Users Group in Active Directory

Posted on 07/10/202124/10/2024 Christian By Christian 3 Comments on Allow RDP access for non administrators: Add User to Remote Desktop Users Group in Active Directory
Remote Desktop Protocol

Remote Desktop is a feature that you can use to connect to devices remotely. With this feature, you can control other devices as if you had local access. RDP is designed to support different types of network topologies and multiple LAN protocols. In this article, we’ll show how to Allow RDP access for non administrators: Add User to Remote Desktop Users Group in Active Directory. Kindly visit these related guides: How to change a password on a Remote Desktop session, how to install and configure VPN on a Windows Server 2016, 2019, and 2022 and How to allow saved credentials for RDP connection.

However, only the members of the Domain Admins group have remote RDP access to the domain controllers. Moreover, It is also worth noting that the RDP feature isn’t unavailable on Windows 10 Home but on Windows 10 Pro and Enterprise editions.

If you do not have a real need to connect to your DC via RDP, please use the Remote Server Administration Tools. See these guides on how install RSAT on Windows Server, and how to install RSAT on Windows 10 via Windows features.

Note: In an Active Directory environment, (the Domain Controller) uses the built-in domain group Remote Desktop Users (located in the Builtin container). In addition, You can manage this group from the ADUC console or the command prompt to manage your Domain Controller.

Add the user to the Remote Desktop User Group

Nonetheless, This can be achieved in a couple of ways. I wil be showing both very shortly. First via the Active Directory Users and Computer (ADUC), and this can also be launched via the dsa.msc.

Consequently, I will recommend you see this guide in order to learn something new “This computer is a domain controller: The snap-in cannot be used on a domain controller, domain accounts are managed by ADUC snap-in“.

To add it in the Remote Desktop Users group, launch the Server Manager. Click on Tools, and and then on Active Directory Users and Computers

User access control

This will open the Active Directory Users and Computers snap-in. Similarly, Double-click on the Remote Desktop users as shown below.

RDP permissions

This will open up the Remote Desktop Users Properties window. Nevertheless, Navigate to the Members tab and click on Add to add users.

Restricted RDP access

Enter the user’s name and click on Check names, as shown below. Therefore, As you can see, the object is presented in AD. Click on Ok to close the Remote Desktop Users Properties window.

User access control

You will have to click on OK again.

Remote Desktop Protocol

This is how you can add users to the Remote Desktop Group on a DC. You may also have to “Allow Log on through Remote Desktop Services” on a DC if not enabled already.

See this guide for this error “The connection was denied because the user is not authorized for remote Login“, and how to enable Remote Desktop Connection on Windows 11 for non-administrators or selected users. To enable access for non-admins, please follow the steps below.

Optional step:

How to add users to the Remote Desktop Users via PowerShell or Command Prompt

By default, only the administrative users are allowed to remotely connect to your Windows 10 PC through remote desktop connection (RDP), and on a DC as discussed before, only Domain Administrators are permitted.

Open up the Command Prompt as an Administrator. This commands also work on PowerShell.Type the following command and hit Enter. Replace the “UserName” with the user account, you want to add to Remote Desktop Users group.

net localgroup "Remote Desktop Users" "UserName" /add

Or have the syntax interchanged as shown below

net localgroup "Remote Desktop Users" /add "UserName"
Restricted RDP access

To verify if the user is added to the Remote Desktop Users, please run the command below

net localgroup "Remote Desktop Users"
RDP permissions

As you can see from the figure below, the User “RDP1” has been added to the Remote Desktop Users group

User access control

If you need to remove a user from the Remote Desktop Users group, run this command below, replacing the “UserName” with the username in your environment.

net localgroup "Remote Desktop Users" "UserName" /delete
Screenshot-2021-10-07-at-01.43.06

Or via the ADUC snap-in. Click on the user and select Remove.

Screenshot-2021-10-07-at-01.42.23

Allow logon through Remote Desktop Services via the Local Policy

Using the, to log on to the DC, you must be granted the “Remote Desktop Services” rights. Furthermore, By default, members of the Administrators group have this right.

If you are not a member of the Administrators group or another group with this right, or if the administrator group does not have this right, you must be granted this right manually.

To fix the issue of restricting access, you might want to create a new security group whose members will have the power to establish a Remote Desktop connection.

This will address the problem and align with the keyphrase Allow RDP access for non administrators. To do this, type in ‘secpol.msc’ and press Enter.

Screenshot-2021-10-07-at-01.47.48

Navigate to Local Policies, and click on User Rights Assignment. From the list of policies, locate Allow log on through Remote Desktop Services and double-click it.

Screenshot-2021-10-07-at-02.07.45

This will open the  Allow log on through the Remote Desktop Services properties window as shown below.

Add the User or Group. For me, I will be adding the User just for test purposes). In a live environment, I will probably create a group to handle this.

Screenshot-2021-10-07-at-02.12.01

This will open the Select Users, Computers, Service Account, or Group wizard as shown below, allow RDP access for non administrators.

Screenshot-2021-10-07-at-02.13.02

Enter the name and click on Check names.

Screenshot-2021-10-07-at-02.13.09

As you can see, the user has been added to the Allow log-on through the Remote Desktop Services as shown below.

Click on Apply and then OK to finish this step.

Screenshot-2021-10-07-at-02.13.23

Allow logon through Remote Desktop Services via the GPO

The steps for allow RDP access for non administrators are basically the same as mentioned above, but this time, you can achieve it via the Group Policy Management snap-in.

Launch the Server Manager, click on Tools, and click on Group Policy Management as shown below

Screenshot-2021-10-07-at-02.31.54

This will open the Group Policy Management Editor. Yu can edit the “Default Domain Controller” policy.

Now, Locate the “Allow log on through Remote Desktop Services”  > User rights setting (Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment\).

To enhance security, you can add the new security group (Remote Desktop User Group). Or user account to allow RDP access for non-administrators, and then close the management console.

Why not just create a new Policy rather instead of modifiying the default policy? Regardless of your implementaion steps, pleae link the GPO to the OU the Group or User belongs.
Screenshot-2021-10-07-at-02.32.54

Note. To allow a user to log on to the DC locally (via the server console), you must add the account or group to the policy “Allow log on locally”. By default, this permission is allowed for the following domain groups: Backup Operators,
Administrators, Print Operators, Server Operators, and Account Operators.

Next, you will have to restart your system for it to take effect. Or enter the following command in an elevated command prompt to have the policy applied immediately without waiting for the default 90 mins to elapse.

gpupdate /force

You may want to see these guides: What is GPO and how can it be launched in Windows. See GPUpdate Switches: GPUpdate vs GPUpdate force.

I hope you found this blog post on how to allow RDP access for non administrators: Add User to Remote Desktop Users Group in Active Directory helpful. If you have any questions, please let me know in the comment session.

5/5 - (1 vote)

Thank you for reading this post. Kindly share it with others.

  • Click to share on X (Opens in new window) X
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Mastodon (Opens in new window) Mastodon
  • Click to share on Bluesky (Opens in new window) Bluesky
  • Click to share on Threads (Opens in new window) Threads
  • Click to share on Nextdoor (Opens in new window) Nextdoor
Windows Server Tags:Active Directory, GPO, GPOs, Microsoft Windows, Remote Desktop, Remote Server Administration Tools, RemoteConnection, Windows 10, Windows Server 2016

Post navigation

Previous Post: How to fix this computer is a domain controller: The snap-in cannot be used on a domain controller
Next Post: How to change or add another keyboard language in Windows Server

Related Posts

  • remote desktop version and protocol
    Determine the Remote Desktop Client Version Windows
  • screenshot 2020 03 13 at 20.24.17
    How to install Cygwin packages from the command line Windows Server
  • image001
    Fix Certificate Error: Unable to access Windows Admin Center from the Web Windows Server
  • Add additional Windows drives
    How to Add Another Hard Drive to a Virtual Machine in HyperV  Virtualization
  • Various Msiexec.exe Command Line Switches
    Various Msiexec.exe Command Line Switches Windows Server
  • the remote procedure call failed
    Error 0xc1420117: The directory could not be completely unmounted Windows Server

More Related Articles

remote desktop version and protocol Determine the Remote Desktop Client Version Windows
screenshot 2020 03 13 at 20.24.17 How to install Cygwin packages from the command line Windows Server
image001 Fix Certificate Error: Unable to access Windows Admin Center from the Web Windows Server
Add additional Windows drives How to Add Another Hard Drive to a Virtual Machine in HyperV  Virtualization
Various Msiexec.exe Command Line Switches Various Msiexec.exe Command Line Switches Windows Server
the remote procedure call failed Error 0xc1420117: The directory could not be completely unmounted Windows Server

Comments (3) on “Allow RDP access for non administrators: Add User to Remote Desktop Users Group in Active Directory”

  1. Avatar photo frank says:
    21/03/2022 at 1:32 PM

    This for some reason doesn’t work for Domain Controller. It’s targeted at the right OU (Domain Controllers). They will still not allow RDP connection for users.

    Log in to Reply
    1. chris Christian says:
      22/03/2022 at 5:43 PM

      Are you still having this issue? Because by now, the default GPO updates are applied every 90 minutes. You may want to take a look at this guide: https://techdirectarchive.com/2020/02/26/all-about-gpupdate-switches-gpupdate-vs-gpupdate-force/

      Log in to Reply
  2. Avatar photo infrassist says:
    07/12/2022 at 8:28 PM

    Thank You for Sharing that information to Add User to Remote Desktop Users Group if a Device is Connected with Azure AD Joined

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Microsoft MVP

VEEAMLEGEND

vexpert-badge-stars-5

Virtual Background

GoogleNews

Categories

veeaam100

sysadmin top30a
 
  • zoom
    How to install Zoom on macOS Mac
  • Veeam upgrade11 11a
    How to upgrade Veeam Backup and Replication from version 11 to 11a Backup
  • banner2
    How to Integrate Postman With GitHub Automation
  • Keb
    How to configure a service account for Kerberos delegation Windows Server
  • tmutil localsnapshot
    Fix what is taking up my Mac Storage? Delete Snapshots Network | Monitoring
  • 1 8y62mmvjlr 5uovgoq6zmq
    How to download and install DriveLock on Windows Security | Vulnerability Scans and Assessment
  • Compacting VHD
    How to Compact Virtual Hard Disks on VMware Virtualization
  • article 1280x720.192a2586
    How to fix Scheduled task status prompts error 0x800710E0 Windows Server

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 1,841 other subscribers
  • RSS - Posts
  • RSS - Comments
  • About
  • Authors
  • Write for us
  • Advertise with us
  • General Terms and Conditions
  • Privacy policy
  • Feedly
  • Telegram
  • Youtube
  • Facebook
  • Instagram
  • LinkedIn
  • Tumblr
  • Pinterest
  • Twitter
  • mastodon

Tags

AWS Azure Bitlocker Microsoft Windows PowerShell WDS Windows 10 Windows 11 Windows Deployment Services Windows Server 2016

Copyright © 2025 TechDirectArchive

 

Loading Comments...
 

You must be logged in to post a comment.