SIGN IN / UP
    opened image

    Sometimes Windows Server 2019 users suffer from the inability to restore frequent connections to the server via RDP. Instead, they get a new session, which can be inconvenient, especially if they were delayed by an elevated session.

    That is, when you close the RDP window and try to reconnect to this server and user, not the previous session is launched, but a new one.

    There are several practical solutions to this problem, one of which is found in configuring the RDP connection settings to the server. In this article, we are looking at how to enable the ability to restore a high session when connected to Windows Server 2019 through the "Group Policy Management Editor".

    Step 1: Open the "Group Policy Management Editor"

    To start, the organization "Group Policy Management Editor" through the menu "Start" -> "Windows Administrative Tools" -> "Group Policy Management". Or, on a first-come, first-served basis, you can use the "gpedit.msc" command.

    Step 2: Navigate to the desired setting

    In the Group Policy Management Editor window, go to Computer Configuration -> Administrative Templates -> Windows Components -> Remote Desktop Services -> Remote Desktop Session Host -> Connections.


    Step 3: Appearance of "Restrict Remote Desktop Services users to a single Remote Desktop Services session"

    Observed "Restrict Remote Desktop Services users to one Remote Desktop Services session" and its representatives. Turn on the value "Enabled" and set the value of the interval for leaving the connection active to the desired value.


    Step 4: Save your settings

    Click "OK" to save.


    After completing this step, the top session should start running on the next Windows Server.

    Through the registry editor

    Sometimes a situation may arise when setting through the "Group Policy Management Editor" does not help. In this case, you can try changing the registry value on the server. To do this, you can follow the steps:


    Open the "Registry Editor" via the "Start" menu -> "Windows Administrative Tools" -> "Registry Editor". Or, in order of priority, you can regedit.


    Navigate to the "HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Windows NT\\Terminal Services" key.


    setting a new DWORD value named "fDenyTSConnections"


    Set its value to 0.


    Close the Registry Editor.


    It can also be assumed due to the "Limit Remote Desktop Services users to one Remote Desktop Services session" PowerShell:

    Run PowerShell as an administrator.

    Enter the command:
     

    Set-ItemProperty "HKLM:\\SOFTWARE\\Policies\\Microsoft\\Windows NT\\Terminal Services" -Name "fSingleSessionPerUser" -Value 0 -Type DWord
    


    This command enables the "Restrict Remote Desktop Services users to a single Remote Desktop Services session" selection by setting the "fSingleSessionPerUser" registry value to 0.

    Reboot the server to make the situation effective.

    After completing this step, elevated Remote Desktop Connection was enabled on the Windows Server.
    It's important to note that enabling flare-ups can lead to suspicion of security, as users may continue to work if they become ill with a session they can exclude.