Blog Post

Ask The Performance Team
4 MIN READ

“Allow Logon through Terminal Services” group policy and “Remote Desktop Users” group.

CraigMarcho's avatar
CraigMarcho
Icon for Microsoft rankMicrosoft
Mar 16, 2019
First published on TECHNET on Sep 09, 2011

Hello AskPerf readers. I am Edwin Rocky and this time I am back with some interesting information about the “Allow Logon through Terminal Services” group policy and “Remote Desktop users” group.

I am sure many of you are already familiar this GPO and this group. But still there has been some confusion around whether you should be using the GPO for allowing the user to RDP to the server or should be using the Remote desktop users group or both. And at times, even what to choose between them and what is the best recommended practice.

Hence I wanted to provide a short simple explanation about this group policy and the user group and how they are interrelated.

To start with, there are two types of user rights; Logon rights & Privileges. In simpler terms these are:

1) Remote Logon: rights to machine

2) Logon : privileges for access to the RDP-TCP Listener

These play the vital part in allowing an RDP session to the server.

When a user is able to validate the above two conditions successfully, only then is the user provided with a successful RDP connection to the server.

The Remote Logon is governed by the “Allow Logon through Terminal Services” group policy. This is under Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment.

By default, the Administrators and Remote Desktop Users groups are given remote logon rights. So, users who are a part of these groups will be authorized to logon remotely to the server.

Now, if you have a user account which is not a part of the Administrators or the Remote Desktop Users groups and you go ahead and add him to the GPO for “Allow Logon through Terminal Services”, they will still not be able to create a successful RDP connection to the server. The reason being that adding a user to this GPO only authorizes him for a Remote Logon to the server but does not give him the permissions to connect to the RDP-Listener.

Now comes into play the Logon privileges for the RDP-Listener. Once the user is authorized for remote logon his privileges to connect to the RDP-Listener is verified. If the user has permissions on the listener then the connection is successful. These permissions can be verified from RDP-TCP Listener properties.

When you look at the Permissions on the RDP-TCP Listener, you will see the below groups as shown below.

So that would explain how adding a user to “Remote Desktop Users” group allows them to create a successful connection to the server. Adding the user to the Remote Desktop users group gives them the “Remote Logon” Rights to machine as the Remote Desktop U sers group is already a part of the GPO “Allow Logon through Terminal Services”.

“Logon” Privileges to RDP-Listener as this group is already added to the ACL list of the listener.

Permissions for the RDP-TCP listener can be set using the Tsconfig.msc console snap-in. You cannot modify the permissions on the RDP listener using group policy. This is why the best practice is always to add users or groups to the Remote Desktop Users group and not use your own group.

So to summarize, the GPO does authorize the user for a remote logon to the machine, but unless the user has permissions to the RDP-Listener he will not be able to RDP to the server. Hence it’s always a best practice to use the Remote Desktop users group to add the users to allow them to have RDP access to the server.

Domain controllers are an exception to this rule; the “Allow Logon through Terminal Services” does not include the Remote desktop Users group. This is because it is not considered a best practice to allow users to connect to sessions on a DC. If for some reason you do need to allow RDP access to a Domain Controller, you will have to add the group back in manually.

Depending on the missing rights or privileges, you might get various errors messages. Below are few common error messages that you may encounter.

When a user account is added to GPO and not a part of Remote Desktop group

When the user account is not given the Logon Remotely rights by GPO

When the user account is a part of the GPO but not in the Remote Desktop users group.

When user is part of the Remote Desktop users group but that group is not present in the GPO for “Allow Logon through Terminal Services”.

A few links that might be of interest in regards to this topic:

Default permissions for a local user account: http://msdn.microsoft.com/en-us/library/cc771990.aspx

Allow Logon through Terminal Services: http://technet.microsoft.com/en-us/library/cc758613(WS.10).aspx

Accessing Terminal Services Using New User Rights Options: http://support.microsoft.com/kb/278433

Description of Logon Rights and Privileges: http://technet.microsoft.com/en-us/library/bb457125.aspx

Hope this explains the relation between this group and GPO and also how to use them as required. Till next time…

Edwin Rocky.

Updated Mar 16, 2019
Version 2.0
  • sdellis93's avatar
    sdellis93
    Copper Contributor

    I have a computer when I try to RDP to it says "You Need The Right To Sign In Through Terminal Services", even though I'm using RDP, and this computer is not a server. If I try to edit the local policy and add the user to the "Allow Logon through Terminal Services", it's not there, only the RDP option is there, and its set correctly to allow this AD user to RDP to this computer. But every time I try to login I get the below message (see screenshot). Even if I use the domain admin I get this prompt. I cant figure this out.