How to Enable RDP in Windows Server 2016 Using PowerShell, CMD, or GUI

Remote Desktop Protocol (RDP) lets you control a Windows server over the network as if you were using it locally. On Windows Server 2016, RDP is disabled by default because Microsoft recommends using PowerShell and WinRM for remote management and warns that exposing port 3389 without safeguards can invite attacks. 

Still, many administrators and remote workers need graphical access to install software, troubleshoot issues, or assist users. This guide explains how to enable RDP in Windows Server 2016 using four different methods while highlighting best practices for security and stability.

Why Enable RDP & Prerequisites

ALT: A slim glass server tower floats beside three wafer-thin checklist panes (ADMIN, 3389, NLA). A small lock-shield hovers front-left. Foreground layer: server + panes; background depth cue: faint perspective grid. Mood: calm, methodical.

 RDP is useful when a graphical interface is necessary ( see what is RDP). However, enabling it should be an intentional choice. Before you proceed with learning how to enable RDP in Windows Server 2016, confirm the server is patched and sits behind a trusted firewall. 

Log in with an administrator account, know the machine’s IP address or DNS name, and make sure you can reach it over a secure network or VPN. The Windows Firewall will need to allow incoming traffic on TCP port 3389. 

Here are key prerequisites:

  • Administrator rights: Only administrators can switch on RDP.
  • Network access: Make sure you can reach the server and that port 3389 is open.
  • User accounts: Decide which non‑admin users need remote access so you can add them later.
  • Security planning: Plan to use Network Level Authentication (NLA), strong passwords, and limit exposure to trusted IP ranges.

Once you meet these requirements, choose a method below and follow the steps on how to enable RDP in Windows Server 2016.

Method 1: Enable RDP via Server Manager (GUI)

ALT: A glass desktop monitor pane shows a tiled “LOCAL SERVER” dashboard; a bright switch reads ENABLED; a small tag reads NLA. Foreground: monitor + switch; depth cue: diagonal neon shafts. Mood: confident, click-to-enable.

If you have no clue about how to enable RDP in Windows Server 2016, the GUI method is the simplest:

Server Manager in Start Screen

  1. Open Server Manager and select Local Server in the left pane. The main pane lists system properties.

ALT: Server Manager window with arrow pointing to “Local Server”.

  1. Change Remote Desktop settings: Next to Remote Desktop, click the blue Disabled link.

ALT: Local Server window in Server Manager window with Remote Desktop highlighted with red box.

  1. In the System Properties dialog, select Allow remote connections and, for better security, check Allow connections only from computers running Remote Desktop with Network Level Authentication.

ALT: System Properties window with “Allow remote connections to this computer” highlighted with red box.

  1. Apply and add users: Click Apply. A prompt will enable the firewall rule automatically. To allow non‑administrators, click Select Users, add their usernames, and click OK.
  2. Verify status: Close and reopen Server Manager or press F5. The Remote Desktop entry should show Enabled. Test access from your client machine using the Remote Desktop Connection app.

This method shows how to enable RDP in Windows Server 2016 using the graphical interface; if you prefer scripts, PowerShell is next.

Method 2: Enable RDP Using PowerShell

ALT: Three wafer-thin glass keycaps (PS, ENTER, CTRL) float above a coiled, translucent ribbon-cable that streams toward a slim Ethernet-port plate marked 3389; a tiny lightning-bolt shard hovers by the port, mood fast and hands-on. Depth cue: floating perspective grid.

PowerShell is ideal for automation and remote scenarios. In this section, you will learn how to enable RDP in Windows Server 2016 via the command line:

Enable RDP:

Set‑ItemProperty -Path 'HKLM:\SYSTEM\CurrentControlSet\Control\Terminal Server' -Name 'fDenyTSConnections' -Value 0

 

Open the firewall rule:

Enable‑NetFirewallRule -DisplayGroup "Remote Desktop"

Optional: enforce NLA and add users:

Set‑ItemProperty -Path 'HKLM:\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP‑Tcp' -Name 'UserAuthentication' -Value 1
Add‑LocalGroupMember -Group 'Remote Desktop Users' -Member '<Domain\Username>'

 

These commands modify the registry value controlling RDP and enable the firewall group for port 3389. To run them on a remote server, first establish a session with Enter‑PSSession over WinRM. If you need a text‑only alternative on how to enable RDP in Windows Server 2016, the next method uses Command Prompt.

Method 3: Enable RDP via Command Prompt

A vertical glass traffic light stack shows REG, NETSH, USERS; the middle disk glows while a slender RJ-45 glass plug snaps into a port beside it, mood procedural and visible. Depth cue: diagonal neon shafts.

If you prefer Command Prompt or are working on systems without PowerShell, you can achieve the same outcome. This approach shows you how to enable RDP in Windows Server 2016 using built‑in tools:

  1. Open Command Prompt with admin rights.

Run window with “regedit.exe” written in its text box.

 

  1. Set the registry value:
reg add "HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server" /v fDenyTSConnections /t REG_DWORD /d 0 /f

 

  1. Enable the firewall rule:
netsh advfirewall firewall set rule group="remote desktop" new enable=yes

 

  1. Grant non‑admins access:
net localgroup "Remote Desktop Users" /add <Domain\Username>

 

  1. Check your work:
reg query "HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server" /v fDenyTSConnections

 

A value of 0x0 confirms remote access is allowed. Close and reopen Server Manager to refresh its status. If you need to enable RDP on many servers at once, the next section shows how to enable RDP in Windows Server 2016 using Group Policy.

 

Method 4: Enable RDP via Group Policy

 A slender conveyor feeds miniature server tiles beneath a glass stamp labeled ENABLE; a drive gear marked GPO powers the belt, mood industrial and scalable. Depth cue: diagonal neon shafts.

Group Policy is suited for domain environments where you need to enable RDP across many servers. Those looking to learn how to enable RDP in Windows Server 2016 for multiple machines can follow these steps:

  1. Create or edit a GPO: Open the Group Policy Management Console by searching for it in Start. Right-click your domain or an organizational unit, and create a new GPO.
  2. Navigate to the RDP setting: Under Computer Configuration → Administrative Templates → Windows Components → Remote Desktop Services → Remote Desktop Session Host → Connections, double‑click Allow users to connect remotely using Remote Desktop Services.

 

Group Policy Editor window.

  1. Enable the policy and optional NLA: Choose Enabled. To enforce NLA, set Require user authentication for remote connections by using Network Level Authentication to Enabled.

Allow users to connect remotely by using Remote Desktop Services window.

  1. Update the target servers: Run gpupdate /force on each server or wait for the policy refresh cycle.

This approach standardizes RDP settings and is easier to audit. You can further secure access by editing the firewall rule within the same GPO. If you can’t be bothered with doing all this yourself, you can always go for one of the best RDP providers for commercially managed solutions.

Cloudzy’s RDP VPS

A transparent server tower sits open like a hood; inside, an ultrareal 4.2 GHz CPU heatspreader, DDR5 RAM stick, and NVMe SSD glint with micro-wear; a slim RJ-45 plate engraved 10 Gbps snaps in with a light flare; minimal tags: 99.95% and DDoS; one foreground layer; depth cue: low-contrast skyline; mood: tuned performance.

You can even skip searching for the best RDP provider and spin up a Windows virtual desktop with Cloudzy’s RDP VPS. You get full admin access, your preferred Windows Server (2012, 2016, 2019, or 2022) preinstalled, instant activation, and two concurrent logins; the service stays affordable as you grow with PAYG. 

Choose one of our many data centers in the USA, Europe, or Asia to keep latency low, then scale CPU, RAM, and storage without migrations. Under the hood, high‑clock CPUs up to 4.2 GHz with DDR5 memory, NVMe SSD storage, and up to 10 Gbps networking keep your desktop responsive, while built‑in DDoS protection, a dedicated static IP, 99.95% uptime, and 24/7 support keep you online. Flexible payments include cards, PayPal, Alipay, and crypto. When you are ready, buy RDP.

Firewall Configuration & Security Best Practices

A lone ultrareal 1U rack firewall front panel floats, its mini LCD line reads ALLOW 10.0.0.0/24 while two bezel badges show VPN and NLA; a single link LED glows, others stay dark; one foreground layer; single depth cue: faint perspective grid; mood: policy-driven restraint.

Turning on RDP exposes your server to remote login attempts. Adopt these best practices to minimize risk after you learn how to enable RDP in Windows Server 2016:

  • Restrict inbound traffic: Limit the firewall rule to specific IP ranges. If you don’t need access from the open internet, allow connections only from your VPN or corporate network.
  • Use a VPN: Provide remote users with a VPN tunnel so RDP is never exposed directly to the public internet.
  • Require NLA and strong passwords: NLA authenticates users before they see the desktop. Combine it with complex passwords and multi‑factor authentication through your identity provider or hardware tokens.
  • Change the default port: Changing port 3389 to a non‑standard number via the registry can reduce automated scans. Remember to adjust firewall rules and client settings accordingly.
  • Keep systems updated: Apply the latest Windows updates and security patches. Exploits targeting RDP often rely on outdated software.

Balanced against convenience, these measures help keep your server safe. That said, you can always try an RDP alternative like VNC.

Troubleshooting & Remote‑Access Tips

An ultrareal desktop smart-card reader with a laminated ID badge sliding in; the badge edge engraves RDP USERS and a small confirm tick ADD USER. One foreground layer; single depth cue: low-contrast skyline; mood: fix permissions cleanly.

Even when correctly configured, you may run into issues connecting via RDP. If you’ve followed the steps on how to enable RDP in Windows Server 2016 and still can’t connect, here are a few things you can try:

  • Firewall blocks: The Windows Firewall rule may still be disabled, or an external firewall might block port 3389. Review your rules and confirm the port is open.
  • Permissions errors: Only administrators and members of the Remote Desktop Users group can connect. Add necessary users to that group.
  • Network instability: High latency or VPN disruptions can cause timeouts. Use a stable connection and test from another network if possible.
  • Status not refreshed: Server Manager may still report RDP as disabled until you refresh it with F5 or reopen the console.
  • Client software: Use the official Microsoft Remote Desktop client for your operating system. On macOS, install Microsoft Remote Desktop from the App Store; on Linux, use Remmina. Android and iOS users can find the mobile client in their respective app stores.

If you prefer to avoid managing RDP yourself after learning how to enable RDP in Windows Server 2016, look into a Windows Server 2016 VPS that comes with remote access preconfigured.

Final Thoughts

Enabling remote access is straightforward once you know how to enable RDP in Windows Server 2016. Choose the Server Manager method for simplicity, PowerShell or Command Prompt for scripting and remote scenarios, and Group Policy for domain‑wide consistency. 

Regardless of method, secure the server by restricting inbound connections, enabling Network Level Authentication, and granting access only to required users. Don’t forget to test and troubleshoot your setup to make sure you have a reliable connection. Lastly, once again, if you’d rather not worry about configuration, consider a managed RDP VPS from Cloudzy to avoid all that hassle.

 

FAQ

Yes, if WinRM is configured. Use Enter‑PSSession to connect via PowerShell Remoting and run the registry and firewall commands. You can also use remote management consoles like iDRAC or IPMI to access the local desktop.
RDP can be secure if you combine it with Network Level Authentication, strong passwords, restricted firewall rules, and preferably a VPN. Never leave port 3389 exposed to the public internet without additional safeguards.
The default port is TCP 3389. You can change it by modifying the PortNumber value under HKLM\\SYSTEM\\CurrentControlSet\\Control\\Terminal Server\\WinStations\\RDP‑Tcp, but remember to update your firewall rules accordingly.
Administrators automatically have remote access. To let other users connect, add them to the Remote Desktop Users group through Server Manager, PowerShell (Add‑LocalGroupMember), or Command Prompt (net localgroup).

Share :

Leave a Reply

Your email address will not be published. Required fields are marked *