Windows 2016 Remote Desktop Services



  1. Windows 2016 Remote Desktop Services Role
  2. Microsoft Remote Desktop Services
  3. Windows 2016 Remote Desktop Services
  4. Server 2016 Remote Desktop Services

Are you missing good old terminal services manager (remote desktop services manager) from the Windows Server 2008 R2? For reason that is unknown to me as of today the Microsoft has decided to remove this mmc snapin that was a quick management tool, if you needed to kill the process on the specific server or check the users currently logged on the servers. As of today the Microsoft has not provided any official replacement for this handy tool.

You may be perplexed at how to configure Remote Desktop on a Microsoft Windows 2016 Server since the Remote Desktop Host Configuration tool is missing from the OS. You can still configure RDP settings, but you’ll have to use Group Policy to do so.

That is pity because I have used the tool numerous times.

  1. Each user or device accessing a licensed Windows Server requires a Windows Server CAL or a Windows Server and a Remote Desktop Services (RDS) CAL. With the User CAL, you purchase a CAL for every user who accesses the server to use services such as file storage or printing, regardless of the number of devices they use for that access.
  2. To configure Windows Server 2016 Remote Desktop Services you have to pick in the add roles and features the lower option Remote Desktop Services Installation. As you can see a quick Start option is here but we are not using this. And check the standard deployment. Now you need to configure all the stuff.
  3. 1 Client PC running Windows 10 (CLIENT-10) 01 – open Server Manager Click Add roles and features. 02 – Click Next to proceed. 03 – Choose Remote Desktop Services installation button and click next to proceed. 04 – on the Select deployment type box, click Quick Start (I choose this because I only have One Server for RDS and Remote Apps).

So I started researching if I can and to me seems that the tool from Windows 2008 R2 works on the Windows 2012, 2012 R2, 2016 and Windows 10 as well! :-) So everything you need to do is to copy file from here: tsadmin and do following steps:

  1. The zip consist 4 files, tsadmin.msc, wts.dll, tsadmin.dll and tsadmin.reg that I have created for this experiment to work.
  2. extract the files to c:WindowsSystem32
  3. Double click on the tsadmin.reg to add to the registry required information for the terminal services manager in order to load the MMC snapin
  4. Double click on the tsadmin.exe
  5. voila it works!
  6. The best is if you add more servers under mygroup, when you run it again it will just work and read the servers you have added before

So what you can do? I have tested to work with:

  • Windows server remote desktop services 2012
  • Windows server remote desktop services 2012 R2
  • Windows server remote desktop services 2016
  • Windows server remote desktop services 2019 build 17623 (at a time of the article the Windows 2019 RTM was not announced yet)

The functions working are:

  • disconnecting a session
  • sending message
  • resetting session
  • status of the session
  • logging of the session
  • ending a process on the processes tab (one of the simplest most important features of the tool)

Let me know in the comments is it working as it should for you as well?

BTW if you need powerful full blown management tools you can take a look at SysKit Monitor.

-->

Applies To: Windows Server 2016, Windows Server 2019

When it comes to supported configurations for Remote Desktop Services environments, the largest concern tends to be version interoperability. Most environments include multiple versions of Windows Server - for example, you may have an existing Windows Server 2012 R2 RDS deployment but want to upgrade to Windows Server 2016 to take advantage of the new features (like support for OpenGLOpenCL, Discrete Device Assignment, or Storage Spaces Direct). The question then becomes, which RDS components can work with different versions and which need to be the same?

So with that in mind, here are basic guidelines for supported configurations of Remote Desktop Services in Windows Server.

Cached

Note

Make sure to review the system requirements for Windows Server 2016 and system requirements for Windows Server 2019.

Best practices

  • Use Windows Server 2019 for your Remote Desktop infrastructure (the Web Access, Gateway, Connection Broker, and license server). Windows Server 2019 is backward-compatible with these components, which means a Windows Server 2016 or Windows Server 2012 R2 RD Session Host can connect to a 2019 RD Connection Broker, but not the other way around.

  • For RD Session Hosts - all Session Hosts in a collection need to be at the same level, but you can have multiple collections. You can have a collection with Windows Server 2016 Session Hosts and one with Windows Server 2019 Session Hosts.

  • If you upgrade your RD Session Host to Windows Server 2019, also upgrade the license server. Remember that a 2019 license server can process CALs from all previous versions of Windows Server, down to Windows Server 2003.

  • Follow the upgrade order recommended in Upgrading your Remote Desktop Services environment.

  • If you are creating a highly available environment, all of your Connection Brokers need to be at the same OS level.

RD Connection Brokers

Windows Server 2016 removes the restriction for the number of Connection Brokers you can have in a deployment when using Remote Desktop Session Hosts (RDSH) and Remote Desktop Virtualization Hosts (RDVH) that also run Windows Server 2016. Serato dj software, free download mac. The following table shows which versions of RDS components work with the 2016 and 2012 R2 versions of the Connection Broker in a highly available deployment with three or more Connection Brokers.

3+ Connection Brokers in HARDSH or RDVH 2019RDSH or RDVH 2016RDSH or RDVH 2012 R2
Windows Server 2019 Connection BrokerSupportedSupportedSupported
Windows Server 2016 Connection BrokerN/ASupportedSupported
Windows Server 2012 R2 Connection BrokerN/AN/ANot Supported

Support for graphics processing unit (GPU) acceleration

Remote Desktop Services support systems equipped with GPUs. Applications that require a GPU can be used over the remote connection. Additionally, GPU-accelerated rendering and encoding can be enabled for improved app performance and scalability.

Remote Desktop Services Session Hosts and single-session client operating systems can take advantage of the physical or virtual GPUs presented to the operating system in many ways, including the Azure GPU optimized virtual machine sizes, GPUs available to the physical RDSH server, and GPUs presented to the VMs by supported hypervisors.

See Which graphics virtualization technology is right for you? for help figuring out what you need. For specific information about DDA, check out Plan for deploying Discrete Device Assignment.

GPU vendors may have a separate licensing scheme for RDSH scenarios or restrict GPU use on the server OS, verify the requirements with your favorite vendor.

GPUs presented by a non-Microsoft hypervisor or Cloud Platform must have drivers digitally-signed by WHQL and supplied by the GPU vendor.

Remote Desktop Session Host support for GPUs

The following table shows the scenarios supported by different versions of RDSH hosts.

FeatureWindows Server 2008 R2Windows Server 2012 R2Windows Server 2016Windows Server 2019
Use of hardware GPU for all RDP sessionsNoYesYesYes
H.264/AVC hardware encoding (if suppported by the GPU)NoNoYesYes
Load balancing between multiple GPUs presented to the OSNoNoNoYes
H.264/AVC encoding optimizations for minimizing bandwidth usageNoNoNoYes
H.264/AVC support for 4K resolutionNoNoNoYes

VDI support for GPUs

The following table shows support for GPU scenarios in the client OS.

FeatureWindows 7 SP1Windows 8.1Windows 10
Use of hardware GPU for all RDP sessionsNoYesYes
H.264/AVC hardware encoding (if suppported by the GPU)NoNoWindows 10 1703 and later
Load balancing between multiple GPUs presented to the OSNoNoWindows 10 1803 and later
H.264/AVC encoding optimizations for minimizing bandwidth usageNoNoWindows 10 1803 and later
H.264/AVC support for 4K resolutionNoNoWindows 10 1803 and later

RemoteFX 3D Video Adapter (vGPU) support

Note

Because of security concerns, RemoteFX vGPU is disabled by default on all versions of Windows starting with the July 14, 2020 Security Update and removed starting with the April 13, 2021 Security Update. To learn more, see KB 4570006.

Remote Desktop Services supports RemoteFX vGPUs when VM is running as a Hyper-V guest on Windows Server 2012 R2 or Windows Server 2016. The following guest operating systems have RemoteFX vGPU support:

  • Windows 7 SP1
  • Windows 8.1
  • Windows 10 1703 or later
  • Windows Server 2016 in a single-session deployment only

Discrete Device Assignment support

Remote Desktop Services supports Physical GPUs presented with Discrete Device Assignment from Windows Server 2016 or Windows Server 2019 Hyper-V hosts. See Plan for deploying Discrete Device Assignment for more details.

VDI deployment – supported guest OSes

Windows Server 2016 and Windows Server 2019 RD Virtualization Host servers support the following guest OSes:

  • Windows 10 Enterprise
  • Windows 8.1 Enterprise
  • Windows 7 SP1 Enterprise

Note

  • Remote Desktop Services doesn't support heterogeneous session collections. The OSes of all VMs in a collection must be the same version.
  • You can have separate homogeneous collections with different guest OS versions on the same host.
  • The Hyper-V host used to run VMs must be the same version as the Hyper-V host used to create the original VM templates.

Single sign-on

Windows 2016 Remote Desktop Services Role

Windows Server 2016 and Windows Server 2019 RDS supports two main SSO experiences:

  • In-app (Remote Desktop application on Windows, iOS, Android, and Mac)
  • Web SSO

Using the Remote Desktop application, you can store credentials either as part of the connection info (Mac) or as part of managed accounts (iOS, Android, Windows) securely through the mechanisms unique to each OS.

To connect to desktops and RemoteApps with SSO through the inbox Remote Desktop Connection client on Windows, you must connect to the RD Web page through Internet Explorer. The following configuration options are required on the server side. No other configurations are supported for Web SSO:

  • RD Web set to Forms-Based Authentication (Default)
  • RD Gateway set to Password Authentication (Default)
  • RDS Deployment set to 'Use RD Gateway credentials for remote computers' (Default) in the RD Gateway properties

Microsoft Remote Desktop Services

Note

Windows 2016 Remote Desktop Services

Due to the required configuration options, Web SSO is not supported with smartcards. Users who login via smartcards might face multiple prompts to login.

For more information about creating VDI deployment of Remote Desktop Services, check out Supported Windows 10 security configurations for Remote Desktop Services VDI. External cd optical drive download software mac 2018 site.

Using Remote Desktop Services with application proxy services

Server 2016 Remote Desktop Services

You can use Remote Desktop Services with Azure AD Application Proxy. Remote Desktop Services does not support using Web Application Proxy, which is included in Windows Server 2016 and earlier versions.