mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 05:17:22 +00:00
Corrected indentation
This commit is contained in:
parent
588c91b6f1
commit
4e01073df9
@ -34,37 +34,39 @@ From its release, Windows 10 has supported remote connections to PCs joined to A
|
|||||||
Ensure [Remote Credential Guard](/windows/access-protection/remote-credential-guard), a new feature in Windows 10, version 1607, is turned off on the client PC you are using to connect to the remote PC.
|
Ensure [Remote Credential Guard](/windows/access-protection/remote-credential-guard), a new feature in Windows 10, version 1607, is turned off on the client PC you are using to connect to the remote PC.
|
||||||
|
|
||||||
- On the PC you want to connect to:
|
- On the PC you want to connect to:
|
||||||
|
|
||||||
1. Open system properties for the remote PC.
|
1. Open system properties for the remote PC.
|
||||||
|
|
||||||
2. Enable **Allow remote connections to this computer** and select **Allow connections only from computers running Remote Desktop with Network Level Authentication**.
|
2. Enable **Allow remote connections to this computer** and select **Allow connections only from computers running Remote Desktop with Network Level Authentication**.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
3. If the user who joined the PC to Azure AD is the only one who is going to connect remotely, no additional configuration is needed. To allow additional users or groups to connect to the PC, you must allow remote connections for the specified users or groups. Click **Select Users -> Add** and enter the name of the user or group.
|
3. If the user who joined the PC to Azure AD is the only one who is going to connect remotely, no additional configuration is needed. To allow additional users or groups to connect to the PC, you must allow remote connections for the specified users or groups. Click **Select Users -> Add** and enter the name of the user or group.
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> You can specify individual Azure AD accounts for remote connections by having the user sign in to the remote device at least once, and then running the following PowerShell cmdlet:
|
> You can specify individual Azure AD accounts for remote connections by having the user sign in to the remote device at least once, and then running the following PowerShell cmdlet:
|
||||||
> ```PowerShell
|
> ```powershell
|
||||||
> net localgroup "Remote Desktop Users" /add "AzureAD\the-UPN-attribute-of-your-user"
|
> net localgroup "Remote Desktop Users" /add "AzureAD\the-UPN-attribute-of-your-user"
|
||||||
> ```
|
> ```
|
||||||
> where *the-UPN-attribute-of-your-user* is the name of the user profile in C:\Users\, which is created based on the DisplayName attribute in Azure AD.
|
> where *the-UPN-attribute-of-your-user* is the name of the user profile in C:\Users\, which is created based on the DisplayName attribute in Azure AD.
|
||||||
>
|
>
|
||||||
> This command only works for AADJ device users already added to any of the local groups (administrators).
|
> This command only works for AADJ device users already added to any of the local groups (administrators).
|
||||||
> Otherwise this command throws the below error. For example:
|
> Otherwise this command throws the below error. For example:
|
||||||
> - for cloud only user: "There is no such global user or group : *name*"
|
> - for cloud only user: "There is no such global user or group : *name*"
|
||||||
> - for synced user: "There is no such global user or group : *name*" </br>
|
> - for synced user: "There is no such global user or group : *name*" </br>
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> In Windows 10, version 1709, the user does not have to sign in to the remote device first.
|
> In Windows 10, version 1709, the user does not have to sign in to the remote device first.
|
||||||
>
|
>
|
||||||
> In Windows 10, version 1709, you can add other Azure AD users to the **Administrators** group on a device in **Settings** and restrict remote credentials to **Administrators**. If there is a problem connecting remotely, make sure that both devices are joined to Azure AD and that TPM is functioning properly on both devices.
|
> In Windows 10, version 1709, you can add other Azure AD users to the **Administrators** group on a device in **Settings** and restrict remote credentials to **Administrators**. If there is a problem connecting remotely, make sure that both devices are joined to Azure AD and that TPM is functioning properly on both devices.
|
||||||
|
|
||||||
4. Click **Check Names**. If the **Name Not Found** window opens, click **Locations** and select this PC.
|
4. Click **Check Names**. If the **Name Not Found** window opens, click **Locations** and select this PC.
|
||||||
|
|
||||||
> [!TIP]
|
> [!TIP]
|
||||||
> When you connect to the remote PC, enter your account name in this format: `AzureAD UPN`. The local PC must either be domain-joined or Azure AD-joined. The local PC and remote PC must be in the same Azure AD tenant.
|
> When you connect to the remote PC, enter your account name in this format: `AzureAD UPN`. The local PC must either be domain-joined or Azure AD-joined. The local PC and remote PC must be in the same Azure AD tenant.
|
||||||
|
|
||||||
> [!Note]
|
> [!Note]
|
||||||
> If you cannot connect using Remote Desktop Connection 6.0, you must turn off the new features of RDP 6.0 and revert back to RDP 5.0 by making a few changes in the RDP file. See the details in the [support article](https://support.microsoft.com/help/941641/remote-desktop-connection-6-0-prompts-you-for-credentials-before-you-e).
|
> If you cannot connect using Remote Desktop Connection 6.0, you must turn off the new features of RDP 6.0 and revert back to RDP 5.0 by making a few changes in the RDP file. See the details in the [support article](https://support.microsoft.com/help/941641/remote-desktop-connection-6-0-prompts-you-for-credentials-before-you-e).
|
||||||
|
|
||||||
## Supported configurations
|
## Supported configurations
|
||||||
|
|
||||||
|
Loading…
x
Reference in New Issue
Block a user