Set up Multiple RDP sessions on Windows Server 2022 – Easy Setup
This guide is designed to provide you with a comprehensive understanding of How To Set up Multiple RDP sessions on Windows Server 2022.
Before we delve into the specifics, let’s clarify what RDP actually is. RDP stands for Remote Desktop Protocol. Essentially, it’s a technology that allows a client computer to remotely access and control a host computer or server.
In simpler terms, RDP establishes a connection between computers over a network (typically the internet). This connection allows the user on the client machine to view the screen of the host server, and control its mouse and keyboard. This effectively allows for remote administration, support, and application access.
To Set up Multiple RDP sessions on Windows Server 2022, you’ll need administrative access to your Windows Server instance. Follow these steps:
Enable Multiple Remote Desktop Connections on Windows Server 2022
First, open the Run window by pressing WinKey + R.
Type " gpedit.msc " in the Run window and click OK to launch the Group Policy Editor.

In the Group Policy Editor, navigate to Administrative Templates within the Computer Configuration section.
Now, navigate to the following path:
Windows Components > Remote Desktop Services > Remote Desktop Session Host > Connections
Within the Connections folder, you will need to modify two policies to enable multiple RDP sessions.
First, double-click on Limit number of connections to open its properties.
Select the Enabled radio button. In the "RD maximum connection allowed" field, specify the maximum number of concurrent RDP connections you want to allow. Click Apply and then OK.
Next, double-click on Restrict Remote Desktop Services users to a single Remote Desktop Services session to open its properties.
Set this policy to Disabled. Click Apply and then OK.
Finally, open the Command Prompt as an administrator and execute the following command to force an update of the Group Policy:
gpupdate
**Output**
Updating policy...
Computer Policy update has completed successfully.
User Policy update has completed successfully.
You have now configured your server to Set up Multiple RDP sessions on Windows Server 2022.
Best Practices to Secure RDP Sessions
Enabling multiple RDP sessions can increase productivity, but it also introduces security risks. RDP is a frequent target for malicious actors. Consider these best practices to enhance the security of your RDP sessions:
- Enable Network Level Authentication (NLA): NLA requires users to authenticate before establishing a full RDP session, mitigating some denial-of-service attacks and improving overall security.
- Use Strong Passwords: Enforce strong, unique passwords for all user accounts that have RDP access. Implement a password policy that requires regular password changes.
- Restrict RDP Access: Limit RDP access to only the users who absolutely need it. Use groups to manage RDP permissions efficiently.
- Change the Default RDP Port: The default RDP port (3389) is well-known to attackers. Changing it to a non-standard port can reduce the risk of automated attacks.
- Enable Account Lockout Policies: Implement account lockout policies to prevent brute-force password attacks.
- Keep Your System Updated: Regularly update your Windows Server with the latest security patches and updates.
- Use a VPN: Consider using a VPN for RDP access. A VPN encrypts all traffic between the client and the server, adding an extra layer of security.
- Implement Multi-Factor Authentication (MFA): MFA adds an extra layer of security by requiring users to provide multiple forms of authentication, such as a password and a code from their mobile device.
Disable Multiple RDP sessions on Windows Server 2022
To revert the changes and disable multiple RDP sessions, navigate to the following location in the Group Policy Editor:
Computer Configuration >> Administrative Templates >> Windows Components >> Remote Desktop Services >> Remote Desktop Session Host >> Connections
Double-click on Restrict Remote Desktop Services user to a single Remote Desktop Services session and set it to Enabled. Run gpupdate
in the command prompt to apply the changes.
Conclusion
This article walked through the steps to Set up Multiple RDP sessions on Windows Server 2022. Enabling multiple RDP sessions can be a valuable asset for businesses, facilitating remote work, improving productivity, and maximizing server resource utilization. It’s crucial to implement robust security measures and adhere to licensing requirements to ensure a secure and compliant environment. Whether you’re an IT professional, a remote worker, or a software developer, understanding how to configure multiple RDP sessions can significantly improve your workflow.
Here are some additional resources you might find helpful:
Activate OpenSSH on Windows Server 2022
Install Nessus Scanner on Windows Server 2022
Install Android Studio on Windows Server 2022
Configure Static IP Address on Windows Server 2025
FAQs
Is it safe to use multiple RDP sessions?
Yes, but it’s important to follow security best practices, such as enabling Network Level Authentication (NLA) and using strong passwords.
How do I improve the performance of multiple RDP sessions?
Ensure your server has adequate hardware resources and improve network bandwidth to reduce latency.
What are the main benefits of setting up multiple RDP sessions?
The main benefits are increased productivity, flexibility, cost savings, and enhanced remote team collaboration.
Can I use RDP to access my server from anywhere?
Yes, as long as you have internet access and proper security measures in place, you can access your server from anywhere.
Alternative Solutions to Enabling Multiple RDP Sessions
While the Group Policy Editor method is a common approach, there are alternative solutions to Set up Multiple RDP sessions on Windows Server 2022. Here are two such alternatives:
1. Modifying the termsrv.dll
File (Not Recommended for Production)
Disclaimer: This method involves modifying a core system file and is not recommended for production environments. It can potentially destabilize your server and may violate your Windows Server license agreement. Use this method at your own risk, and only in a test environment.
This method bypasses the licensing restrictions imposed by Microsoft on the number of concurrent RDP sessions. It involves patching the termsrv.dll
file, which is responsible for managing Remote Desktop Services licensing.
Explanation:
The termsrv.dll
file contains code that limits the number of concurrent RDP sessions allowed on a Windows Server. By modifying this file, you can remove this limitation and allow unlimited RDP sessions.
Steps (For Testing Purposes Only):
- Backup
termsrv.dll
: Locate thetermsrv.dll
file (usually inC:WindowsSystem32
) and create a backup copy of it. This is crucial in case something goes wrong. - Take Ownership of the File: You’ll likely need to take ownership of the file to modify it. Right-click on the file, go to Properties -> Security -> Advanced. Change the owner to your user account.
- Modify Permissions: Grant your user account full control over the file.
- Patch the DLL: Use a hex editor (e.g., HxD) to open
termsrv.dll
. Search for the following hex string:
39 81 3C 06 00 00 0F 84 78 73 02 00
Replace it with:
B8 00 01 00 00 89 81 38 06 00 00 90 90
- Replace the Original File: Replace the original
termsrv.dll
file with the modified one. - Restart the Server: Restart your Windows Server for the changes to take effect.
Why This is Not Recommended:
- Instability: Modifying system files can lead to system instability and crashes.
- Security Risks: Tampering with system files can introduce security vulnerabilities.
- Licensing Violation: This method likely violates the Microsoft Windows Server license agreement.
- Unsupported: Microsoft does not support this method, and you will not receive any support if you encounter problems.
2. Using Third-Party RDP Session Management Tools
Several third-party tools provide enhanced RDP session management capabilities, including the ability to manage and monitor multiple concurrent sessions.
Explanation:
These tools typically work by providing a centralized interface for managing RDP connections, user permissions, and session monitoring. They often offer features such as session shadowing, remote control, and reporting.
Examples of such tools include:
- Devolutions Remote Desktop Manager: This tool allows you to centralize your remote connections, passwords, and credentials into a unique platform.
- mRemoteNG: mRemoteNG is the next generation of mRemote, an open source, tabbed, multi-protocol, remote connections manager.
- Royal TS: Royal TS provides easy and secure access to your remote systems.
Benefits:
- Centralized Management: Provides a single point of control for managing RDP sessions.
- Enhanced Security: Offers features such as password management, multi-factor authentication, and access control.
- Session Monitoring: Allows you to monitor active RDP sessions and track user activity.
- Improved Productivity: Streamlines the process of connecting to and managing remote servers.
Considerations:
- Cost: These tools often come with a price tag, depending on the features and number of users.
- Compatibility: Ensure the tool is compatible with your Windows Server version and other software.
- Security: Choose a reputable vendor with a strong security track record.
While modifying termsrv.dll
is generally discouraged, utilizing third-party RDP management tools offers a more reliable and secure method for managing multiple RDP sessions. Remember to always prioritize security and licensing compliance when implementing any solution for enabling multiple RDP connections.