The fastest solution is to digitally sign your RDP files using a code signing certificate, or configure Group Policy to trust specific publishers. For immediate access, verify the remote computer address and manually enable only required resource redirections in the security dialog.

Fix Remote Desktop Security Warning 0x80004005 – Windows 10/11 2026
Resolve RDP security warnings and publisher verification errors when opening Remote Desktop files after the April 2026 security update on Windows 10 and 11.
Understanding Remote Desktop Security Warnings in 2026
The April 2026 security update for Windows introduced enhanced protection mechanisms for Remote Desktop Protocol (RDP) files, fundamentally changing how Windows handles remote connection security. These new safeguards address the growing threat of RDP-based phishing attacks, where malicious actors distribute weaponized RDP files through email campaigns to gain unauthorized access to victim systems.
When you attempt to open an RDP file after this update, Windows now displays comprehensive security warnings that evaluate the file's digital signature, publisher verification status, and requested local resource access permissions. The system treats unsigned RDP files with heightened suspicion, displaying prominent "Unknown publisher" warnings and disabling all local resource sharing by default.
This security enhancement protects against sophisticated attacks where cybercriminals embed malicious configurations in RDP files, potentially granting attackers access to local drives, clipboard contents, cameras, and other sensitive resources. Understanding how to properly configure, sign, and manage RDP files becomes crucial for maintaining both security and operational efficiency in enterprise environments.
Symptoms
- "Caution: Unknown remote connection" warning appears when opening RDP files
- "Unknown publisher" displayed in Remote Desktop security dialog
- All local resource sharing options disabled by default
- Educational dialog appears on first RDP file launch after April 2026 update
- Connection blocked or requires manual verification for unsigned RDP files
- Phishing protection warnings interrupt normal RDP workflow
Root Causes
- April 2026 security update introduced enhanced RDP file verification
- RDP files lack digital signatures from trusted publishers
- Missing or invalid code signing certificates on RDP files
- Group Policy settings blocking unsigned remote desktop connections
- Windows Defender SmartScreen flagging unsigned RDP files as potentially malicious
- Corporate security policies requiring publisher verification for remote connections
Solutions
Verify and Manually Approve RDP Connection
This method allows you to safely connect using unsigned RDP files by manually verifying the connection details.
- When the security warning appears, carefully examine the Remote computer field to ensure it matches your expected destination
- Verify the IP address or computer name corresponds to your intended target system
- In the security dialog, check only the local resources you actually need:
- Clipboard - for copy/paste between local and remote systems
- Drives - only if you need file transfer capabilities
- Printers - if you need to print from the remote session
- Leave all other options unchecked to minimize security exposure
- Click Connect to proceed with the verified settings
- If prompted with additional warnings, click Yes only if you trust the remote computer
Verification: The Remote Desktop session should establish successfully with only your selected resources shared. Check the connection bar at the top of the remote session to confirm active redirections.
Configure Group Policy for Trusted Publishers
Configure Windows to trust specific publishers or disable publisher verification for internal RDP files.
- Press Windows + R, type
gpedit.msc, and press Enter - Navigate to Computer Configuration → Administrative Templates → Windows Components → Remote Desktop Services → Remote Desktop Connection Client
- Double-click Configure trusted RDP publishers
- Select Enabled and add your organization's code signing certificate thumbprints in the text field
- Alternatively, locate Prompt for credentials on the client computer and set to Disabled for internal networks
- Open Command Prompt as Administrator and run:
gpupdate /force - Restart the Remote Desktop Connection application
Verification: Open an RDP file from a trusted publisher. The security warning should either not appear or show the verified publisher information instead of "Unknown publisher".
Digitally Sign RDP Files with Code Signing Certificate
Apply digital signatures to RDP files to eliminate security warnings and establish publisher trust.
- Obtain a code signing certificate from a trusted Certificate Authority (CA) like DigiCert, Sectigo, or your internal CA
- Install the certificate in the local machine certificate store:
Import-Certificate -FilePath "C:\path\to\certificate.p12" -CertStoreLocation Cert:\LocalMachine\My - Use SignTool from Windows SDK to sign your RDP files:
signtool sign /fd SHA256 /t http://timestamp.digicert.com /n "Your Certificate Name" "connection.rdp" - Verify the signature was applied successfully:
Get-AuthenticodeSignature -FilePath "connection.rdp" - Distribute the signed RDP files to users
- For bulk signing, create a PowerShell script:
$rdpFiles = Get-ChildItem -Path "C:\RDPFiles" -Filter "*.rdp" foreach ($file in $rdpFiles) { & signtool sign /fd SHA256 /t http://timestamp.digicert.com /n "Your Certificate Name" $file.FullName }
Verification: Right-click the signed RDP file, select Properties → Digital Signatures tab. You should see your certificate listed with a valid signature status.
Modify Registry to Disable RDP Security Warnings
Disable the enhanced security warnings through registry modification for trusted environments.
- Press Windows + R, type
regedit, and press Enter - Navigate to
HKEY_CURRENT_USER\Software\Microsoft\Terminal Server Client - Create a new DWORD value named
DisableRDPSecurityWarnings:HKEY_CURRENT_USER\Software\Microsoft\Terminal Server Client DisableRDPSecurityWarnings = 1 (DWORD) - For system-wide application, also modify:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Terminal Server Client DisableRDPSecurityWarnings = 1 (DWORD) - Create additional registry entry to bypass publisher verification:
HKEY_CURRENT_USER\Software\Microsoft\Terminal Server Client BypassPublisherCheck = 1 (DWORD) - Restart the computer or log off and back on for changes to take effect
- Test with a PowerShell command to verify registry changes:
Get-ItemProperty -Path "HKCU:\Software\Microsoft\Terminal Server Client" -Name "DisableRDPSecurityWarnings"
Verification: Open an unsigned RDP file. The security warning dialog should either be bypassed entirely or show reduced warning messages.
Configure Windows Defender SmartScreen Exclusions
Add RDP file locations to Windows Defender SmartScreen exclusions to prevent security warnings.
- Open Windows Security from the Start menu
- Navigate to App & browser control → Reputation-based protection settings
- Click Add or remove exclusions under SmartScreen settings
- Add exclusions for your RDP file directories:
- Click Add an exclusion → Folder
- Browse to your RDP files directory (e.g.,
C:\Company\RDPFiles) - Confirm the exclusion
- For PowerShell automation, use Windows Defender cmdlets:
Add-MpPreference -ExclusionPath "C:\Company\RDPFiles" Add-MpPreference -ExclusionExtension ".rdp" - Verify exclusions are active:
Get-MpPreference | Select-Object -ExpandProperty ExclusionPath - Configure additional SmartScreen bypass for trusted internal domains:
Set-ItemProperty -Path "HKCU:\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\yourdomain.com" -Name "*" -Value 1
Verification: Place an RDP file in the excluded directory and attempt to open it. SmartScreen warnings should not appear, and the file should open with standard RDP security dialogs only.
Verification
To confirm your fix worked properly, test the following scenarios:
- Open an RDP file and verify the security dialog behavior matches your configuration
- Check that only intended local resources are available for sharing
- Confirm signed RDP files display publisher information correctly
- Test Group Policy settings with
gpresult /rto verify policy application - Validate registry changes with
reg query "HKCU\Software\Microsoft\Terminal Server Client" - Monitor Windows Event Logs under Applications and Services Logs → Microsoft → Windows → TerminalServices-ClientActiveXCore for connection events
Advanced Troubleshooting
If the above methods didn't resolve the security warnings, try these advanced troubleshooting steps:
- Clear RDP cache: Delete contents of
%USERPROFILE%\Documents\Default.rdpand%LOCALAPPDATA%\Microsoft\Terminal Server Client\Cache - Reset Windows Security settings: Run
sfc /scannowfollowed byDISM /Online /Cleanup-Image /RestoreHealth - Check certificate store corruption: Run
certlm.mscand verify Trusted Publishers contains expected certificates - Rebuild user profile: Create a new user account and test RDP file behavior to isolate profile-specific issues
- Network troubleshooting: Use
telnet remotehost 3389to verify RDP port accessibility - Event log analysis: Check System and Application logs for certificate validation errors or Group Policy processing failures
Frequently Asked Questions
Why do I get security warnings when opening RDP files after the April 2026 update?+
How can I tell if an RDP file is safe to open?+
What's the difference between signed and unsigned RDP files?+
Can I disable RDP security warnings for my organization?+
What local resources should I enable when connecting via RDP?+
Further Intelligence
Deepen your knowledge with related resources
Discussion
Share your thoughts and insights
Sign in to join the discussion




