Verify that RDP is properly configured and accessible from client devices using the correct authentication format.
From a client machine, open Remote Desktop Connection (mstsc.exe). Enter the target computer's hostname (not IP address) in the format: computername.domain.com
When prompted for credentials, use the Entra ID format:
Username: AzureAD\user@yourdomain.com
Password: [Entra ID password]
Alternatively, you can use the UPN format directly: user@yourdomain.com
Test the connection and verify that you can successfully authenticate and access the remote desktop.
Verification commands to run on the target device:
# Check RDP service status
Get-Service -Name "TermService" | Select-Object Name, Status
# Verify RDP registry setting
Get-ItemProperty -Path 'HKLM:\System\CurrentControlSet\Control\Terminal Server' -Name "fDenyTSConnections"
# Check firewall rules
Get-NetFirewallRule -DisplayGroup "Remote Desktop" | Where-Object {$_.Enabled -eq "True"} | Select-Object DisplayName, Enabled
# Test RDP port accessibility
Test-NetConnection -ComputerName localhost -Port 3389
Pro tip: Deploy the Windows App (successor to Remote Desktop Connection) via Intune for a more modern RDP client experience. It's available in the Microsoft Store for Business.