Remote » How to Resolve Remote Desktop Disconnected Error - Incorrect Configuration

Resolving Remote desktop disconnected error : Incorrectly configured authentication and encryption settings

Quick search

    Objective: To resolve the Remote desktop disconnected error due to incorrect configuration of authentication and encryption settings.

    Incorrectly configured authentication and encryption settings causes your server to display the 'remote desktop disconnected error' with the following error messages:

    Because of a security error, the client could not connect to the Terminal server. After making sure that you are logged on to the network, try connecting to the server again.

    or,

    Remote desktop disconnected. Because of a security error, the client could not connect to the remote computer. Verify that you are logged onto the network and then try connecting again.

    This is accompanied by symptoms such as

    1. Unable to establish a new RDP connection log
    2. The old connection remains active even if the computer is physically disconnected. If the client logs in again, a new connection will be established and the old connection may still remain active, leaving a security loophole.

    The below sections detail steps to fix this error for both the symptoms.

    Configuring authentication and encryption for a connection:

    To perform the following steps, you need to log in as an Administrator in RDSH server or should have been delegated the appropriate privileges.

    1. On the RD Session Host server, click Start, click Administrative Tools, and open Remote Desktop Services. Navigate to Remote Desktop Session Host Configuration >> Connections.

    2. Right-click the name of the connection, and select Properties.

    3. In the Properties dialog box that opens, navigate to the General tab >> Security layer. Select a security method.

    4. In Encryption level, select an option from the following.

      1. Low: Encrypts data sent from the client to the server using 56-bit encryption.
      2. High: Encrypts data sent between the server and the client using 128-bit encryption.
      3. Client compatible: Encrypts data sent between the client and the server at the maximum key strength supported by the client.
      4. FIPS Compliant: Encrypts and decrypts data sent between the server and client with the Federal Information Processing Standard (FIPS) 140-1 encryption algorithms, using Microsoft cryptographic modules.

      The new encryption levels takes effect the next time a user logs on.

    Also, note that any encryption level settings defined in Group Policy override the above settings. Within group policy itself, System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing setting, overrides the Set client connection encryption level setting.

    Note: Certificate issues can be verified by checking the View Certificate option in Remote Desktop Services Configuration console. It can be further monitored by enabling CAPI2 event logs on both the client and server computers.

    CryptoAPI2 aka CAPI2 is a tool in Windows that troubleshoots certificate issues, which provides CAPI2 event logs. In the Event Viewer, navigate to Applications and Services Logs >> Microsoft >> Windows >> CAPI2 >> Operational. Right click Operational and select the option Enable logs.

    Configuring RDP connection interval :

    Sometimes, the session on the Remote Desktop server is not disconnected, even if it has been physically disconnected. This can be rectified by configuring a time interval until which the RDP connections needs to be kept alive without activity. The steps are as follows :

    1. Open Group Policy Object Editor, by typing gpedit.msc in Run and click OK.
    2. Navigate to Computer Configuration >> Administrative Templates >> Windows Components >> Remote Desktop Services >> Remote Desktop Session Host >> Connections.
    3. In the right pane, double-click Configure keep-alive connection interval.
    4. Check Enabled, and click OK. Close Group Policy Object Editor.

    EventLog Analyzer

    EventLog Analyzer, a one-stop log management solution, collects, analyzes, correlates, and archives log data from you on-premises as well as cloud network. With its in-depth log analysis capability, EventLog Analyzer helps enterprises to thwart security threats in real-time, spot anomalous user behaviors, and manage security incidents effectively. Want to know how our solution helps you protect your cloud environment? Check out.

    Download now

    EventLog Analyzer Trusted By

    Los Alamos National Bank Michigan State University
    Panasonic Comcast
    Oklahoma State University IBM
    Accenture Bank of America
    Infosys
    Ernst Young

    Customer Speaks

    • Credit Union of Denver has been using EventLog Analyzer for more than four years for our internal user activity monitoring. EventLog Analyzer provides great value as a network forensic tool and for regulatory due diligence. This product can rapidly be scaled to meet our dynamic business needs.
      Benjamin Shumaker
      Vice President of IT / ISO
      Credit Union of Denver
    • The best thing, I like about the application, is the well structured GUI and the automated reports. This is a great help for network engineers to monitor all the devices in a single dashboard. The canned reports are a clever piece of work.
      Joseph Graziano, MCSE CCA VCP
      Senior Network Engineer
      Citadel
    • EventLog Analyzer has been a good event log reporting and alerting solution for our information technology needs. It minimizes the amount of time we spent on filtering through event logs and provides almost near real-time notification of administratively defined alerts.
      Joseph E. Veretto
      Operations Review Specialist
      Office of Information System
      Florida Department of Transportation
    • Windows Event logs and device Syslogs are a real time synopsis of what is happening on a computer or network. EventLog Analyzer is an economical, functional and easy-to-utilize tool that allows me to know what is going on in the network by pushing alerts and reports, both in real time and scheduled. It is a premium software Intrusion Detection System application.
      Jim Lloyd
      Information Systems Manager
      First Mountain Bank

    Awards and Recognitions

    •  
    •  
    •  
    •  
    •  
    •  
    •  
    •  
    •  
    •  
    A Single Pane of Glass for Comprehensive Log Management

    © 2020 Zoho Corporation Pvt. Ltd. All rights reserved.