Downloads

Download RDP Client 6.0

Where can I download the Remote Desktop Connection 6.0 client software?

Remote Desktop Connection (Terminal Services Client 6.0) provides a way to use any new Terminal Services features introduced in Microsoft Windows Vista and Microsoft Windows Server Code Name “Longhorn” from a computer running Microsoft Windows XP with Service Pack 2 and Windows Server 2003. The version of this software is 6.0.6000.

Sponsored Content

Maximize Value from Microsoft Defender

In this ebook, you’ll learn why Red Canary’s platform and expertise bring you the highest possible value from your Microsoft Defender for Endpoint investment, deployment, or migration.

Download RDP 6.0 for Windows XP SP2 (1.5mb)

Download RDP 6.0 for Windows XP 64-bit (4.4mb)

Download RDP 6.0 for Windows Server 2003 SP2 (1.5mb)

Note: If you still need to older v5.2 client read the Download RDP 5.2 and Download RDP 5.2 (Old Version) page. This version is good for operating systems other than Windows XP Pro with SP2.

Note: In case you cannot install the RDP client on the computer you’re working at (in situations where you don’t have the necessary rights for example) you can still connect to the TS by using the Remote Desktop Web Connection component. Read Download Remote Desktop Web Connection for Windows Server 2003  and Install Remote Desktop Web Connection on Windows Server 2003 for more info.

Related articles

You might also want to read the following related articles:

Related Topics:

External Sharing and Guest User Access in Microsoft 365 and Teams

This eBook will dive into policy considerations you need to make when creating and managing guest user access to your Teams network, as well as the different layers of guest access and the common challenges that accompany a more complicated Microsoft 365 infrastructure.

You will learn:

  • Who should be allowed to be invited as a guest?
  • What type of guests should be able to access files in SharePoint and OneDrive?
  • How should guests be offboarded?
  • How should you determine who has access to sensitive information in your environment?

Sponsored by: