Coming Soon: GET:IT Endpoint Management 1-Day Conference on September 28th at 9:30 AM ET Coming Soon: GET:IT Endpoint Management 1-Day Conference on September 28th at 9:30 AM ET

Remote Desktop shadowing for Administrative Purposed

Home Forums Virtualization Terminal Services Remote Desktop shadowing for Administrative Purposed

Viewing 1 post (of 1 total)
  • Author
    Posts

  • Nehemoth
    Member
    #167390

    Remote Desktop Session Shadowing was added back to Windows 2012 R2 after being removed from the previous version.
    Sadly there’s isn’t much information on how to add it back (which exactly roles to install and for which function).

    Even worst, I couldn’t find any information on how if it’s possible to use the feature for administrative purposes as with previous Windows version (2003, 2008).

    In essence I would like to know if I can do shadowing to a remote desktop connection on a server that doesn’t have the role for Remote Desktop Services.
    If possible let me know how to configure it or where to read about it.

    Thank you

Viewing 1 post (of 1 total)

You must be logged in to reply to this topic.

Live on Tuesday, September 28th, at 9:30 AM ET!

GET-IT: EndPoint Management 1-Day Virtual Conference

The management of endpoints is complicated and the risks associated with having unsecured devices roaming outside the firewall are quickly becoming a targeted vector for malicious users. In this Petri one-day virtual conference, we will be diving deep into how you can improve the way you manage your endpoints and learn from industry experts and MVPs about best practices, available tools to streamline your operations, and what's coming soon with Windows 11.

RSVP Now!

Sponsored By

Live Webinar: Active Directory Security: What Needs Immediate Priority!Live on Tuesday, October 12th at 1 PM ET

Attacks on Active Directory are at an all-time high. Companies that are not taking heed are being punished, both monetarily and with loss of production.

In this webinar, you will learn:

  • How to prioritize vulnerability management
  • What attackers are leveraging to breach organizations
  • Where Active Directory security needs immediate attention
  • Overall strategy to secure your environment and keep it secured

Sponsored by: