Active Directory

Using Remote Desktop Connection Manager

How do I manage remote desktop connections?

While Microsoft is doing its best to persuade us to manage remote servers using the Remote Server Administration Tools (RSAT), such as Server Manager, it’s common that system administrators will have a number of remote desktops that they connect to on a daily basis for administration purposes. When this number reaches more than a handful, managing and tracking these connections around your desktop can be frustrating.

The Remote Desktop Connection Manager (RDCM), originally developed around the time of Windows Vista and not updated for a couple of years, can still be downloaded and works on Windows 8. You can download the Remote Desktop Connection Manager for free.

Once the tool is installed, you need to create a new RDCM group collection.

  1. Select New from the File menu and in the New File dialog give your new group collection a name and click Save.
  2. You will now see your new group collection in the left pane of RDCM.
  3. Right-click the new group and click Add group… in the menu. Give the group a name in the Add Group dialog. At this point you have the option to set a variety of options for all servers that will become a member of the group. If you click on any of the tabs in the Add Group dialog, you’ll see that the settings are inherited from the group collection. This can be changed by deselecting the Inherit from parent check box.
  4. Click Add to create the new group.
  5. Right-click the new group in the left pane of RDCM and select Add server… from the menu. Enter the DNS name of the server in the Server name box and click Add.
  6. To connect to the server, double-click the server in the left pane of RDCM.

Remote Desktop Connection Manager

Sponsored Content

What is “Inside Microsoft Teams”?

“Inside Microsoft Teams” is a webcast series, now in Season 4 for IT pros hosted by Microsoft Product Manager, Stephen Rose. Stephen & his guests comprised of customers, partners, and real-world experts share best practices of planning, deploying, adopting, managing, and securing Teams. You can watch any episode at your convenience, find resources, blogs, reviews of accessories certified for Teams, bonus clips, and information regarding upcoming live broadcasts. Our next episode, “Polaris Inc., and Microsoft Teams- Reinventing how we work and play” will be airing on Oct. 28th from 10-11am PST.

The Options dialog on the Tools menu lets you configure various settings, such as the display size of remote desktops and connection experience settings. Also useful is the ability to right-click a server in the left pane and undock it from the main RDCM window.

Related Topics:


Don't have a login but want to join the conversation? Sign up for a Petri Account

Comments (0)

Leave a Reply

IT consultant, Contributing Editor @PetriFeed, and trainer @Pluralsight. All about Microsoft, Office 365, Azure, and Windows Server.
External Sharing and Guest User Access in Microsoft 365 and Teams

This eBook will dive into policy considerations you need to make when creating and managing guest user access to your Teams network, as well as the different layers of guest access and the common challenges that accompany a more complicated Microsoft 365 infrastructure.

You will learn:

  • Who should be allowed to be invited as a guest?
  • What type of guests should be able to access files in SharePoint and OneDrive?
  • How should guests be offboarded?
  • How should you determine who has access to sensitive information in your environment?

Sponsored by:

Live Webinar: Active Directory Security: What Needs Immediate Priority!Live on Tuesday, October 12th at 1 PM ET

Attacks on Active Directory are at an all-time high. Companies that are not taking heed are being punished, both monetarily and with loss of production.

In this webinar, you will learn:

  • How to prioritize vulnerability management
  • What attackers are leveraging to breach organizations
  • Where Active Directory security needs immediate attention
  • Overall strategy to secure your environment and keep it secured

Sponsored by: