Policy
Require use of specific security layer for remote (RDP) connections
Windows 11 25H2
Policy overview
Key metadata and intent for this policy.
Supported OS tags: Windows10, Windows10RT, Windows11, Windows7, Windows8, Windows81, WindowsRT, WindowsRT81, WindowsServer2008, WindowsServer2012, WindowsServer2012R2, WindowsServer2016, WindowsVista
This policy setting specifies whether to require the use of a specific security layer to secure communications between clients and RD Session Host servers during Remote Desktop Protocol (RDP) connections. If you enable this policy setting, all communications between clients and RD Session Host servers during remote connections must use the security method specified in this setting. The following security methods are available: * Negotiate: The Negotiate method enforces the most secure method that is supported by the client. If Transport Layer Security (TLS) version 1.0 is supported, it is used to authenticate the RD Session Host server. If TLS is not supported, native Remote Desktop Protocol (RDP) encryption is used to secure communications, but the RD Session Host server is not authenticated. Native RDP encryption (as opposed to SSL encryption) is not recommended. * RDP: The RDP method uses native RDP encryption to secure communications between the client and RD Session Host server. If you select this setting, the RD Session Host server is not authenticated. Native RDP encryption (as opposed to SSL encryption) is not recommended. * SSL (TLS 1.0): The SSL method requires the use of TLS 1.0 to authenticate the RD Session Host server. If TLS is not supported, the connection fails. This is the recommended setting for this policy. If you disable or do not configure this policy setting, the security method to be used for remote connections to RD Session Host servers is not specified at the Group Policy level.
Registry values
How enabled and disabled states update the registry.
No explicit registry values are set for enabled or disabled states.
Policy elements
Inputs and configuration options exposed by this policy.
| Element | Type | Registry mapping | Constraints & behavior |
|---|---|---|---|
Security Layer ID TS_SECURITY_LAYER | enum | HKLM\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services\SecurityLayer Type REG_DWORD | Options: RDP (0), Negotiate (1), SSL (2) |
Other policies in this category
Explore related policies at the same level.
- ComputerAlways prompt for password upon connectionAt least Windows Server 2003 operating systems or Windows XP Professional
- ComputerDisconnect remote session on lock for legacy authenticationWindows 11 22H2 SERVER
- ComputerDisconnect remote session on lock for Microsoft identity platform authenticationWindows 11 22H2 SERVER
- ComputerDo not allow local administrators to customize permissionsAt least Windows Server 2003
- ComputerEnable Microsoft Entra ID Authentication EnforcementAt least Windows 11 Version 24H2
- ComputerRequire secure RPC communicationAt least Windows Server 2003
- ComputerRequire user authentication for remote connections by using Network Level AuthenticationAt least Windows Vista
- ComputerServer authentication certificate templateAt least Windows Vista
- ComputerSet client connection encryption levelAt least Windows Server 2003 operating systems or Windows XP Professional