Windows OS Hub
  • Windows
    • Windows 11
    • Windows 10
    • Windows Server 2025
    • Windows Server 2022
    • Windows Server 2019
    • Windows Server 2016
  • Microsoft
    • Active Directory (AD DS)
    • Group Policies (GPOs)
    • Exchange Server
    • Azure and Microsoft 365
    • Microsoft Office
  • Virtualization
    • VMware
    • Hyper-V
    • Proxmox
  • PowerShell
  • Linux
  • Home
  • About

Windows OS Hub

  • Windows
    • Windows 11
    • Windows 10
    • Windows Server 2025
    • Windows Server 2022
    • Windows Server 2019
    • Windows Server 2016
  • Microsoft
    • Active Directory (AD DS)
    • Group Policies (GPOs)
    • Exchange Server
    • Azure and Microsoft 365
    • Microsoft Office
  • Virtualization
    • VMware
    • Hyper-V
    • Proxmox
  • PowerShell
  • Linux

 Windows OS Hub / Windows 11 / Security Warnings when Opening RDP files in Windows 11

April 17, 2026

Security Warnings when Opening RDP files in Windows 11

The latest security updates for Windows 11 and Windows 10 have changed the default system behavior when connecting to a remote computer’s desktop via a saved *.rdp file. When a user first opens an RDP file, a one-time notification appears to explain the purpose of RDP files and the potential risks associated with using them. Each time a user opens an RDP file before establishing a connection with the remote host, they will be prompted by a security warning to manually approve the connection and select the local resources that need to be redirected to the Remote Desktop session.

Contents:
  • Latest Microsoft Updates Add Warnings for RDP Files
  • How to Disable the Remote Desktop Connection Security Warning when Opening an RDP File
  • How to Sign an RDP File Using RDPSign.exe

Latest Microsoft Updates Add Warnings for RDP Files

After installing the April 2026 cumulative updates for Windows 11 (KB5083769 or KB5082052) and Windows 10 (KB5082200, as a part of the Extended Security Updates program for Windows 10), the following protections will be applied by default when opening an RDP file:

  • A detailed warning about the target system will appear before a Remote Desktop connection is established.
  • By default, redirection of local resources to a remote RDP session is disabled, and users are asked to explicitly select the resources they want to redirect to their session.
 Microsoft states that the aim of this innovation is to improve the protection of Windows against the widespread use of RDP files for phishing attacks. In this type of attack, the attacker sends the victim a special *.rdp file. When the victim opens the file, a connection is established with the attacker’s Remote Desktop server, and the user’s local resources are redirected to the terminal session. As a result, an attacker controlling the remote host can gain access to these resources (including local drives, clipboard, smart cards, redirected printers, microphone, PnP devices, etc.).

The first time you open an RDP file, a notification will appear:

Opening Remote Desktop Connection
You are opening an RDP file which will establish a connection to another computer. Connecting to any remote system can expose your PC and data to security risks. Learn more.

In order to proceed with the Remote Desktop connection, the user needs to explicitly tick the box.

I understand and allow RDP files to open on this device for my account.

Warning when first opening RDP file

Then, a security warning will appear. The text of this warning depends on whether or not the RDP file is signed.

If the RDP file is not digitally signed or if Windows cannot verify it, a warning will appear:

Remote Desktop Connection Security warning

Caution: Unknown remote connection

This remote connection could harm the local or remote computer and may be used to steal passwords or files. We could not verify the publisher of this remote connection. Stop now unless you are certain you trust this connection.

Publisher: Unknown publisher

If users still want to connect, they need to select the local redirected resources required in the RDP session and click Connect.

Remote Desktop Connection Security warning Caution: Unknown remote connection Publisher: Unknown publisher

If the RDP file has been digitally signed, the warning will display information about the publisher:

Verify the publisher of this remote connection.

However, the user will still be prompted to verify the connection’s legitimacy and select the local resources to be redirected to the remote session.

Remote Desktop Connection Security Warning Verify the publisher of this remote connection

Note that these new security restrictions only apply to connections that are initiated via saved RDP files. No security warnings will appear if you manually enter the name of the remote RDP/RDS host in the mstsc.exe client, or if you run it from the command prompt using the command mstsc /v:woshubsrv1

rdp connection via cmd using mstsc.exe with hostname as an option

Thus, the built-in Remote Desktop Connection client now ignores local resource redirection settings specified in saved RDP files and always prompts the user to select the local resources to be redirected.

How to Disable the Remote Desktop Connection Security Warning when Opening an RDP File

To temporarily disable the new security measure for RDP files (this is not secure!), the administrator can create the RedirectionWarningDialogVersion registry parameter with a value of 1. This registry item can be created manually using the command below, or it can be deployed to clients via Group Policy (see How to create and configure registry items via GPO).

REG ADD "HKLM\Software\Policies\Microsoft\Windows NT\Terminal Services\Client" /v RedirectionWarningDialogVersion /t REG_DWORD /d "1" /F

RedirectionWarningDialogVersion - disable security warning when opening RDP files

The first RDP security warning can be disabled by creating the following registry option for the user:

REG ADD "HKEY_CURRENT_USER\Software\Microsoft\Terminal Server Client" /v RdpLaunchConsentAccepted /t REG_DWORD /d "1" /F

How to Sign an RDP File Using RDPSign.exe

It is more secure to sign the required RDP file with a trusted digital signature. This will require you to use a special code-signing certificate type (Enhanced Key Usage, EKU = Code Signing). Request such a certificate from your CA, but in my case, I’ll create a self-signed certificate using PowerShell:

New-SelfSignedCertificate -Subject "WOSHUB Cert for Code Signing” -Type CodeSigningCert -CertStoreLocation cert:\LocalMachine\My

Copy the certificate thumbprint value and then sign the RDP file using the built-in RDPSign.exe tool:

rdpsign.exe /v /sha256 73FD89DCA644FF7A9CE90FDB1B4786B83851F380 .\Desktop\my_rdp_app.rdp

All rdp file(s) have been succesfully signed.

sign RDP file with rdpsign.exe tool

In order for the client to trust this certificate, it needs to be placed in the trusted root certificate store. The administrator can open the certlm.msc console manually and copy the certificate to the Trusted Root Certification Authorities. Or, export the certificate used for RDP file signing as a CER file and install the certificate on client computers via GPO.

Code signing certificate in Trusted Root Certification Authorities

Then add the certificate thumbprint to the GPO option Specify SHA1 thumbprints of certificates representing trusted .rdp publishers (under Computer Configuration -> Policies -> Administrative Templates -> Windows Components -> Remote Desktop Services -> Remote Desktop Connection Client).

GPO: Specify SHA1 thumbprints of certificates representing trusted .rdp publishers

Learn more about how to secure RDP connections using SSL/TLS certificates.

After applying new Group Policy settings, the client will open the signed RDP file without displaying a warning.

If a user has selected and saved options for redirecting local devices when connecting to a trusted RDP host, these saved redirected device options can be reset through the registry. Open the HKEY_CURRENT_USER\SOFTWARE\Microsoft\Terminal Server Client registry key (the RDP connection history is stored here) and manually delete the entries for the name or IP address of your RDP host from the Default and Servers sections.

Saved RDP connection history in registry with selected settings

0 comment
0
Facebook Twitter Google + Pinterest
Questions and AnswersWindows 10Windows 11
previous post
Find Computers with Pending Reboot Status Using PowerShell

Related Reading

Change BIOS from Legacy to UEFI without Reinstalling...

April 23, 2025

How to Move (Migrate) Windows Shares to a...

February 26, 2026

Uninstalling Windows Updates via CMD/PowerShell

March 10, 2026

How to Detect Which User Installed or Removed...

June 25, 2025

Find a Process Causing High Disk Usage on...

July 16, 2025

Map a Network Drive over SSH (SSHFS) in...

May 13, 2025

SMB over QUIC: Mount File Share over Internet...

December 24, 2025

Monitor Windows Log Files in Real Time with...

March 26, 2026

Leave a Comment Cancel Reply

join us telegram channel https://t.me/woshub
Join WindowsHub Telegram channel to get the latest updates!

Recent Posts

  • Find Computers with Pending Reboot Status Using PowerShell

    April 15, 2026
  • Mounting NFS Shares in Windows Using the Built-in Client

    March 26, 2026
  • Monitor Windows Log Files in Real Time with PowerShell

    March 17, 2026
  • Pin and Unpin Apps to Taskbar in Windows 11 via PowerShell

    March 10, 2026
  • Load and Initialize Network Drivers in Windows PE or Recovery Environment

    February 25, 2026
  • How to Set a Custom Drive Icon in Windows

    February 17, 2026
  • Managing Per-User Services in Windows

    February 11, 2026
  • Change Default OU for New Computers and Users in AD

    February 2, 2026
  • Where Windows Stores Certificates and Private Keys

    January 22, 2026
  • How to Extract Printer Drivers from Windows

    January 21, 2026

Follow us

  • Facebook
  • Twitter
  • Youtube
  • Telegram
Popular Posts
  • Converting Windows 10 to Enterprise LTSC Without Losing Data
  • How to Remove ‘Some Settings are Managed by Your Organization’ on Windows 11 or 10
  • Remove the Max Path Length Limit (260-Characters) on Windows
  • How to Pause (Delay) Update Installation on Windows 11 and 10
  • Fix: The System Administrator Policies Prevent the App Installation
  • Force Stop an Unresponsive VM on Proxmox
  • Windows Setup Could Not Display the Images Available for Installation
Footer Logo

@2014 - 2026 - Windows OS Hub. All about operating systems for sysadmins


Back To Top