Affected versions: Windows Server 2022

📖 ~1 min read

Table of contents
  1. Symptom & Impact
  2. Environment & Reproduction
  3. Root Cause Analysis
  4. Quick Triage
  5. Step-by-Step Diagnosis
  6. Solution — Primary Fix
  7. Solution — Alternative Approaches
  8. Verification & Acceptance Criteria
  9. Rollback Plan
  10. Prevention & Hardening
  11. Related Errors & Cross-Refs
  12. References & Further Reading

Symptom & Impact

Remote Desktop clients fail before credential prompt with NLA or CredSSP errors.

Environment & Reproduction

Windows Server 2022 build 20348 after TLS/cipher suite hardening via GPO or registry.

Get-ItemProperty 'HKLM:SYSTEMCurrentControlSetControlTerminal ServerWinStationsRDP-Tcp'
Get-TlsCipherSuite | Select -First 10
qwinsta

Root Cause Analysis

TLS protocol/cipher mismatch between server policy and legacy RDP clients or broken certificate binding.

Quick Triage

Confirm RDP service state and recent Schannel errors.

Get-Service TermService
Get-WinEvent -LogName System -MaxEvents 80 | Where-Object ProviderName -eq 'Schannel'
Get-WinEvent -LogName 'Microsoft-Windows-TerminalServices-RemoteConnectionManager/Operational' -MaxEvents 80

Step-by-Step Diagnosis

Validate certificate thumbprint and NLA policy values.

Get-ItemProperty 'HKLM:SYSTEMCurrentControlSetControlTerminal ServerWinStationsRDP-Tcp' -Name SSLCertificateSHA1Hash,UserAuthentication,SecurityLayer
certutil -store my
Illustrative mockup for windows-server-2022 — terminal_or_powershell
RDP NLA and TLS configuration diagnostics — Illustrative mockup — Progressive Robot

Solution — Primary Fix

Rebind valid cert and align NLA/TLS policy to supported client baseline.

Still having issues? Our IT Solutions & Services team can diagnose and resolve this for you. Get in touch for a free consultation.

Set-ItemProperty 'HKLM:SYSTEMCurrentControlSetControlTerminal ServerWinStationsRDP-Tcp' -Name UserAuthentication -Value 1
Set-ItemProperty 'HKLM:SYSTEMCurrentControlSetControlTerminal ServerWinStationsRDP-Tcp' -Name SecurityLayer -Value 2
Restart-Service TermService -Force
Illustrative mockup for windows-server-2022 — event_or_log_viewer
TerminalServices and Schannel events — Illustrative mockup — Progressive Robot

Solution — Alternative Approaches

Temporary emergency access path: allow restricted management subnet while fixing client stack.

New-NetFirewallRule -DisplayName 'Temporary RDP Mgmt' -Direction Inbound -Protocol TCP -LocalPort 3389 -RemoteAddress 10.10.50.0/24 -Action Allow
# Remove after remediation

Verification & Acceptance Criteria

Modern RDP clients authenticate successfully and no new Schannel fatal alerts occur.

Test-NetConnection server01 -Port 3389
Get-WinEvent -LogName System -MaxEvents 30 | Where-Object ProviderName -eq 'Schannel'

Rollback Plan

If access remains broken, restore previous TLS policy snapshot and reboot.

reg import C:Temptls-prechange.reg
shutdown /r /t 0

Prevention & Hardening

Test TLS hardening against all approved RDP client versions before broad rollout.

gpresult /h C:Temprdp-gpo.html
wevtutil qe System /q:"*[System[(Provider[@Name='Schannel'])]]" /f:text /c:20

Related to CredSSP encryption oracle remediation and certificate EKU mismatches.

Related tutorial: View the step-by-step tutorial for Windows Server 2022.

View all Windows Server 2022 tutorials on the Tutorials Hub →

Browse all common problems & solutions on the Tutorials Hub.

References & Further Reading

Microsoft Learn RDP NLA, Schannel, and secure remote access hardening on Windows Server 2022.

Need Expert Help?

If you cannot resolve this yourself, our team offers hands-on Server Management, Managed IT Services, and flexible Support Plans. Contact us today — we respond within one business day.